Full Show Notes
Segment One

RSAC 2026 Day 3: AI in SOC, Cyber Trends & The Truth About Agentic AI – RSAC26 #3

Key Moments
  • 0:00 - – RSAC 2026 Day 3 Kickoff & Overview
  • 0:37 - – Conference Fatigue, Voice Strain & RSAC Reality
  • 01:26 - – Whiskey Tastings & Networking at RSAC
  • 01:30 - – 451 Research Insights: Cybersecurity Market Trends
  • 02:10 - – Why 2026 May Be a Down Year for Cyber M&A
  • 02:45 - – AI in the SOC: Hype vs Reality
  • 03:13 - – Why Security Teams Hesitate to Trust AI
  • 04:38 - – Risks of Blindly Adopting AI Tools
  • 04:58 - – The “Lemonade Problem” in Cybersecurity Data
  • 06:07 - – Data Quality Issues in Security Tools Explained
  • 06:57 - – Moving from Promise-Based to Evidence-Based Security
  • 07:39 - – Measuring Security ROI: Is Your Tool Actually Working?
  • 09:06 - – AI, Tech Debt & The Hidden Cost of Innovation
  • 10:29 - – Will AI Replace Jobs or Change Them?
  • 11:22 - – AI as an Assistant vs Decision-Maker
  • 11:59 - – RSA Trends: Why AI Dominates Again in 2026
  • 13:01 - – What Will Replace AI as the Top Trend?
  • 13:35 - – Agentic AI & the Rise of AI Identities
  • 14:41 - – Reputation vs Identity in AI Security
  • 14:56 - – 2026: The “Prove Value or Fail” Year for AI
  • 15:21 - – Budget Pressure & End of Experimental AI Spending
  • 15:54 - – Why “Agentic AI” Is Everywhere (And What It Means)
  • 16:28 - – The Real Cybersecurity Threat: Uncertainty
Segment Two

Beyond the Audit: Making Cyber Risk Continuous, Quantified, and Actionable – Travis Wong – RSAC26 #3

Key Moments
  • 0:00 - – RSAC 2026 Interview Intro ????
  • 0:28 - – Meet Travis Wong (Cyber Risk Expert)
  • 0:42 - – Why Cyber Risk Management Is Broken Today
  • 01:40 - – What Resilience Does (Cyber Risk + Insurance Explained)
  • 02:18 - – Dollar-Based Risk: Speaking the Language of Business ????
  • 02:46 - – How Cyber Insurance Actually Works
  • 03:29 - – Why Actuarial Data Matters in Cybersecurity
  • 03:58 - – The Problem with Static Risk Assessments
  • 04:14 - – AI & Dynamic Risk: Why Old Models Fail
  • 04:52 - – Outside-In vs Inside-Out Risk Visibility
  • 05:18 - – Does Better Security = Lower Insurance Costs?
  • 06:00 - – Why Cyber Risk Is a Relationship, Not Just a Policy
  • 06:22 - – Transparency in Cyber Risk & Insurance Decisions
  • 06:54 - – Sharing Risk Models: A New Approach to Security
  • 07:41 - – Translating Security Risk into Business Value
  • 08:04 - – Communicating Cyber Risk to CFOs & Boards
  • 08:49 - – Building a Dynamic Cyber Risk Strategy
  • 09:26 - – Why Point-in-Time Risk Assessments Don’t Work
  • 10:28 - – The Future of GRC: Making “Risk” the Priority
  • 11:05 - – Risk Transfer vs Risk Mitigation Explained
  • 12:07 - – Measuring & Managing Cyber Risk Effectively
  • 12:27 - – Structural Accountability Problem in Cybersecurity
  • 12:46 - – CISO Risk Challenges & Real-World Case Studies
  • 13:52 - – Lack of Visibility Across Organizations
  • 14:36 - – Board-Level Cyber Risk & New Regulations
  • 15:45 - – Final Thoughts: The Future of Cyber Risk Management
Guest
VP, Customer Engagement at Resilience

Travis Wong is the VP of Customer Engagement at Resilience. He leads the Security and Risk Services and Customer Success teams and brings over 15 years of experience in risk management consulting, helping clients assess, measure, and manage their risk effectively.

