RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading

1
Intro to Building a Security Blueprint for Agents: Where to Start
18:11
18:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
18:11Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
…
continue reading
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
…
continue reading

1
Start with Story: What the RSAC Program Committee Wants to Hear About Today’s SOC Challenges
24:11
24:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:11The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
…
continue reading

1
Common Vulnerability Scoring System: Unpacking What's New in Version Four
19:33
19:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:33Every vulnerability announcement comes with a score. We’ve all seen them. We’ve all panicked when they are high. But where did that score come from, how was it calculated, and what is up with that string of random letters next to it? Those answers and more in this intro to where Common Vulnerability Scoring System (CVSS) scores come from, what's ne…
…
continue reading

1
Call for Speakers: Tips & Strategies
21:35
21:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:35Planning to submit a session proposal for the RSAC™ 2026 Conference? This podcast offers essential guidance on navigating the Call for Speakers (CFS) process. Join us as we speak with a Program Committee Member who will provide valuable tips and insights on crafting a compelling and innovative submission. Learn how to make your proposal stand out b…
…
continue reading

1
Courage and Resilience : Getting it, Keeping it, and Growing it
17:16
17:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:16Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on…
…
continue reading

1
Unmasking the Risks of Generative AI Deception
15:39
15:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:39Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
…
continue reading

1
Beyond Learning to Code: How to Get Kids Curious About Cybersecurity
24:04
24:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:04As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cyb…
…
continue reading
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place t…
…
continue reading

1
Third Party & Vendor Risk Management: The Program Committee's Perspective
29:09
29:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:09With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuab…
…
continue reading

1
Guiding the Guide: Influence in Crisis Mode
19:33
19:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:33This Podcast explores the essential skills needed to effectively influence leadership during a crisis. It begins by exploring different roles of crisis management and attendees will learn the importance of understanding what motivates the stakeholders and how aligning with these priorities enhances influence and explores the importance of building …
…
continue reading

1
Unpacking the Critical Infrastructure Track: A Committee Perspective
21:58
21:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:58In this Podcast, we're joined by the Critical Infrastructure Program Committees to discuss the exciting submissions they've received for RSAC 2025. We'll delve into the key trends they observed, what submissions stood out to them, and what they're most looking forward to experiencing at Conference. Tune in to hear valuable insights and reflections …
…
continue reading

1
Empowering Seniors: Practical Cybersecurity for the Digital Age
24:50
24:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:50Seniors face growing cyberthreats like phishing and identity theft. This session simplifies cybersecurity, offering practical tools and strategies to help older adults and their caregivers recognize and avoid scams. Attendees will gain clear, actionable steps to protect themselves and their loved ones from evolving online dangers.Speakers:Alex East…
…
continue reading

1
A Conversation with Our Security Strategy & Architecture Program Committee
24:11
24:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:11In today’s technological landscape, integrating AI into business operations presents both opportunities and complex security challenges. Our podcast will explore the importance of our Security Strategy and Architecture track, which examines robust security strategies from a diverse set of subject matter experts. We will cover foundational topics in…
…
continue reading

1
Behind the Scenes of the Hackers and Threats Track
26:52
26:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:52Yes, winter is here, and some may find this time of year unbearable. But on the bright side, we're approaching RSAC 2025. And as we approach April, we're excited to bring together the Hackers & Threats track Program Committee Members. Tune into this podcast as they'll disclose behind-the-scenes insights, what they've seen in their tracks, which ses…
…
continue reading

1
Father and Son, CISO and Psychologist: Navigating the Digital Age
29:36
29:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:36Richard Bird and Xavier Bird are father and son. Richard has spent 3 decades in technology and cybersecurity. Xavier, like most of Gen Z, is a digital native. He also happens to be a doctoral candidate in psychology who has focused his attention on adolescent counseling and the impact digital experiences have on the development of self-image among …
…
continue reading

