انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
RSA Security CEO: Dangers of Weak Identity Security | CXOTalk #89
Manage episode 508271731 series 1431021
In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.
What you’ll learn:
-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires
-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it
-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps
-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction
-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification
-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense
-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness
Who should watch:
Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.
🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity
🔷 Newsletter: www.cxotalk.com/subscribe
🔷 LinkedIn: www.linkedin.com/company/cxotalk
🔷 Twitter: twitter.com/cxotalk
#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk
00:00 🔐 Understanding Identity in Cybersecurity
03:51 ⚠️ How Identity is Breached
10:46 🛡️ Improving Identity Security
13:03 🔒 Social Engineering and MFA Vulnerabilities
16:02 🛡️ Protecting Personal Information and Identity
19:43 👩💼 The Evolving Role of CISOs in Cybersecurity
26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity
28:51 🌐 Reframing Cybersecurity as Cyber Resilience
35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering
38:00 🤖 The Role of AI in Cybersecurity
41:59 💰 Economics of AI in Cybersecurity
44:25 🏢 Board-Level Cybersecurity Strategy
49:08 🛡️ Understanding Ransomware and Response Framework
50:56 🔒 RSA Security's Focus Areas for Cybersecurity
52:47 📢 Closing Remarks and Call to Action
535 حلقات
Manage episode 508271731 series 1431021
In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.
What you’ll learn:
-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires
-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it
-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps
-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction
-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification
-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense
-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness
Who should watch:
Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.
🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity
🔷 Newsletter: www.cxotalk.com/subscribe
🔷 LinkedIn: www.linkedin.com/company/cxotalk
🔷 Twitter: twitter.com/cxotalk
#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk
00:00 🔐 Understanding Identity in Cybersecurity
03:51 ⚠️ How Identity is Breached
10:46 🛡️ Improving Identity Security
13:03 🔒 Social Engineering and MFA Vulnerabilities
16:02 🛡️ Protecting Personal Information and Identity
19:43 👩💼 The Evolving Role of CISOs in Cybersecurity
26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity
28:51 🌐 Reframing Cybersecurity as Cyber Resilience
35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering
38:00 🤖 The Role of AI in Cybersecurity
41:59 💰 Economics of AI in Cybersecurity
44:25 🏢 Board-Level Cybersecurity Strategy
49:08 🛡️ Understanding Ransomware and Response Framework
50:56 🔒 RSA Security's Focus Areas for Cybersecurity
52:47 📢 Closing Remarks and Call to Action
535 حلقات
كل الحلقات
×مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.