Want to meet with us at RSA? Book a meeting here and select “RSA Meeting” as the topic.

“Many Voices. One Community.” This is the theme for RSAC 2025, serving as a clear message that together, we can overcome any obstacle posed by threat actors.

This theme resonates deeply with us at Mitiga. We acknowledge that as a united community we can stop attackers in their tracks before it's too late. Our years of Incident Response (IR) experience for cloud-based attacks demonstrates that prevention-based cloud security is a must—but it's only part of the equation and must be paired with effective cloud detection and response for security teams' success.

Of course, it's easier said than done. How will you piece it all together so that your company's security solutions act as “one community,” to achieve balance and stop breaches across cloud, identity, and SaaS?

We'll make it simple: answer these three questions. If you answer “yes” to at least two, then keep reading this blog post for tips to make the most of your event experience.

  • Does your organization use a Cloud Native Application Protect Platform (CNAPP) and/or Cloud Security Posture Management (CSPM) solution?
  • If a threat actor attempted to attack your organization through one of your SaaS applications, would it take longer than you would like to investigate and respond?
  • Does your Security Operations (SecOps) team need to bolster their cloud-specific skills and knowledge?

It’s Time to Bring Your Cloud Security Into 2025

Still with us? Okay, great. If you answered yes to at least two of the questions above, we've outlined a strategy that will leave you walking away from RSA with a deeper knowledge of where your cloud security needs to evolve (and why), and how to make that evolution a reality.

Most cloud security solutions are prevention-based, and they're crafted with DevOps teams in mind. Meanwhile, SecOps teams have been left behind, creating a critical gap in the solution needed when prevention fails. Take it from our co-founder and CTO, Ofer Maor, during his RSA Conference presentation from last year:

Ultimately, if your organization has reached a level of maturity with its CNAPP/CSPM solutions, it’s time to enter the next phase: detection and response.

Visit Booth N-4618 to Learn About Cloud Detection and Response (CDR)

To effectively respond to cloud threats across infrastructure, identity, and SaaS applications, SecOps teams need robust Cloud Detection and Response capabilities. This includes:

  • AI-powered detection: Detection rules built upon sophisticated anomaly detection, indicators of attack (IOAs), and indicators of compromise (IOCs) - specifically tailored to cloud threats.
  • Panoramic visibility: Unified visibility and detection rules across disparate solutions like CSPMs and SSPMs is a must to eliminate dangerous blind spots where threat actors lurk undetected.
  • Incident readiness: Data is king when it comes to cloud investigation. Being able to readily access critical logs can mean the difference between weeks vs. hours to return to business as usual.

We invite you to visit us at Booth N-4618 to learn about Mitiga's CDR platform. In addition to discussing your organization's cloud security needs, we'll have plenty of opportunities for you to relax and enjoy yourself.

Booth Activities with Mitiga

Interested in winning a beautiful new smart watch? Stop by our booth, give us a follow on LinkedIn, and you'll be entered into a raffle to win.

Follow Mitiga on Linkedin
Follow Mitiga on LinkedIn for a chance to win

We'll also be offering you the opportunity to get the recharge you need by providing coffee throughout the week. Stop by our booth to find out exact times when the barista will be there so you can get your coffee just the way you like it!

Lastly, get a demo of our CDR platform, complete with powerful detection, investigation, and response capabilities. We'll have plenty of Mitiga representatives at the booth to explain how companies like Lemonade, Blackstone, and New American Funding rely on us to make cloud attacks yesterday's problem.

Booth N-4618
Find Mitiga in RSA 2025 at Booth N-4618

Attend Four Sessions About Real-World Cloud Attacks

Mitiga's co-founder and CTO Ofer Maor and Director of Research Roei Sherman have an informative agenda across four sessions. Read below to learn more:

Beyond Simulations: Advancing Detection Validation in Cybersecurity

Date/Time: Monday, Apr 28 from 9:40 AM - 10:30 AM

Description: This session examines the challenge of validating cybersecurity detections beyond simulations. Participants will discuss whether current testing truly reflects real-world scenarios and explore alternative strategies to ensure detection systems perform effectively without excessive resource demands.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion and remind attendees that no comment attribution or recording of any sort should take place. Media Pass holders, College Day Pass holders, and Security Scholars are not permitted to attend. This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Add to your agenda by clicking here.

From Snowflake to Snowstorm: Navigating Breaches and Detections

Date/Time: Monday, April 28th from 2:20-3:10 pm PT

Description: The Snowflake campaign exposed sensitive data from 165+ customers, highlighting SaaS security gaps. This session will detail how the breach occurred, detection strategies, and response best practices. Learn actionable steps to improve cloud security, mitigate future threats, and stay ahead of evolving SaaS vulnerabilities.