1
Inside the RSAC Program Committee: Device Security & Accessibility
24:08
24:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:08As we approach RSAC 2025, we're excited to bring together the Program Committee Members (PCMs) from our Device Security & Accessibility track. Tune into this podcast to learn what Device Security and Accessibility means, what topics the PCs saw trending in the submissions, and what people can look forward to learning about at the Conference.Speaker…
…
continue reading

1
Jingle All the Way to Safety: Cyber Security Tips for the Holidays
22:19
22:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:19As the holidays approach, many are well into their shopping sprees. It's an exciting time to prepare for the holiday season and spend time with loved ones. However, with cyberattacks on the rise, we can expect a significant increase in cyberattacks during this season. Join this podcast to explore safety and security tips for online shoppers, learn …
…
continue reading

1
Cyber Resilience for SMEs: Practical Data Privacy and Security Strategies
19:25
19:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:25SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhanci…
…
continue reading

1
Governing AI Innovation: Balancing Ethics and Compliance
27:16
27:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:16As AI rapidly integrates into our lives, it presents both immense opportunities and significant risks. This podcast explores the urgent need for robust governance frameworks to ensure AI is used responsibly. We will delve into ethical guardrails, risk mitigation strategies, and best practices inspired by academic AI principles. Join us to discover …
…
continue reading

1
Election Security: Best Practices and Emerging Threats
20:48
20:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
20:48In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system.This podcast explores the critical issue of election secu…
…
continue reading

1
Securing Sovereignty: How Technology is Strengthening Tribal GC Elections
21:39
21:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:39Tribes are modernizing their Tribal General Council elections using cutting-edge technology. From traditional in-person voting to mobile platforms & blockchain-based systems, we discuss the security measures in place to ensure election integrity. Learn how Tribes are collaborating with MS-ISAC and EI-ISAC to prevent cyber threats, while also addres…
…
continue reading

1
Navigating the Evolving Threat Landscape: Cybersecurity in Retail and Fashion
16:09
16:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:09Join us for an in-depth discussion on the cybersecurity threats facing the retail and fashion industries. We'll explore the top trends for 2024 and 2025, including AI, e-commerce fraud, ransomware, and supply chain compromise. Our expert guest will share real-world examples of cyberattacks targeting the retail and fashion value chain, shedding ligh…
…
continue reading

1
The World of AI: Governance and Application
31:04
31:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:04Speakers:Arti Raman, CEO and Founder, Portal26Dane Sherrets, Senior Solutions Architect, HackerOneKacy Zurkus, Senior Content Manager, RSA ConferenceAI has been implemented in almost every organization and AI governance helps ensure that AI is being used ethically and unbiasedly. We will explore the multifaceted world of AI, focusing on governance …
…
continue reading

1
Elevate & Innovate: Success Tips for Women Entrepreneurs
17:31
17:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:31Join us for an insightful discussion featuring one of our Program Committee members as she shares her experiences in building a startup. Inspiring women entrepreneurs to take risks demands that we also help them navigate the sometimes-tumultuous path to securing funding. We'll talk about what makes a successful pitch and how to engage with potentia…
…
continue reading

1
RSAC 2025: Call for Submissions Tips
21:55
21:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:55Summer is coming to an end and fall is approaching, which means RSAC 2025 Call for Submissions will be opening soon. Each year, RSA Conference receives an incredible amount of submissions from speakers globally, but what makes a submission stand out to the Program Committee? As you explore topics and ideas, we want to share some helpful tips to kee…
…
continue reading

1
Secure by Design: Transforming the Software Security Landscape
24:29
24:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:29Secure by design has many core principles, including manufacturer accountability, radical transparency, and leadership-driven security prioritization. Secure by design is critical for organizations as it minimizes risks and vulnerabilities within an enterprise. Join us as we discuss a transformative approach to software development and cybersecurit…
…
continue reading

1
Healthcare Cybersecurity: The Intersection of Patient Safety & Clinical Resiliency
29:50
29:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:50Healthcare sectors need to implement a strong cybersecurity team, proactive strategies, and security awareness training, but how do they do that while prioritizing patient care? Enter the need for clinical resiliency. Join this podcast to learn actionable takeaways for building a team medical providers who also understand both the impact of cyberat…
…
continue reading

