Methodology: We collected most relevant posts on LinkedIn talking about it-sa Expo & Congress and created an overall summary only based on these posts. If you´re interested in the single posts behind, you can find them here: https://linktr.ee/thomasallgeyer. Have a great read!
Identity & Access Management
Passwordless and MFA positioned as default controls supported by SSO standardization and FIDO2 alignment
Privileged access hardening framed as operational risk reduction with policy automation and tighter just-in-time access
Identity threat detection tied to directory hygiene and continuous posture scoring across hybrid estates
Consolidation narrative around unified identity platforms and API-first hooks into SaaS and cloud estates
Customer enablement emphasized through hands-on demos and reference architectures for rapid rollout
GRC, Audit & NIS2
NIS2 mapped to practical control sets and audit readiness with templates, workflows, and gap tracking
ISO 27001 alignment embedded into ticketing and policy lifecycles with evidence capture and reviewer signoff
Risk registers connected to asset and vulnerability data for live risk scoring and board-friendly reporting
Regulatory coverage extended to sector specifics with playbooks and auditor-facing exports
Automation pitched for recurring attestations, exceptions, and escalations to reduce manual overhead
OT & ICS Security
Asset discovery extended beyond IT into PLC and SCADA with passive fingerprinting and safe interrogation
Network segmentation and anomaly detection framed for brownfield plants with low disruption rollout plans
Playbooks connected plant alarms to SOC workflows with clear handoffs between OT and IT responders
Supplier and maintenance access governed through time-bound credentials and session recording
Emphasis on standards-minded deployments for critical infrastructure and regulated manufacturing
Cloud & Zero Trust
ZTNA and SASE positioned as direct VPN replacement with identity-aware policies and device signals
CNAPP and CSPM stitched into CI and runtime to close misconfigurations and exposed services
Data-aware controls added to microsegmentation and access paths to enforce least privilege at scale
Integrations showcased via API catalogs and event streams feeding SIEM, ticketing, and ITSM
Reference architectures highlighted for hybrid connectivity and phased migration patterns
Data Security & Backup
Ransomware resilience centered on immutable backups, clean room recovery, and rapid blast radius assessment
Key management, tokenization, and encryption used to enforce data minimization and safe sharing
DLP repositioned around context-aware policies spanning endpoints, email, SaaS, and cloud storage
Backup platforms added ransomware detection and automated restore testing to prove recoverability
Regulatory reporting supported by retention policies and tamper-evident audit trails
Threat Intelligence & DFIR
Intelligence feeds operationalized into detection pipelines with curated IOCs and behavior-driven analytics
Hunt workflows combined endpoint telemetry, identity events, and network traces for proactive discovery
Incident response playbooks templated for containment, forensics, and communications with clear RACI
Malware analysis insights distilled into YARA, Sigma, and threat hunt packages for reuse
Knowledge bases and case timelines structured for auditor-ready post-incident documentation
Endpoint & EDR
EDR tuned for signal-to-noise with behavioral detection and automatic containment on high-confidence events
Device posture checks routed to identity and network policies for dynamic access decisions
Vulnerability and configuration drift prioritized with guided remediation and maintenance windows
Offline protections and rollback emphasized for ransomware and destructive payloads
Unified agent stories positioned to reduce agent sprawl and simplify lifecycle management
Network & Email Security
Secure email gateways layered with impersonation, BEC, and payload detonation controls for modern lures
Web and DNS controls enforced acceptable use and command-and-control disruption at scale
Firewall and IDS capabilities aligned to app identity and user context for policy clarity
Threat intel sharing automated between perimeter, endpoint, and SIEM to tighten feedback loops
Post-delivery remediation workflows showcased for rapid purge and user safety prompts
Application & DevSecOps
SBOM generation and policy gates integrated into CI to block vulnerable components early
SAST, DAST, and SCA combined into unified findings with developer-ready fixes and prioritization
Secrets scanning and IaC checks enforced pre-commit and in pipelines to prevent drift
Runtime protection and API security added for microservices with positive security models
Developer enablement delivered via IDE plugins, secure blueprints, and paved road patterns
SIEM, SOAR & XDR
Content packs and use case libraries accelerated onboarding with mapped detections and KPIs
SOAR runbooks codified repetitive tasks and evidence handling to reduce MTTR
XDR tied identity, endpoint, email, and network signals into correlated incident stories
Cost and scale managed through data tiering, targeted ingestion, and lake integrations
Outcome metrics communicated through executive dashboards focused on dwell time and containment
Managed Security & MDR
Service tiers framed around measurable outcomes with clear SLAs and named playbooks
Co-managed models provided transparency with shared consoles and evidence-level access
Threat hunting offered as continuous service with periodic hypothesis-driven reports
Response retainers packaged with guaranteed surge capacity and on-site options
Onboarding accelerators emphasized data source activation and business context capture
AI in Security
AI assistants embedded in analyst workflows for triage drafting, enrichment, and query generation
LLM-powered search exposed incident context and root cause narratives from heterogeneous data
Guardrails highlighted for model safety, privacy, and provenance tracking in regulated environments
AI used to normalize alerts, reduce duplicates, and recommend next best actions with rationale
Human-in-the-loop validation positioned as mandatory checkpoint for high-impact decisions
Cross Fair Highlights
Platform consolidation with open APIs emerged as the dominant integration message
Compliance-first narratives translated regulation into implementable controls and evidence trails
Resilience by design focused on recovery proof points and operational continuity
Enablement through live demos, workshops, and reference architectures accelerated adoption
Partnerships showcased interoperability and packaged outcomes across identity, cloud, and SOC
Want to see the posts voices behind this summary?
This roundup brings you the Best of LinkedIn on it-sa Expo&Congress 2025.