Go back

Material's take on RSA 2024

If you attended RSA this year, you got to experience the conference in full swing! From the airport to the hotels, San Francisco was full to the brim with security folks. As always, the expo floor was a vast sea of booths and badge scanners. Instead of making an appearance inside of the Moscone Center, Material set up shop around the corner. This allowed us to invite people into a relaxed space for a cup of coffee, quick product demos, or 1:1 meetings with our executive team. We spoke with some Material team members that attended RSA to get their take on what was most successful and what insights they gathered from their conversations.

Industry Insights
May 16, 2024
3m read
3m read
3m listen
3m watch
3m watch
Material's take on RSA 2024 in a blue background
speakers
speakers
speakers
authors
Material Team
participants
No items found.
share

If you attended RSA this year, you got to experience the conference in full swing! From the airport to the hotels, San Francisco was full to the brim with security folks. As always, the expo floor was a vast sea of booths and badge scanners. Instead of making an appearance inside of the Moscone Center, Material set up shop around the corner. This allowed us to invite people into a relaxed space for a cup of coffee, quick product demos, or 1:1 meetings with our executive team. We spoke with some Material team members that attended RSA to get their take on what was most successful and what insights they gathered from their conversations.

material team picture
material publicity
“This was my first time attending RSA, and it didn’t disappoint! I had the opportunity to meet so many different people in the security space, and I loved that Material opted for our own dedicated space. Our pop-up lounge allowed for even more interaction and insightful conversations with those who were looking to learn more about our holistic approach to email security. It was such an awesome experience.” - Marina Remick, Solutions Engineer

Material's take on RSA 2024 - talk
“I think this was my 10th RSA and was so excited to offer a place for people outside of the crowded show floor. Not only were we able to have meaningful conversations with people curious about our solutions, but I also loved that the Material team was able to bond at the conference. Preparing for RSA is really collaborative and also kicks off a lot of momentum around events for the rest of the year.” - Lexy Marchbank, Director of Field Marketing
Material's take on RSA 2024 - conversation
“People loved that they were getting a tailored demo based on what they were sharing with me, and especially in a world where we’re primarily meeting with folks over Zoom, there is nothing better than getting to demo in-person over a cup of coffee. I could tell each person I talked to appreciated that experience as well. A lot of the people I spoke with were quick to call out why Material is better than traditional email security, and I think that really confirmed our belief that there’s a huge opportunity to continue disrupting this space and provide better email protection than what’s been offered historically by other solutions.” - Marina Remick, Solutions Engineer

Our swag booth this year was also a big hit! We returned with some of our most popular items, like our “don’t email me” hat and shirts, and also added some more limited edition items, including a “gone phishing” hat and “attachment issues” bag. We still have some “don’t email me” shirts in stock. If you’re interested in grabbing one for yourself, you can request one here!

Material's take on RSA 2024 - hat

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
blog post

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Patrick Duffy
5
m read
Read post
Podcast

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen to episode
Video

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m watch
Watch video
Downloads

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Watch video
Webinar

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen episode
blog post

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

Rajan Kapoor, VP, Security
3
m read
Read post
Podcast

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen to episode
Video

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m watch
Watch video
Downloads

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Watch video
Webinar

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New