Discover
RSAC
RSAC
Author: RSAC
Subscribed: 138Played: 1,417Subscribe
Share
© All rights reserved
Description
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
203 Episodes
Reverse
AI-powered impersonation and deepfakes are no longer theoretical—they are changing how trust works in real time. This discussion explores how industry and government can use existing legal frameworks, shared standards, and regulatory intent to move from abstract concern to concrete action, making trust, verification, and accountability explicit as deepfake-driven risk accelerates.
Clarissa Cerda, Chief Legal Officer and Corporate Secretary, Pindrop Security
Stefanie Fogel, Partner & Vice Chair, Markets & Sectors, DLA Piper
Tatyana Sanchez, Senior Content Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
For years, information security was largely centered on protecting confidentiality. But as our world becomes more digital and increasingly dependent on always-available, trustworthy systems, integrity and availability are taking on equal importance. In this episode of Cyber at the Top, Dr. Hugh Thompson is joined by Bjørn Watne, Global CISO of INTERPOL, to explore how this shift is changing the way security leaders think about risk. Together, they discuss why disruption is becoming a defining threat, how emerging technologies are reshaping security priorities, and what it means to balance all three pillars of information security. The conversation offers a thoughtful look at how CISOs can reframe security as a driver of resilience, reliability, and organizational trust.
Keeping up with the laws and regulations in all the different jurisdictions relevant for your business already feels overwhelming. In this RSAC podcast, we are excited to be joined by two members of the RSAC Program Committee, who will simplify the tangle by highlighting the most important elements of the global legal and regulatory landscape for the cybersecurity community. Tune into this podcast as we explore how organizations can stay ahead of these changes and highlight the key sessions attendees can look forward to regarding regulations at the upcoming RSAC 2026 Conference.
Speakers:
John Elliott, Principal Consultant, Withoutfire
Laura Koetzle, Head of Community Research, RSAC
Tatyana Sanchez, Senior Coordinator, Content & Programming, RSAC
Kacy Zurkus, Director, Content, RSAC
As digital ecosystems expand, third-party relationships have become both business enablers and critical sources of cyber risk. In this episode, T.J. Patterson, VP and Information Security Officer at STAR Financial Bank, joins Dr. Hugh Thompson to explore how CISOs can navigate the growing complexity of third-party risk management. They discuss practical methods for identifying and prioritizing high-risk vendors, maintaining visibility beyond initial assessments, and driving accountability across the supply chain. From regulatory shifts to the limits of automation, this conversation offers actionable strategies for managing risk at scale.
The use of AI has weakened many of us in the areas of critical thinking and emotional intelligence. We are enticed by the speed of AI responses to our problems but it is our neural pathways that are stunted in growth due to the lack of usage. Tune into this podcast to learn how to bridge neuroscience, emotional and artificial intelligence to enhance and understand how to optimize. This podcast will drawn on the speaker’s research results in how we can effectively use AI to assist us in our professional and even personal lives while keeping our brains exercised.
Nancy Yuen, Sr. Director of Global SOX and Audit Compliance, SoFi Technologies
Tatyana Sanchez, Senior Coordinator, Content & Programming, RSAC
Kacy Zurkus, Director of Content, RSAC
Bridging the gap between cybersecurity and business priorities starts with a common language that explains risk in terms business leaders can relate to. In this episode, Mathias Buecherl, Group CISO at Heidelberg Materials, joins Dr. Hugh Thompson to explore how data-driven measurement is reshaping how organizations communicate, prioritize, and invest in security. They discuss why standardized metrics matter, how to translate cyber threats into financial and business terms, and what it takes to gain executive buy-in. From overcoming resistance to applying financial rigor to building maturity over time, this conversation offers a roadmap for making cyber risk measurable and meaningful.
AI is a friend, but it can be a terrible foe when not properly used. In cybersecurity, we also see AI as an enabler of cyber-criminal activities and security errors. In this podcast, we will focus on what you need to know to defend your enterprise against AI-enabled cyberattacks. We will also discuss how to protect yourself and your company against errors caused by the improper use of AI.
Alex Holden, CISO, Hold Security, LLC
Tatyana Sanchez, Content & Program Coordinator, RSAC
From busy showroom floors to hyped up vendor marketing claims, security leaders are constantly asked to choose the “right” cybersecurity partner. In this episode, Dr. Hugh Thompson sits down with Tal Arad, former CTO and Group CISO at Carlsberg Group, to unpack how security leaders can cut through the noise and build partnerships that strengthen their organizations. Drawing on his experience, Tal explores how to determine whether a solution truly addresses a real problem, why early technical discussions and proofs of concept matter, and what signals indicate a vendor can be a trusted partner. Ultimately, this episode offers a practical, experience-driven playbook for CISOs looking to choose partners they’ll still trust and want to work with years down the road.