1
Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes
23:05
23:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:05Drones are becoming more common in skies around the world. While the initial reaction seems to be focused on privacy concerns, which are very valid, there should also be a higher focus on what someone can do with a relatively lightweight drone. Having it carry a hacking device or it being a hacking device itself is something that has not been talke…
…
continue reading

1
The CISA Zero Trust Maturity Model and the Five Pillars in Practice
18:44
18:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
18:44In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to learn how to use and adapt CISA Zero Trust Maturity Model and it’s five security pillars in practice. Join this podcast to hear real-world examples of challenges, benefits, and approaches about the model.Speakers:Jason Garbis, President, Numberl…
…
continue reading

1
The Fundamentals: Policymakers on Cybersecurity
14:01
14:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:01In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to hear about the educational resources on cybersecurity fundamentals that policymakers need to keep up in the rapidly changing regulatory environment. Learn how preparing them will support strong policies and equitable participation in the global …
…
continue reading

1
The Impact of AI for Cybersecurity on the Healthcare Sector
34:45
34:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:45In today’s digital world, organizations are increasingly impacted by AI for the good and bad. AI is being used in the healthcare industry for a variety of reasons. Despite AI being a resource for the healthcare sector it also comes with challenges. Join this podcast as we discuss: • How the healthcare can prepare for combatting AI-driven cyber thre…
…
continue reading

1
Shielding Small Businesses: Tips for Defending Against Cyber Threats
17:35
17:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:35We engage in a dynamic discussion our guests who will share their experiences in cyber and thoughts on the cyber risks for small businesses where there is a crucial gap in the cybersecurity market. Focusing on the unmet needs of small businesses, guests will discuss the importance of providing support and solutions tailored to this underserved sect…
…
continue reading

1
Inclusion Research: Women in CyberSecurity (WiCyS)
20:05
20:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
20:05Diversity, Equity, and Inclusion (DEI) has long been talked about in an effort to diversify the workforce, but what are organizations really doing to change organizational culture. Understanding different perspectives on inclusion is key to informing how to create effective change to help attract and retain talent. Join this podcast to learn about …
…
continue reading

1
DevSecOps Insights and Exciting Horizons
25:29
25:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:29Tune in as RSAC 2024 DevSecOps Program Committee Members discuss the trends pulled out from the DevSecOps track. Join this podcast to hear the latest trends, their significance, and what track submissions are telling us about today’s cybersecurity landscape and much more.Speakers:Akira Brand, Application Security Engineer, Akira Brand ConsultingJen…
…
continue reading

1
Changing the End Game: AI-Powered Security Solutions
25:07
25:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:07How can we ensure we drive product security from the get go? How can we provide security assurance throughout the protect detect and response lifecycle of our services and solutions? How can AI empower our defenders? Leaders from Microsoft and Google will share insights on how AI can improve security efficiencies for the entire product lifecycle. W…
…
continue reading

1
Neglected Essentials: The Overlooked Basics of Cloud Security
19:03
19:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:03This podcast shares research that reveals how many of the most common cloud security risks—despite being tied to basic security guidelines such as the Principle of Least Privilege—are widely overlooked in organizations of all sizes, even in those with a high maturity level in terms of cloud security. We'll explain why that is and investigate approa…
…
continue reading
Many organizations have fallen victim to data breaches and exposure. It is crucial to strengthen security as the rise of cyberattacks increases. What are some strong measurements to reduce the risk of data exposure? Join the RSAC 2024 Governance, Risk, and Compliance Program committee as they discuss what decision-makers need to think about from a …
…
continue reading
Protecting data is a critical key when developing products, systems, or services. What are some privacy measures to consider? Join us for a discussion on the overview of Privacy By Design and how to implement it into practice.Speakers:Kim Wuyts, Manager Cyber & Privacy, PwC BelgiumTatyana Sanchez, Content and Programming Coordinator, RSAC…
…
continue reading

