The Waypoint: September 2025 Edition
GuidePoint Security • September 2025 Waypoint LinkedIn Newsletter

The Waypoint: September 2025 Edition

As we step into September 2025 and as we approach Q4, it’s a great moment to reflect on the year so far and anticipate what lies ahead. In this edition of The Waypoint, we explore the cybersecurity trends set to define the coming months, ranging from groundbreaking insights to information you need to know this pen testing season. Let’s get started.

ROADMAP

  • [Whitepaper] Identity & Access Management: How to Effectively Implement Privileged Access Management (PAM)

  • [Whitepaper] Pen Testing: From Compliance to Resilience: The Case for Purple Teaming

  • [Blogs] Read the Latest Insights and Analysis

  • The Security Frontier: Where to Find Us

  • R.S.V.P. for these Live/On-Demand Discussions

  • Contact Us


[Whitepaper] How to Effectively Implement Privileged Access Management (PAM)

Privileged accounts are a primary target for attackers in today’s cybersecurity landscape. This whitepaper explores essential insights to help you protect your organization, including:

  • The fundamentals of Privileged Access Management (PAM) and why it’s essential.

  • Common mistakes in PAM deployments—and how to steer clear of them.

  • Practical guidance on aligning your team and technology to strengthen security.

  • Proven strategies to deploy PAM effectively with minimal disruption.

  • Techniques to protect critical resources and prevent unauthorized access.

  • The importance of communication, empathy, and collaboration in ensuring a successful implementation.

Secure your organization with confidence and precision. Download The Paper

[Whitepaper] From Compliance to Resilience: The Case for Purple Teaming

What if your penetration tests actually made you stronger? Too often, organizations treat penetration testing as a once-a-year compliance exercise. But in today’s threat landscape, that’s not enough. Enter purple teaming: a proactive, collaborative approach that blends the offensive insights of red teams with the defensive readiness of blue teams. When done right, purple teaming doesn’t just check boxes—it builds real-world resilience. Read and share this new whitepaper to learn more. Download The Paper


The Latest Blogs from GuidePoint Security

Goodbye Legacy MFA: Be Ready for the new Microsoft Authentication Methods Policy

Microsoft’s legacy MFA support expires on September 30th. This post offers a practical guide to help Microsoft customers ensure that they’re ready for the switch to the new Microsoft Authentication Methods Policy. Read More.


How to Ruin a PAM Rollout in 3 Easy Steps (And What to Do Instead)

Done right, Privileged Access Management (PAM) reduces risk, improves audit readiness, and can even lower your cyber insurance premiums. This guide illustrates the most common mistakes organizations make during a PAM rollout, and gives practical advice to ensure their implementation delivers the best possible outcomes. Read more.


AI Moves Fast. Your Data Security Needs to Move Faster.

In this guest authored post, Ruchita Patankar, Content Marketing Manager at Cyera introduces the new reality of data security in the age of AI, and dives into how organizations can enable scalable, enforceable guardrails for how AI is used, without stifling innovation. Read more.


Choosing the Right Cloud Security Assessment: A Decision Maker’s Guide

It’s September, and that means yearly penetration tests are upon us. This guide helps security leaders make informed decisions as to the type of tests they need to not only check the compliance box, but to improve security posture for the coming year. Read more.



THE SECURITY FRONTIER: WHERE TO FIND US

GPSEC 2025 Premier Cybersecurity Conference Schedule

GPSEC is our premier 1-day security conference that brings together business executives, security professionals, consultants and innovative vendors in an intimate and interactive format. More than 10 GPSECs are planned for 2025 across the country. Learn about the GPSECs near you.


Upcoming Events

PCI North America Community Meeting

Proofpoint Protect

Okta Oktane

Events Coming Soon

  • FS-ISAC Americas Fall Summit | October 5-8 | Booth #29 | Scottsdale, AZ

  • NetDiligence Philly | October 6-8 | Silver Sponsorship | Philadelphia, PA | Happy Hour: October 6 | 6:00-8:00pm

  • Cloudflare Connect | October 13-16 | Booth | Las Vegas, NV

  • CriblCon | October 13-15 | Gold Sponsorship | Booth | National Harbor, MD


R.S.V.P. [LIVE + ON DEMAND TALKS]

Monthly Cybersecurity Live Talk with Cybersecurity Specialists

The Brick House CISO Partner Exclusive: Strengthening Cyber Resilience Through Unified Security in the AI-Driven World

September 24, 2025 | 12:00pm EDT

From automated phishing campaigns to deepfake-driven impersonation and accelerated attack chains, AI is reshaping the security landscape in real time. In this CISO Partner Exclusive series on The Brick House, GuidePoint Security brings together security leaders from CrowdStrike, Okta and Zscaler for a candid, one-hour roundtable on how to strengthen defenses in an AI-driven world. Register


The Brick House: Preparing for the Worst—Incident Response Planning

October 14, 2025 | 12:00pm EDT

Incident response plays a central role in an organization’s ability to manage risk, limit damage, and recover quickly from cyber incidents. But building a strong IR capability requires more than documentation—it takes deliberate planning, continuous testing, and flexible tools that teams can use under pressure.

In this session, GuidePoint Security’s incident response and threat intelligence leaders will explore how organizations can assess, exercise and evolve their IR capabilities to improve readiness and reduce response time when incidents occur. Register.


[On-Demand] The Brick House: Continuous Penetration Testing—Defending Against the Modern Threat Actor

Penetration testing and security validation have evolved far beyond traditional annual checkbox exercises. Join GuidePoint Security’s September Brick House roundtable to explore how leading organizations are using threat intelligence and Breach and Attack Simulation (BAS) to proactively assess their environments and sharpen their defenses. Watch


CONTACT US

GuidePoint Security 1900 Reston Metro Plaza, Suite 701 | Reston, VA 20190 |877- 889-0132

To view or add a comment, sign in

Explore content categories