Segment Three

Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report – Aamir Lakhani – RSAC26 #3

Key Moments
  • 0:00 - – RSAC 2026 Day 3 Kickoff & Intro
  • 0:30 - – Meet Amir Lakhani (Fortinet Threat Intelligence & AI Research)
  • 0:57 - – What is Adversarial AI? (AI Used for Attacks)
  • 01:51 - – How Hackers Use AI: Prompt Injection & Model Exploits
  • 02:37 - – From Red Teaming to AI-Powered Cyber Attacks
  • 03:26 - – Real-World AI Attack Simulation (Firewall Demo)
  • 04:26 - – Cyber Threat Trends: Efficiency Over Complexity
  • 05:38 - – Stolen Credentials & “Hackers Just Log In”
  • 06:04 - – Dark Web Tactics & Repackaged Malware with AI
  • 07:19 - – AI-Powered Cybercrime Tools Explained
  • 08:00 - – Social Engineering at Scale with AI Agents
  • 09:15 - – Machine-Speed Attacks vs Human Defenses
  • 10:35 - – The Rise of Rogue AI & Dark Web Models
  • 11:20 - – Future of AI Security: Prompt Injection Risks
  • 12:43 - – State-Sponsored Attacks & AI Evolution
  • 13:47 - – WormGPT & Unrestricted AI Threats
  • 14:06 - – Explosion of Non-Human Identities & Agents
  • 14:54 - – AI Agents Creating Other AI Agents
  • 15:24 - – The Future: Massive Paradigm Shift in Cybersecurity
  • 15:44 - – AI as Defender: Real-Time Threat Detection Example
  • 16:29 - – Final Thoughts & RSAC 2026 Wrap-Up
Guest
Global Director of Threat Intelligence and Adversarial Artificial Intelligence Research at Fortinet

Aamir Lakhani is a cybersecurity researcher and practitioner with Fortinet and FortiGuard Labs, with over 15 years of experience in the security industry. He is responsible for providing IT security solutions to major commercial and federal enterprise organizations. Lakhani is considered an industry leader in support of detailed architectural engagement and projects on topics related to cyber deference, mobile application threats, malware and advanced persistent threat (APT) research. Previously, Lakhani designed cyber solutions for defense intelligence agencies, and has assisted organizations in defending themselves from active strive-back perpetrated by underground cyber groups. Lakhani’s areas of expertise include FortiGuard, fundamentals of network protection, cyber defense, mobile application threats, malware and APT research.

Segment Four

Securing AI Agents: Managing Runtime Risk in Enterprise AI Systems – Jimmy White – RSAC26 #3

Key Moments
  • 0:00 - – Intro: RSAC 2026 & Securing AI Agents
  • 01:03 - – From GenAI to Agentic AI: Rapid Adoption Explained
  • 02:13 - – The Biggest Challenge: Discovering AI Agents in Your Environment
  • 03:22 - – Shadow AI & “Vibe Coding” Risks in Enterprises
  • 05:07 - – Why Securing AI After Deployment Is Too Late
  • 06:57 - – Controlling AI Behavior: “Pre-Crime” Guardrails Explained
  • 07:33 - – Real-Time AI Intervention: Nudging vs Blocking Actions
  • 08:10 - – Why “How AI Works” Matters More Than “What It Does”
  • 08:49 - – AI Identity & Access Control Challenges
  • 09:34 - – F5 + Skyfire + Forcepoint: Securing the AI Ecosystem
  • 11:54 - – AI Adoption Chaos: Can Security Catch Up?
  • 12:47 - – Crawl, Walk, Run: Building an AI Security Strategy
  • 14:06 - – Why Hands-On AI Testing Is Critical for Security Teams
  • 15:07 - – AI vs Other Tech: Why Adoption Is So Fast
  • 15:37 - – Real-World AI Example: Autonomous Systems & Risk
  • 16:54 - – Enterprise AI Risks: Employee Usage & Security Concerns
  • 17:20 - – Final Thoughts: The Fastest Tech Shift in 20+ Years
Guest
VP of AI at F5

Jimmy White is a technology and AI leader focused on building secure, scalable platforms at the intersection of AI, infrastructure and cybersecurity. He currently drives AI and engineering strategy at F5, where he’s leading efforts to secure AI systems and modern application environments. Previously, he served as Chief Technology Officer and President at CalypsoAI, helping scale the company’s AI security capabilities, and has held senior engineering and security leadership roles at organizations including Qualtrics and FireEye/Mandiant. With many years of experience across software, security, and high-growth product teams, Jimmy is passionate about translating emerging AI innovation into practical, enterprise-ready solutions.

