RSAC 2024: Top 10 Use Cases for Data Security Posture ManagementRSAC 2024: Top 10 Use Cases for Data Security Posture Management

Vamsi Koduru, director of product management at Normalyze, and independent cyber researcher Abhinav Singh join Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss why you should be using data security posture management (DSPM) to reduce risk and build resilience for your organizations.

Informa Tech

Vamsi Koduru, director of product management at Normalyze, and independent cyber researcher Abhinav Singh join Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss why you should be using data security posture management (DSPM) to reduce risk and build resilience for your organization. Jointly, they address how DSPM impacts AI applications, enhances zero-trust frameworks, and simplifies cloud migration projects, to name a few. They also point to DSPM’s ability to perform risk quantification to get a better handle on what various security incidents can cost an organization.

Vamsi Koduru is the Director of Product Management at Normalyze, where he applies his passion for disruptive innovation to drive product development and scale solutions that are game-changers in the data security space. With a rich background in AML/KYC, virtual assistants, conversational design, and identities, Vamsi is known for his out-of-the-box thinking and leadership in navigating complex product ecosystems.

A proven leader, Vamsi is known for his entrepreneurial mindset, data-driven insights, roadmap development, and go-to-market strategies. Before joining Normalyze, Vamsi co-managed Stealth Vc and directed product management at Basis Technology. He also co-founded Quantiply Corporation, where he was pivotal in guiding product strategy and innovation.

Abhinav Singh is a cybersecurity researcher with a decade long experience working for global leaders in security technology, financial institutions, and as an independent trainer/consultant. He is the author of Metasploit Penetration Testing Cookbook (first, second, and third editions) and Instant Wireshark Starter by Packt.

He is an active contributor to the security community in the form of patents, open-source tools, paper publications, articles, and blogs. His work has been quoted in several security and privacy magazines and digital portals. He is a frequent speaker and trainer at eminent international conferences like Black Hat, RSAC and Defcon. His areas of expertise include malware research, reverse engineering, enterprise security, forensics, and cloud security.

About the Author

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights