The Brick House

The Brick House is a monthly panel discussion with GuidePoint Security’s CISO, Gary Brickhouse, and his expert guests examining the hottest topics in cybersecurity. No talking heads here, just honest conversations amongst security practitioners who have current, real-world experience solving the most complex cybersecurity challenges.

Our Upcoming Brick House Roundtables

august 19

Identity First—Building & Sustaining a Resilient IAM Program in 2025

Discover how to build a resilient, future-proof identity program at our live webinar on August 19, 2025, at 12:00pm EDT. Learn actionable strategies from field experts to tackle IAM challenges, integrate PAM seamlessly and achieve continuous identity governance.

August 26

The Brick House CISO Partner Exclusive: Cloud & AI—Practical Security Insights for a Changing Tech Landscape

Join this peer-led conversation hosted by GuidePoint Security, when expert voices from Abnormal Security, Cribl and Wiz  join forces to share real-world perspectives on how security leaders are approaching cloud complexity, AI adoption and the future of cybersecurity.

Coming Soon

September 16 | Continuous Pen Testing: Defending Against Modern Credential and Supply Chain Attacks
September 24 | CISO Partner Special: Strengthening Cyber Resilience in an AI-Driven World
October 14 | Cybersecurity Awareness Month—Incident Response and Threat Intelligence
November 11 | SOC Security Evolution—Leveraging Exposure Management Data

Have an idea for a topic you would like The Brick House to cover? Let us know here.

The Brick House | On-Demand

The Brick House CISO Partner Exclusive: Identity Outside the Lines

Top cybersecurity leaders from Delinea, GuidePoint Security, Ping and Saviynt join forces on “The Brick House CISO Partners Exclusive: Identity Outside the Lines.” to discuss critical Identity Management topics like AI, multi-cloud challenges, third-party risks and more. You won’t want to miss this important CISO discussion.

The Brick House: Prioritizing Risks for Maximum Business Impact

Regulatory cybersecurity is no longer just a technical issue—it’s a business-critical risk. With evolving regulations, increased requirements and growing executive accountability, organizations must prioritize governance to protect their business, investors and reputation.

The Brick House: CNAPP for Modern Enterprises—Securing the Cloud

Cloud-Native Application Protection Platforms (CNAPP) are revolutionizing cloud security. Learn about multi-cloud operations, risk and enabling collaboration between security and development teams.

The Brick House: AI Governance Fundamentals for Compliance II

As AI becomes integral to business and cybersecurity, effective governance is critical. Join industry experts to learn more about responsible AI principles, risk management, compliance and the keys to a trustworthy AI framework.

The Brick House: Evolving Vulnerability Management with CTEM

Traditional Vulnerability Management (VM) practices are changing. Learn how CTEM enhances security functions like VM, AppSec and Cloud Security by prioritizing real threats and closing the remediation gap. Join our expert panel as they discuss evolving vulnerability management strategies.

The Brick House: AI Governance Fundamentals for Compliance & Security

As AI becomes integral to business and cybersecurity, effective governance is critical. Join industry experts to explore responsible AI principles, risk management, compliance and security strategies. Learn more about the keys to a trustworthy AI framework.

Click here to explore all of The Brick House On-Demand episodes!

Meet the Brick House Host

Gary Brickhouse, CISO | LinkedIn

Gary Brickhouse is the CISO at GuidePoint Security. He is accountable
for overseeing the company’s information security program, which includes developing and
supporting the internal security architecture and control practices. In addition to hosting the Brick House series, he frequently speaks on a variety of information security topics at industry events and webinars.

For more educational content on a wide array of cybersecurity topics, challenges and recommendations, please visit our Resource Center.