The Brick House

The Brick House is a monthly panel discussion with GuidePoint Security’s CISO, Gary Brickhouse, and his expert guests examining the hottest topics in cybersecurity. No talking heads here, just honest conversations amongst security practitioners who have current, real-world experience solving the most complex cybersecurity challenges.

Our Upcoming Brick House Roundtables

JUly 23

CISO Partner Exclusive: Identity Outside the Lines

Top cybersecurity leaders from Delinea, GuidePoint Security, Ping and Saviynt join forces on “The Brick House CISO Partners Exclusive: Identity Outside the Lines.” to discuss critical Identity Management topics like AI, multi-cloud challenges, third-party risks and more. You won’t want to miss this important CISO discussion.

august 19

Identity First—Building & Sustaining a Resilient IAM Program in 2025

Discover how to build a resilient, future-proof identity program at our live webinar on August 19, 2025, at 12:00 PM EDT. Learn actionable strategies from field experts to tackle IAM challenges, integrate PAM seamlessly, and achieve continuous identity governance.

Coming Soon

August 26 | CISO Partner Special: Cloud+AI—What’s Real, What’s Hype and What’s Next
September 16 | Continuous Penetration Testing: Defending Against Modern Credential and Supply Chain Attacks
September 24 | CISO Partner Special: Strengthening Cyber Resilience in an AI-Driven World
October 14 | Cybersecurity Awareness Month
November 11 | SOC Security Development Evolution

Have an idea for a topic you would like The Brick House to cover? Let us know here.

The Brick House | On-Demand

The Brick House: Prioritizing Risks for Maximum Business Impact

Regulatory cybersecurity is no longer just a technical issue—it’s a business-critical risk. With evolving regulations, increased requirements and growing executive accountability, organizations must prioritize governance to protect their business, investors and reputation.

The Brick House: CNAPP for Modern Enterprises—Securing the Cloud

Cloud-Native Application Protection Platforms (CNAPP) are revolutionizing cloud security. Learn about multi-cloud operations, risk and enabling collaboration between security and development teams.

The Brick House: AI Governance Fundamentals for Compliance II

As AI becomes integral to business and cybersecurity, effective governance is critical. Join industry experts to learn more about responsible AI principles, risk management, compliance and the keys to a trustworthy AI framework.

The Brick House: Evolving Vulnerability Management with CTEM

Traditional Vulnerability Management (VM) practices are changing. Learn how CTEM enhances security functions like VM, AppSec and Cloud Security by prioritizing real threats and closing the remediation gap. Join our expert panel as they discuss evolving vulnerability management strategies.

The Brick House: AI Governance Fundamentals for Compliance & Security

As AI becomes integral to business and cybersecurity, effective governance is critical. Join industry experts to explore responsible AI principles, risk management, compliance and security strategies. Learn more about the keys to a trustworthy AI framework.

The Brick House: Identity Platform Convergence & the Future of Access Controls

Identity Platform Convergence transforms how organizations manage access controls and protect against cyber threats. Learn how a unified approach to identity governance, administration and privileged access can strengthen security across on-prem, hybrid and cloud environments.

Click here to explore all of The Brick House On-Demand episodes!

Meet the Brick House Host

Gary Brickhouse, CISO | LinkedIn

Gary Brickhouse is the CISO at GuidePoint Security. He is accountable
for overseeing the company’s information security program, which includes developing and
supporting the internal security architecture and control practices. In addition to hosting the Brick House series, he frequently speaks on a variety of information security topics at industry events and webinars.

For more educational content on a wide array of cybersecurity topics, challenges and recommendations, please visit our Resource Center.