Wizdom USA 2025

November 3rd - November 6th 2025
New York, NY

Wizdom USA 2025 brought together cloud security leaders and practitioners to discuss the latest trends in cloud protection, threat detection, and infrastructure security. The event highlighted real-world insights, innovations, and best practices shaping the future of cloud and DevSecOps.

Wizdom USA 2025

Wizdom USA 2025 recap

Wizdom USA 2025 was Wiz's flagship North American user conference — a focused gathering of CISOs, cloud security architects, and DevSecOps leaders running Wiz to secure their cloud and Kubernetes environments. The US edition draws the largest concentration of Wiz's enterprise customer base, with Fortune 500 security leaders, federal-market-bound technology companies, and the major cloud-native enterprises shaping how cloud security is practiced.

The program combined customer-led sessions, deep product roadmap content, and practitioner workshops covering the full spectrum of cloud security — from CSPM and CIEM to container, Kubernetes, AI workload, and code-to-cloud security. The thread that connected everything was operational: how do security teams actually drive remediation across the engineering teams who own the workloads?

Echo at Wizdom USA 2025

Wiz customers are unusually clear-eyed about where their time goes. CVE findings on container images are one of the largest categories of work that flow through their Wiz instances — and one of the most frustrating, because the underlying vulnerabilities are usually in upstream packages the customer did not write and cannot easily patch.

Echo turns that input off. Every Echo image ships CVE-free, with continuous rebuilds against patched upstream sources, full SBOM transparency, and signed provenance. For Wiz customers, that means the cloud security graph stops getting flooded with findings that are not really their team's findings to fix — and the actual signal Wiz surfaces (misconfigurations, identity exposure, lateral movement risk) gets the attention it deserves.

We had particularly substantive conversations with the FedRAMP-bound and regulated-industry attendees. Echo's FIPS-validated cryptographic modules across OpenSSL, BoringCrypto, and Bouncy Castle, STIG-hardened image baselines, and continuous-monitoring outputs map directly to the controls these teams have to demonstrate. The Varonis FedRAMP case study — zero vulnerabilities at audit, after running Echo through the program — was a recurring reference point.

Highlights from Wizdom USA 2025

Customer keynotes from major Wiz enterprise users delivered the most-cited content of the event — concrete stories about driving down cloud security risk, structuring remediation operating models, and getting engineering teams to act on findings. AI workload security and Kubernetes attack surface management were the dominant technical themes, with multiple sessions exploring how the threat model has shifted as AI systems become first-class workloads in cloud environments.

Roadmap content reinforced Wiz's focus on context and prioritization — making sure the findings that surface are the ones that actually matter, with the supporting evidence to drive cross-team action. That focus aligned naturally with Echo's role as an upstream input that reduces the volume of low-context findings in the first place.

The Wizdom USA audience

Wizdom USA is a customer-only event, which produces a uniquely productive audience: every person in the room is already running the same security platform, speaking the same vocabulary, and working through similar operating challenges. Booth conversations consistently went deeper, faster, than they do at broader industry shows. For Echo, this was one of the highest-conversion-quality events of the year.

Connect with Echo

If you are running Wiz and your container security findings are dominating your remediation backlog, Echo is the upstream fix. Reach out and we will run a focused evaluation on a representative slice of your image inventory and show you what your Wiz dashboards look like when the inputs are clean.