Segment Five

Why Passkeys Are Ready for Prime Time in Modern Banking – Ashish Jain – RSAC26 #3

Key Moments
  • 0:00 - – RSAC 2026 Intro & Passkeys Discussion Begins
  • 0:21 - – Why Passkeys Are Ready for Banking
  • 01:02 - – Security vs User Experience in Authentication
  • 01:38 - – Why Users Resist Passwordless Login
  • 02:15 - – Passkeys vs Passwords: Real Data & Success Rates
  • 04:22 - – Faster Logins: Passkeys vs MFA Comparison
  • 05:31 - – Why Banking Needs Better Authentication UX
  • 06:33 - – How Passkeys Stop Phishing & Credential Attacks
  • 08:35 - – Are Passwords & MFA Becoming Obsolete?
  • 08:58 - – Pros & Cons of SMS, Push, and Other Auth Methods
  • 10:20 - – How Banks Should Roll Out Passkeys (Best Strategy)
  • 10:43 - – Phased Adoption: Don’t Force Users Too Early
  • 12:23 - – Mobile vs Web: Where Passkeys Work Best
  • 12:55 - – OneSpan Passkey Implementation Explained
  • 13:07 - – FIDO Standards & Authentication Expertise
  • 14:00 - – Real-World Deployment at Scale (Millions of Users)
  • 15:21 - – Final Thoughts: The Future is Passwordless
Guest
CTO at OneSpan

Ashish Jain is OneSpan’s Chief Technology Officer. Widely regarded as one of the top digital identity experts in the industry, Ashish brings over two decades of experience leading product management, engineering, and operations teams at global organizations. He most recently served as Chief Product Officer at Arkose Labs, an enterprise fraud management and account security company where he led the development of the platform to help address consumer fraud and identity challenges for many Fortune 1000 companies. Prior to his role at Arkose Labs, Ashish served as Head of Identity at eBay, where he led the global engineering team to build the identity, risk, and trust platform to support onboarding, authentication, KYC, fraud, and abuse protection for 180+ million eBay customers and third-party developers. Before joining eBay, Ashish was Vice President of Workspace ONE at VMware, where he spearheaded the development and patenting of a solution that integrated identity and mobile device management, one of the core tenets of Zero Trust Security.

Segment Six

How AI-Driven Development is Reshaping the Application Risk Landscape – Idan Plotnik – RSAC26 #3

Key Moments
  • 0:00 - RSAC 2026 Introduction & AI Dominance in Cybersecurity
  • 0:24 - AI Trends and Predictions for Cybersecurity
  • 0:55 - Shift from AI Hype to Data Security & Identity
  • 01:13 - Rapid Adoption of AI Coding Agents in Enterprises
  • 01:34 - Risks of AI-Generated Code and Developer Blind Spots
  • 02:01 - How AI Changes Software Development & Security
  • 02:48 - Loss of Visibility for CISOs and Need for Control
  • 03:38 - Secure Prompt Technology Explained
  • 05:38 - How AI Security Fits into the SDLC
  • 06:05 - Seamless Integration with Coding Agents
  • 07:16 - AI Compliance & Secure Code Generation
  • 09:05 - Rethinking AppSec and the End of Traditional Shift-Left
  • 10:03 - Why Developer Training is Becoming Obsolete
  • 10:04 - Preventing Vulnerabilities Before Code is Written
  • 12:11 - Eliminating Alert Fatigue in Developers
  • 12:43 - Balancing Security with Developer Velocity
  • 13:48 - AI Model Flexibility and Agnostic Approach
  • 14:54 - Future of AI Security & Software Development Evolution
Guest
Co-Founder and CEO at Apiiro

Idan is a serial entrepreneur and product strategist, bringing to Apiiro nearly 20 years of experience in cybersecurity. Previously, Idan was Director of Engineering at Microsoft following the acquisition of Aorato where he served as the founder and CEO.

