Artwork

المحتوى المقدم من Michael Krigsman. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Michael Krigsman أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

RSA Security CEO: Dangers of Weak Identity Security | CXOTalk #89

53:38
 
مشاركة
 

Manage episode 508271731 series 1431021
المحتوى المقدم من Michael Krigsman. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Michael Krigsman أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.

What you’ll learn:

-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires

-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it

-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps

-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction

-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification

-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense

-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness

Who should watch:

Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.

🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity

🔷 Newsletter: www.cxotalk.com/subscribe

🔷 LinkedIn: www.linkedin.com/company/cxotalk

🔷 Twitter: twitter.com/cxotalk

#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk

00:00 🔐 Understanding Identity in Cybersecurity

03:51 ⚠️ How Identity is Breached

10:46 🛡️ Improving Identity Security

13:03 🔒 Social Engineering and MFA Vulnerabilities

16:02 🛡️ Protecting Personal Information and Identity

19:43 👩‍💼 The Evolving Role of CISOs in Cybersecurity

26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity

28:51 🌐 Reframing Cybersecurity as Cyber Resilience

35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering

38:00 🤖 The Role of AI in Cybersecurity

41:59 💰 Economics of AI in Cybersecurity

44:25 🏢 Board-Level Cybersecurity Strategy

49:08 🛡️ Understanding Ransomware and Response Framework

50:56 🔒 RSA Security's Focus Areas for Cybersecurity

52:47 📢 Closing Remarks and Call to Action

  continue reading

535 حلقات

Artwork
iconمشاركة
 
Manage episode 508271731 series 1431021
المحتوى المقدم من Michael Krigsman. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Michael Krigsman أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.

What you’ll learn:

-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires

-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it

-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps

-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction

-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification

-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense

-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness

Who should watch:

Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.

🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity

🔷 Newsletter: www.cxotalk.com/subscribe

🔷 LinkedIn: www.linkedin.com/company/cxotalk

🔷 Twitter: twitter.com/cxotalk

#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk

00:00 🔐 Understanding Identity in Cybersecurity

03:51 ⚠️ How Identity is Breached

10:46 🛡️ Improving Identity Security

13:03 🔒 Social Engineering and MFA Vulnerabilities

16:02 🛡️ Protecting Personal Information and Identity

19:43 👩‍💼 The Evolving Role of CISOs in Cybersecurity

26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity

28:51 🌐 Reframing Cybersecurity as Cyber Resilience

35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering

38:00 🤖 The Role of AI in Cybersecurity

41:59 💰 Economics of AI in Cybersecurity

44:25 🏢 Board-Level Cybersecurity Strategy

49:08 🛡️ Understanding Ransomware and Response Framework

50:56 🔒 RSA Security's Focus Areas for Cybersecurity

52:47 📢 Closing Remarks and Call to Action

  continue reading

535 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل