Mitiga Appoints Charlie Thomas as CEO READ THE RELEASE

Mitiga Announces $30M Series B Led by SYN Ventures READ THE NEWS

Want to meet with us at RSA? Book a meeting here and select “RSA Meeting” as the topic.

“Many Voices. One Community.” This is the theme for RSAC 2025, serving as a clear message that together, we can overcome any obstacle posed by threat actors.

This theme resonates deeply with us at Mitiga. We acknowledge that as a united community we can stop attackers in their tracks before it’s too late. Our years of Incident Response (IR) experience for cloud-based attacks demonstrates that prevention-based cloud security is a must—but it’s only part of the equation and must be paired with effective detection and response for security teams’ success.

Of course, it’s easier said than done. How will piece it all together so that your company’s security solutions act as “one community,” to achieve balance and stop breaches across cloud, identity, and SaaS?

We’ll make it simple: answer these three questions. If you answer “yes” to at least two, then keep reading this blog post for tips to make the most of your event experience.

  1. Does your organization use a CNAPP and/or CSPM solution?
  2. If a threat actor attempted to attack your organization through one of your SaaS applications, would it take longer than you would like to investigate and respond?
  3. Does your SecOps team need to bolster their cloud-specific skills and knowledge?

It’s Time to Bring Your Cloud Security Into 2025

Still with us? Okay, great. If you answered yes to at least two of the questions above, we’ve outlined a strategy that will leave you walking away from RSA with a deeper knowledge of where your cloud security needs to evolve (and why), and how to make that evolution a reality.

Most cloud security solutions are prevention-based, and they’re crafted with DevOps teams in mind. Meanwhile, SecOps teams have been left behind, creating a critical gap in the solution needed when prevention fails. Take it from our co-founder and CTO, Ofer Maor, during his RSA Conference presentation from last year:

Ultimately, if your organization has reached a level of maturity with its CNAPP/CSPM solutions, it’s time to enter the next phase: detection and response.

Visit Booth N-4618 to Learn About Cloud Detection and Response (CDR)

To effectively respond to cloud threats across infrastructure, identity, and SaaS applications, SecOps teams need robust Cloud Detection and Response capabilities. This includes:

  1. AI-powered detection: Detection rules built upon sophisticated anomaly detection, indicators of attack (IOAs), and indicators of compromise (IOCs) - specifically tailored to cloud threats.
  2. Panoramic visibility: Unified visibility and detection rules across disparate solutions like CSPMs and SSPMs is a must to eliminate dangerous blind spots where threat actors lurk undetected.
  3. Incident readiness: Data is king when it comes to cloud investigation. Being able to readily access critical logs can mean the difference between weeks vs. hours to return to business as usual.

We invite you to visit us at Booth N-4618 to learn about Mitiga’s CDR platform. In addition to discussing your organization’s cloud security needs, we’ll have plenty of opportunities for you to relax and enjoy yourself.

Booth Activities with Mitiga

Interested in winning a beautiful new smart watch? Stop by our booth, give us a follow on LinkedIn, and you’ll be entered into a raffle to win.

Follow Mitiga on Linkedin
Follow Mitiga on LinkedIn for a chance to win

We’ll also be giving you plenty of opportunities to unwind or get the burst of energy you’re needing to keep going during the busy week. Between a masseuse and a coffee cart, everyone will be able to get the recharge they need.

Lastly, get a demo of our CDR platform, complete with powerful detection, investigation, and response capabilities. We'll have plenty of Mitiga representatives at the booth to explain how companies like Lemonade, Blackstone, and New American Funding rely on us to make cloud attacks yesterday’s problem.

Booth N-4618
Visit Booth N-4618 to meet with Mitiga

Attend Sessions About Real-World Cloud Attacks

Mitiga’s co-founder and CTO Ofer Maor and Director of Research Roei Sherman have an informative agenda across three sessions. Read below to learn more:

From Snowflake to Snowstorm: Navigating Breaches and Detections

Date/Time: Monday, April 28th from 2:20-3:10 pm PT

Description: The Snowflake campaign exposed sensitive data from 165+ customers, highlighting SaaS security gaps. This session will detail how the breach occurred, detection strategies, and response best practices. Learn actionable steps to improve cloud security, mitigate future threats, and stay ahead of evolving SaaS vulnerabilities.

Add to your agenda by clicking here.

Cloud, Identity & SaaS Forensic Investigation – Not What You Think!

Date/Time: Tuesday, April 29th from 8:30-9:20 am PT

Description: Forensic investigation conjures thoughts of disk cloning and memory analysis. But investigating cloud services, IdPs and SaaS requires a completely new set of tools, skills, and mindset! This talk will teach attendees how to do that, collecting artifacts from multi-cloud and SaaS, identifying attacks, and providing forensically sound evidence and records to support their conclusions.

Add to your agenda by clicking here.

It’s Getting Real & Hitting the Fan 2025: Think You See Me? No You Don’t!

Date/Time: Wednesday, April 30th from 2:25-3:15 pm PT

Description: Hackers are advancing cloud attacks beyond workloads into areas with minimal visibility, such as the cloud control plane, cloud services, and SaaS. Recent examples include the Snowflake campaign, AWS glacier attacks, and GitHub compromises, where SOC teams are often blind. This session will look at real world investigated incidents and what SOC teams can do today to detect and mitigate them!

Add to your agenda by clicking here.

Schedule Time with Mitiga at RSA Conference and Enhance Your Organization’s Cloud Resilience

We’d love to meet with you to understand your team’s unique needs; set up time with us by clicking here and selecting “RSA Meeting” as the topic.

If you’re ready to make cloud attacks yesterday’s problem and equip your SOC team with the most powerful CDR capabilities, we can’t wait to see you in San Francisco!

LAST UPDATED:

March 14, 2025

Don't miss these stories:

Can vulnerabilities in on-prem resources reach my cloud environment?

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Log4Shell - identify vulnerable external-facing workloads in AWS

Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.

How Transit Gateway VPC Flow Logs Help Incident & Response Readiness

In this blog, we will focus on the security and forensic aspects of Transit Gateway VPC flow logs and expand the way they can be used by organizations to respond to cloud incidents.

Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?

On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?

Viral Outbreaks: Thinking of Microsoft’s New Wormable Vulnerability in a Coronavirus Context

But today, in the midst of a pandemic outbreak of Coronavirus (COVID-19) and while governments and global organizations work to contain and eradicate the virus, we’re hearing of a new wormable vulnerability in Microsoft’s SMBv3 protocol.How can we learn from these unfortunate events to provide us with a different context and an opportunity to rethink our level of readiness for unexpected, viral cyber events?

Unlocking Cloud Security with Managed Detection and Response

See how Mitiga’s Cloud Managed Detection and Response tackles complex cyber threats with proactive threat management and advanced automation at scale.