Segment Seven

Mind the Gap: Confidence, AI, and the Future of Exposure Management – Chris Wallis – RSAC26 #3

Key Moments
  • 0:00 - RSAC 2026 Introduction & Cybersecurity Trends
  • 0:21 - AI Uncertainty and Rising Tech Debt in Security
  • 01:08 - What is Exposure Management in Cybersecurity?
  • 01:51 - Moving Beyond Vulnerability Management to Risk-Based Security
  • 02:25 - Why Traditional Vulnerability Scanners Miss Real Threats
  • 03:28 - False Confidence in Security Scanning Explained
  • 04:02 - The Need for Real-World Attack Surface Visibility
  • 04:36 - How AI is Transforming Exposure Management
  • 05:06 - Using AI to Prioritize Real Security Risks
  • 06:07 - Solving Context Gaps in Cybersecurity Data
  • 06:56 - The Future of AI in Penetration Testing
  • 08:27 - Human vs AI in Advanced Security Testing
  • 09:33 - Lessons from Real Cyber Breaches & Failures
  • 10:30 - CISO vs Security Team Confidence Gap
  • 11:40 - Are We Measuring the Right Security Metrics?
  • 12:18 - Zero-Day Exploits and Faster Attack Timelines
  • 13:11 - Why Patching Alone No Longer Works
  • 13:53 - The Importance of Detection, Response & Mitigation
  • 14:08 - Rethinking Cybersecurity Strategy Beyond Vulnerabilities
  • 14:19 - Final Thoughts & Security Report Takeaways
Guest
Founder and CEO at Intruder

Chris Wallis is Founder and Chief Executive Officer (CEO) at Intruder. He has previously worked as Senior Security Specialist at WorldPay, Lead Security Consultant at Context Information Security and Security Consultant at Deloitte. Chris is an alumnus of the University of Bath.

Segment Eight

Why More Technology Hasn’t Made Us More Secure – John Anthony Smith – RSAC26 #3

Key Moments
  • 0:00 - Introduction & RSAC 2026 Interview
  • 0:24 - What Phoenix 24 Does: Fast Post-Breach Recovery
  • 0:40 - Why Backups Often Fail in Cyberattacks
  • 01:19 - The Importance of Speed in Breach Recovery
  • 01:53 - Minimizing Downtime & Business Interruption Costs
  • 02:01 - Working with Incident Response & Forensics Teams
  • 02:33 - Wartime vs Peacetime Cybersecurity Strategy
  • 03:06 - What “Breach Truth” Means in Cybersecurity
  • 04:05 - Why Security Tools Alone Don’t Work
  • 04:39 - Orchestration: People, Process & Technology
  • 05:20 - Real Attacker Behavior & Short Dwell Time
  • 06:20 - Why Traditional SLAs Fail Against Attackers
  • 06:36 - How Most Breaches Actually Happen (Misconfigurations)
  • 07:06 - Real-World Breach Example: No MFA on VPN
  • 07:54 - The Problem with Security Tool Overload
  • 08:22 - Continuous Security Hardening & Risk Reduction
  • 08:57 - Argos Platform: Data Discovery & Mapping
  • 09:30 - Finding Critical Data & Application Dependencies
  • 10:42 - Preparing for Recovery Before a Breach
  • 11:24 - Ensuring Backup Integrity & Recovery Assurance
  • 12:04 - Why PAM Solutions Can Still Fail
  • 12:51 - Real Attack Chain: From AD to Data Exfiltration
  • 14:13 - What Effective Security Orchestration Looks Like
  • 14:52 - Final Thoughts & Key Takeaways
Guest
Founder & Chief Security Officer at Fenix24

John Anthony Smith, Founder and Chief Security Officer of Fenix24, is a leading information security expert with deep cybersecurity experience in healthcare, financial services, and legal industries. He has overseen infrastructure for over 400 companies and currently serves as a vCIO and trusted advisor to companies worldwide. With more than 16 years of breach response experience, he is a staunch advocate for tougher sanctions on nations harboring cybercriminals and is dedicated to locating, investigating, and prosecuting cybercriminals.

Segment Nine

No Device, No Access: The Future of Zero Trust Security – Rob Allen – RSAC26 #3

Key Moments
  • 0:00 - RSAC 2026 Day 3 Introduction & Guest Overview
  • 0:37 - Podcast Culture & Cybersecurity Influencers
  • 01:04 - Zero Trust Security & ThreatLocker Overview
  • 02:01 - The Challenge of Explaining Cybersecurity Trends
  • 03:03 - Social Media, TikTok & Tech Culture at RSAC
  • 04:16 - Cybersecurity Conference Experience & Networking
  • 04:28 - ThreatLocker Presence at RSAC 2026
  • 05:24 - Conference Chaos, Protests & Event Stories
  • 06:10 - San Francisco Culture & RSAC Atmosphere
  • 07:07 - Traveling Across the U.S. – Scale & Geography Lessons
  • 08:06 - Why San Francisco Feels Unique for Tech Events
  • 09:14 - Comparing U.S. Cities & Cybersecurity Conferences
  • 10:22 - The Reality of Travel Distance in the U.S.
  • 11:13 - Lessons from Visiting Colorado & Large Regions
  • 12:08 - Time vs Distance – Navigating U.S. Travel
  • 13:11 - Scenic Routes, Travel Tips & Conference Trips
  • 14:42 - Startup Ideas, Innovation & Tech Humor
  • 15:39 - RSAC Conversations & Industry Networking Value
  • 16:46 - Zero Trust Security (Quick Take)
  • 17:18 - Final Thoughts & ThreatLocker Call to Action
Guest
Chief Product Officer at ThreatLocker