1
What's Trending in Privacy & Data Protection?
29:37
29:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:37With differing privacy approaches that expand many geographies, more organizations are focused on building a strong privacy program. Is it time for Privacy by Design? And where exactly is the intersection between privacy and security? Join the RSAC 2024 Privacy & Data Protection Program Committee for insights into why privacy was a strong trend in …
…
continue reading
What does the cybersecurity workforce of the future looks like, and more importantly, how do we get there? Join us for a discussion on embracing the resilience and brilliance of black women is cyber, all part of the Black Women in Cyber Collective, who are working to protect our privacy and secure our world while also fostering opportunities to exp…
…
continue reading
Recent studies have found that SMS users increasingly do not trust the confidentiality and integrity of SMS, with users also reporting that they can not trust the true identity of the sender. Cybercriminals are able to exploit the weaknesses of this authentication tool, yet it continues to be a technology widely used and relied upon for perceived s…
…
continue reading

1
You Can’t Have Zero Trust Without API Security
20:06
20:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
20:06Zero Trust Security is often associated with network access and identity access management. However, while those solutions are important and necessary, the evolution in infrastructure and the onset of new attack surfaces require us to expand our perspective and include the API layer in security strategies. Join this podcast to hear industry influen…
…
continue reading

1
The Great Debate of a Cybersecurity Skills Gap
27:21
27:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:21For years, the cybersecurity industry has supported the narrative that there is a major skills gap, but some have been questioning whether the issues is an actual dearth of qualified candidates who possess the skills needed to fill open roles or an abundance of candidates with some transferable skills who aren't being given an opportunity to gain e…
…
continue reading

1
Cybersecurity Community: Fortifying Defense Through Education and Sharing
13:03
13:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:03Cyber leaders are unique in their necessity to share. Building community, leveraging best practices with organizations in the same industry is paramount to successfully protecting from threats. This podcast will delve into the world of the cybersecurity community and share some strategies, technologies, and best practices that CISOs can use to enha…
…
continue reading

1
Misconfigurations and the Business Implications of AI
17:26
17:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:26In the race to develop the most powerful generative AI tools, businesses must take steps to avoid the inherent risks of this emerging tech. AI involves sharing massive quantities of data, so even a single misconfiguration can have serious repercussions. What are the new risks and broader business implications of AI that arise as organizations ventu…
…
continue reading

1
Threat Modeling - Using the DIPP Method (Detect, Identify, Protect, Prevent)
16:38
16:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:38Threat modeling is a process that is essential for organizations to use to combat threats, and for mitigating risks. Threat intelligence is a component that can be applied as a method for use with threat modeling to ensure that all risks and vulnerabilities are being properly assessed and techniques are used to protect assets. In this podcast, we'l…
…
continue reading

1
Security Testing at Scale for Cloud Native Technology
17:40
17:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:40Cyberattacks have been growing in frequency and severity over the past decade and have increased exponentially with the adoption of cloud-native technology. The pressure is on for organizations to prioritize building and implementing a security testing strategy to avoid becoming the latest cyberattack headline.Speakers:Caroline Wong, Chief Strategy…
…
continue reading

1
Avoiding Costly Toolset Purchase and Resource Spend for Enterprise-Wide Threat Modeling
16:46
16:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:46Threat modeling at an enterprise scale can be costly to implement, scale and maintain, but there are ways in which you can curtail spend in two key areas – threat modeling toolsets cost and resourcing cost. This podcast will discus key spend considerations including purchase model for OOTB software and services as well as resource allocation and re…
…
continue reading

1
How to Be a Threat Modeling Subject Matter Expert
14:26
14:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:26What is threat modeling and where does it fit in to the overall development process? In this podcast, we'll discuss what threat modeling is, when threat modeling activities are essential, and the skills needed to become a threat modeling expert.Speakers:Ashwini Siddhi, Senior Principal Product Security Advisor, Dell TechnologiesKacy Zurkus, Senior …
…
continue reading