Add to your agenda by clicking here.

Cloud, Identity & SaaS Forensic Investigation – Not What You Think!

Date/Time: Tuesday, April 29th from 8:30-9:20 am PT

Description: Forensic investigation conjures thoughts of disk cloning and memory analysis. But investigating cloud services, IdPs and SaaS requires a completely new set of tools, skills, and mindset! This talk will teach attendees how to do that, collecting artifacts from multi-cloud and SaaS, identifying attacks, and providing forensically sound evidence and records to support their conclusions.

Add to your agenda by clicking here.

It's Getting Real & Hitting the Fan 2025: Think You See Me? No You Don't!

Date/Time: Wednesday, April 30th from 2:25-3:15 pm PT

Description: Hackers are advancing cloud attacks beyond workloads into areas with minimal visibility, such as the cloud control plane, cloud services, and SaaS. Recent examples include the Snowflake campaign, AWS glacier attacks, and GitHub compromises, where SOC teams are often blind. This session will look at real world investigated incidents and what SOC teams can do today to detect and mitigate them!

Add to your agenda by clicking here.

Schedule Time with Mitiga at RSA Conference 2025 and Enhance Your Organization's Cloud Resilience

We'd love to meet with you to understand your team's unique needs; set up time with us by clicking here and selecting “RSA Meeting” as the topic.

If you're ready to make cloud attacks yesterday's problem and equip your SOC team with the most powerful CDR capabilities, we can't wait to see you in San Francisco!

LAST UPDATED:

April 29, 2025

Don't miss these stories:

Why Visibility Drives Everything in Modern Cybersecurity with Sevco’s Greg Fitzgerald

In this episode of Mitiga Mic, Brian Contos sits down with Greg Fitzgerald, co-founder of Sevco Security, for a candid conversation on the real state of asset visibility, prioritization, and the evolving challenges facing security teams. With nearly three decades in the industry, Fitzgerald brings perspective on how cybersecurity has shifted from endpoint tools to orchestration-wide awareness. And why that shift is critical for cloud, SaaS, AI, and identity defense. Watch the episode or read the full transcript below.

How Threat Actors Used Salesforce Data Loader for Covert API Exfiltration

In recent weeks, a sophisticated threat group has targeted companies using Salesforce’s SaaS platform with a campaign focused on abusing legitimate tools for illicit data theft. Mitiga’s Threat Hunting & Incident Response team, part of Mitiga Labs, investigated one such case and discovered that a compromised Salesforce account was used in conjunction with a “Salesforce Data Loader” application, a legitimate bulk data tool, to facilitate large-scale data exfiltration of sensitive customer data.

God-Mode in the Shadows: When Security Tools and Excessive Permissions Become Cloud Security Risks

By the time the alarms go off, it’s often too late. A trusted third-party security tool, one that promised to protect your cloud and SaaS environments, has been operating with unchecked ‘god-mode’ privileges. These tools, usually classified as SaaS Security Posture Management (SSPM) or Data Security Posture Management (DSPM), have been granted near-unrestricted access to your data, configurations, and secrets.

How AI Is Transforming Cybersecurity: Detection, Response & Threat Evolution with Mitiga’s Ofer Maor

In this episode of Mitiga Mic, Brian Contos, Field CISO at Mitiga, sits down once again with Ofer Maor, CTO and Co-founder, to break down one of today’s most urgent cybersecurity challenges: the intersection of Artificial Intelligence (AI) and Detection & Response. From the Automated SOC to AI-powered attackers and cloud-based AI infrastructure threats, Ofer outlines the three pillars of AI-DR (AI Detection and Response) and what organizations need to know now and in the near future.

Meet Mitiga in Las Vegas at Black Hat, DEF CON, and BSides

From August 4 to 11, Mitiga will be on the ground in Las Vegas for Black Hat USA, DEF CON, and BSides Las Vegas. If you’re responsible for cloud security, SaaS threat detection, or incident response, this is your opportunity to connect directly with our team.

Why Wi-Fi Isn’t Enough: Joseph Salazar on Wireless Airspace Security

In this episode of Mitiga Mic, we sit down with cybersecurity veteran Joseph Salazar, now with Bastille Networks, to uncover the vast and often invisible world of wireless attack surfaces. From Bluetooth-enabled coffee mugs and smart thermostats to malicious USB cables that launch attacks from parking lots, Joseph walks us through real-world threats that operate outside your firewall and beyond traditional security tools.