Rob Allen, Chief Product Officer of ThreatLocker, is an IT Professional with three decades of experience assisting small and medium enterprises embrace and utilize technology. He has spent the majority of this time working for an Irish-based MSP, which has given him invaluable insights into the challenges faced by businesses today. Rob’s background is technical – first as a system administrator, then as a technician and an engineer. His broad technical knowledge, as well as an innate understanding of customers’ needs, made him a trusted advisor for hundreds of businesses across a wide variety of industries. Rob has been at the coalface, assisting clients in remediating the effects of, and helping them recover from cyber and ransomware attacks.

Segment Ten

Beyond IOCs: A Framework for High-Impact Cyber Threat Intelligence – Samuel Hassine – RSAC26 #3

Key Moments
  • 0:00 - Introduction & RSAC 2026 Interview
  • 0:20 - Topic Overview: Beyond IOCs & Threat Intelligence
  • 01:02 - What Modern Threat Intelligence Really Means
  • 01:57 - OpenCTI Platform & Intelligence Aggregation
  • 02:18 - Pyramid of Pain & Intelligence Lifecycle
  • 03:14 - Measuring Security Value & ROI Challenges
  • 03:51 - From Intelligence to Threat-Informed Defense (CTEM)
  • 05:23 - Continuous Threat Exposure Management Explained
  • 06:50 - Validation Challenges in Real Environments
  • 08:42 - AI, Agentic Security & Validation Risks
  • 10:08 - Importance of High-Quality Threat Intelligence
  • 11:27 - Exploitation vs Real Risk Explained
  • 12:45 - Why Speed Matters in Cybersecurity Defense
  • 13:40 - How Defenders Can Get Faster
  • 14:54 - Proactive Security & Continuous Testing
  • 15:48 - Learning from Past Incidents
  • 15:53 - Closing Thoughts & Key Takeaways
Guest
CEO and co-founder at Filigran

Former Head of Cyber Threat Intelligence at the French Cybersecurity Agency (ANSSI) and Director of Cybersecurity Strategy at Tanium, Samuel Hassine is the CEO and the co-founder of Filigran, a fast-growing European CyberTech developing cutting-edge solutions for cyber threat management.

Segment Eleven

The Agentic SOC: Autonomous AI Analysts at Machine Speed – Edward Wu – RSAC26 #3

Key Moments
  • 0:00 - Introduction to RSAC 2026 & Agentic AI SOC Explosion
  • 0:53 - The Overcrowded Market of AI SOC Vendors
  • 01:25 - What Makes Dropzone AI Different?
  • 01:44 - Scaling to 300+ Enterprise Deployments
  • 02:09 - MSSP & MDR Partnerships Explained
  • 02:27 - The Challenge of Building True Agentic AI
  • 03:03 - Why LLMs Are Non-Deterministic (And Why It Matters)
  • 03:45 - The Need for Consistency in Security Operations
  • 04:08 - How Dropzone Achieves Deterministic AI Outcomes
  • 04:36 - Inside the AI SOC: 100+ LLM Invocations Per Alert
  • 05:29 - Mimicking Human Analyst Investigation Workflows
  • 06:04 - The Importance of Reporting & Communication in SOC
  • 06:33 - Modular AI Architecture for Security Operations
  • 07:09 - Turning Probabilistic AI into Reliable Systems
  • 07:31 - The “Internal Combustion Engine” AI Analogy
  • 09:15 - Eliminating the Human-AI-Human Workflow Problem
  • 10:17 - Achieving 100% Software-Driven SOC Automation
  • 10:32 - Adapting AI to Organizational Context & Policies
  • 11:39 - Training AI with Historical Security Case Data
  • 12:35 - Future Roadmap: Building an Army of AI Agents
  • 13:03 - Expanding Beyond SOC Analysts to Full Security Roles
  • 13:34 - AI Threat Intelligence, Detection & Hardening Agents
  • 13:50 - The Rise of AI Forensics & Response Automation
  • 14:21 - Humans as “Generals” Leading AI Security Agents
  • 14:46 - Product Roadmap & Upcoming AI Agent Releases
Guest
CEO & Founder at Dropzone AI

