Go back

Material's take on RSA 2024

If you attended RSA this year, you got to experience the conference in full swing! From the airport to the hotels, San Francisco was full to the brim with security folks. As always, the expo floor was a vast sea of booths and badge scanners. Instead of making an appearance inside of the Moscone Center, Material set up shop around the corner. This allowed us to invite people into a relaxed space for a cup of coffee, quick product demos, or 1:1 meetings with our executive team. We spoke with some Material team members that attended RSA to get their take on what was most successful and what insights they gathered from their conversations.

Industry Insights
May 16, 2024
3m read
3m read
3m listen
3m watch
3m watch
Material's take on RSA 2024 in a blue background
speakers
speakers
speakers
authors
Material Team
participants
No items found.
share

If you attended RSA this year, you got to experience the conference in full swing! From the airport to the hotels, San Francisco was full to the brim with security folks. As always, the expo floor was a vast sea of booths and badge scanners. Instead of making an appearance inside of the Moscone Center, Material set up shop around the corner. This allowed us to invite people into a relaxed space for a cup of coffee, quick product demos, or 1:1 meetings with our executive team. We spoke with some Material team members that attended RSA to get their take on what was most successful and what insights they gathered from their conversations.

material team picture
material publicity
“This was my first time attending RSA, and it didn’t disappoint! I had the opportunity to meet so many different people in the security space, and I loved that Material opted for our own dedicated space. Our pop-up lounge allowed for even more interaction and insightful conversations with those who were looking to learn more about our holistic approach to email security. It was such an awesome experience.” - Marina Remick, Solutions Engineer

Material's take on RSA 2024 - talk
“I think this was my 10th RSA and was so excited to offer a place for people outside of the crowded show floor. Not only were we able to have meaningful conversations with people curious about our solutions, but I also loved that the Material team was able to bond at the conference. Preparing for RSA is really collaborative and also kicks off a lot of momentum around events for the rest of the year.” - Lexy Marchbank, Director of Field Marketing
Material's take on RSA 2024 - conversation
“People loved that they were getting a tailored demo based on what they were sharing with me, and especially in a world where we’re primarily meeting with folks over Zoom, there is nothing better than getting to demo in-person over a cup of coffee. I could tell each person I talked to appreciated that experience as well. A lot of the people I spoke with were quick to call out why Material is better than traditional email security, and I think that really confirmed our belief that there’s a huge opportunity to continue disrupting this space and provide better email protection than what’s been offered historically by other solutions.” - Marina Remick, Solutions Engineer

Our swag booth this year was also a big hit! We returned with some of our most popular items, like our “don’t email me” hat and shirts, and also added some more limited edition items, including a “gone phishing” hat and “attachment issues” bag. We still have some “don’t email me” shirts in stock. If you’re interested in grabbing one for yourself, you can request one here!

Material's take on RSA 2024 - hat

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Kate Hutchinson
4
m read
Read post
Podcast

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen to episode
Video

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m watch
Watch video
Downloads

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Watch video
Webinar

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

4
m listen
Listen episode
blog post

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

Rajan Kapoor, VP, Security
10
m read
Read post
Podcast

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen to episode
Video

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m watch
Watch video
Downloads

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Watch video
Webinar

The Emerging Attack Surface: Your Cloud Workspace

The evolving attack surface of the cloud workspace, driven by shifts away from traditional phishing, necessitates applying established endpoint security frameworks—Posture, Data, and Access—to effectively manage new vectors like OAuth and API keys.

10
m listen
Listen episode
blog post

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

Nora Donnay
10
m read
Read post
Podcast

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen to episode
Video

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m watch
Watch video
Downloads

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Watch video
Webinar

Clarifying Complexity Through Design

Material Security's design philosophy focuses on transforming complex security data into actionable signal by removing unnecessary friction and providing clear visualizations.

10
m listen
Listen episode
blog post

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

Kate Hutchinson
4
m read
Read post
Podcast

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen to episode
Video

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m watch
Watch video
Downloads

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Watch video
Webinar

Hack Week in the Age of AI Agents: What Happens When You Give Smart People Smart Tools

Material Security’s Hack Week in February 2026 focused on the productivity that’s unlocked by working with AI agents

4
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New