Traditional network security has evolved, and security teams are challenged to understand data flows and how to use AI to help manage modern infrastructures and communications. Whether you are looking to increase resilience, streamline operations, or navigate the challenges of API abuse, RSAC 2026 Conference will help you navigate the shifting threat landscape of Network & Communications Security. Join this podcast to hear more about upcoming sessions you won’t want to miss.
Chuck Kesler, Chief Infromation Security Officer, Pendo.io
Jennifer Minella, Principal Security Advisor, Viszen Security | CISO Launch
Lenny Zeltser, CISO, Axonius
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
Zero Trust has become one of the most talked-about frameworks in cybersecurity, but what does it really look like in practice at global scale? And how is it being reshaped by the rise of artificial intelligence? In this episode, Mastercard’s Deputy Chief Security Officer, Alissa “Dr. Jay” Abdullah joins Dr. Hugh Thompson to discuss how Zero Trust is evolving in the age of AI. They explore what it takes to build the right foundation, how to measure progress, and what it takes to align business leaders around the vision. From scaling strategy across a global enterprise to applying Zero Trust principles to AI systems themselves, this conversation unpacks how innovation and security can move forward together.
Most organizations ask questions like, “How do I get ahead of my vulnerabilities?” The reality is we need practical guidance to move past vulnerability debt and start driving risk reduction. With good implementation, modern concepts like CTEM offer an opportunity. Tune into this podcast as we will explore how to shift from counting vulnerabilities to managing what truly matters, so organizations can prioritize, act, and finally get ahead.
Steve Ocepek, General Manager, Kroll
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
As 5G, IoT, and edge networks expand, secure connectivity defines digital trust. This session presents a practical roadmap for building resilience and governance into connected ecosystems. Using the proven CPD framework, this podcast will explore how leaders can embed commitment, preparedness, and discipline to ensure trust continuity.
Dave Chatterjee, Visiting Professor, Pratt School of Engineering, Duke University
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
As physical and digital threats collide, converged security models that unite physical and cyber protections under one strategy are becoming more essential. John Scimone, Chief Security Officer for Dell Technologies, offers guidance for CISOs looking to bridge physical and cyber security into one cohesive strategy.
AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional frameworks to govern, protect, and respond to these powerful, autonomous systems? Join this RSAC podcast with authors of the groundbreaking book, “Securing AI Agents – Foundations, Frameworks, and Real-World Deployment." who will cut through the hype to provide a practical, actionable guide for CISOs, security architects, and AI developers.
Ken Huang, CEO, DistributedApps.ai
Chris Hughes, Co-Founder & President, Aquai
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading organizations stay prepared for the threats ahead.
According to recent research, the average age within cybercrime is 19 years old. This trend highlights the urgent concern over the rise of youth cybercrime. The pathway into youth cybercrime has dramatically widened, fueled by platforms like gaming communities, online forums, new communication tools, and the growing accessibility of AI tools. This podcast will take you inside the evolving world of young cyber offenders. We’ll explore the evolution of youth cybercrime, examining how the youth are initially drawn into these activities, the tactics they employ, and the solutions to intervene.
Zino Haro, Co-Founder, Youth for Privacy
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
Organizations invest heavily in securing systems but often overlook protecting the people using those systems. Security teams need to shift from blame and bureacuracy to connecting with users and developers to understand the workflows and the reoccuring mistakes. Tune into this podcast to learn how security teams can become champions of solutions that are not just technically sound but human-friendly and sustainable.
Dwayne McDaniel, Developer Advocate, GitGuardian
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve into the history and transformation of Cybersecurity Awareness Month to help boost your security awareness.
Lisa Plaggemier, Executive Director, National Cybersecurity Alliance
Cliff Steinhauer, Director, Information Security & Engagement National Cybersecurity Alliance
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
Organizations often spend a lot of time ensuring they're complying with cybersecurity standards and regulations, but often, accessibility standards are overlooked. Accessibility, in a sense, starts with compliance as well. However, cybersecurity vendors, platforms, and programs often don't know these standards exist, don't know the legal ramifications of not adhering to them, and don't know how to even begin to make the necessary changes. Tune into this podcast to learn how to bridge the gap between accessibility and cybersecurity.
Florian Beijers, Accessibility Expert, Dexxit
Tatyana Sanchez, Content & Program Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC
Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tune into this podcast to get a security blueprint when building agents.
Manish Kumar Yadav, Principal Security Architect, SAP
Jim Rotan, VP, Head of Application Security & Automation, SAP
Tatyana Sanchez, Content and Programming Coordinator, RSAC
Kacy Zurkus, Director, Content, RSAC