Edward Wu is the founder & CEO of Dropzone AI, creator of the world’s first autonomous AI SOC analyst that force-multiplies cybersecurity teams with armies of AI agents. Previously, Edward spent eight years at ExtraHop Networks, leading AI/ML and detection engineering and developing behavioral network attack detection. He also worked on automated binary analysis and software defenses at the University of Washington, Seattle, and UC Berkeley. Edward holds 30+ patents in applied AI for cybersecurity and is a contributor to the MITRE ATT&CK framework.

Segment Twelve

The Guardrails are Gone: The Onus for AI Security Is On the Enterprise – Marc Manzano – RSAC26 #3

Key Moments
  • 0:00 - Introduction to RSAC 2026 & AI Guardrails Discussion
  • 0:24 - Do AI Guardrails Even Exist Yet?
  • 0:43 - New Security Challenges Introduced by AI
  • 01:28 - Speed & Asymmetry Between Attackers and Defenders
  • 02:14 - Why Attackers Move Faster Than Security Teams
  • 02:23 - The Rise of Shadow AI in Enterprises
  • 03:38 - AI Supply Chain Risks & Hidden Vendor AI Usage
  • 03:40 - Data Security Challenges with AI Prompts & Semantics
  • 03:54 - Malicious AI Models & Open Source Threats
  • 04:43 - Lack of Traceability Across AI Agents
  • 05:30 - AI as a New Insider Threat Risk
  • 06:06 - AI-Powered Exploits & Zero-Day Speed Advantage
  • 06:55 - Why Traditional Patch Windows No Longer Work
  • 07:52 - Keeping Security Systems at Machine Speed
  • 08:23 - How to Detect Shadow AI in Your Environment
  • 09:38 - Moving from Inventory to Risk-Based AI Visibility
  • 09:54 - Expanding AI Risks Across the Supply Chain
  • 11:21 - Quantum Computing & AI Security Intersection
  • 11:52 - Post-Quantum Cryptography vs Quantum Cryptography
  • 12:58 - How CISOs Should Handle AI + Quantum Threats
  • 13:16 - Building Separate AI and Quantum Security Programs
  • 14:03 - Automating Identity & Access for AI Agents
  • 15:44 - Final Thoughts on AI Security Strategy
Guest
General Manager, Cybersecurity Group at SandboxAQ

Dr. Marc Manzano leads the cybersecurity group at Sandbox. His current research interests include post-quantum cryptography, lightweight cryptography, fully-homomorphic encryption, the intersection between machine learning and cryptanalysis, performance optimizations of cryptographic implementations on a wide range of architectures, and quantum algorithms. Manzano holds a Ph.D. in Computers Network Security, which he earned under the supervision of the University of Girona (Spain) and Kansas State University (United States). He earned an MSc in Computer Science from the University of Girona (Spain), while he did research stays at UC3M (Spain) and at DTU (Denmark). He initiated his research career while finalizing his BSc in Computer Engineering at Strathclyde University (UK).

Over the past ten years, Manzano has led the development of many secure cryptographic libraries and protocols. Manzano was formerly a Senior Staff Software Engineer at Google, and before that, he was the Vice President of the Cryptography Research Centre at the Technology Innovation Institute, a UAE-based scientific research center. Prior to that, he held several positions where he was responsible for implementing pivotal cryptographic components of a variety of secure communication products, including an electronic voting platform.

Segment Thirteen

Multi-Channel Impersonation: Why Legacy Controls Are Failing – Bobby Ford – RSAC26 #3

Guest
Chief Strategy and Experience Officer at Doppel

Bobby Ford is the Chief Strategy and Experience Officer at Doppel, an AI-native social engineering defense platform backed by Bessemer Venture Partners and a16z. A globally recognized cybersecurity leader, Bobby has nearly 30 years of experience and has served as CISO for Abbott Laboratories, Unilever, Exelis, and Hewlett Packard Enterprise. Since joining Doppel in July, Bobby has played a pivotal role in shaping the company’s strategy during a defining period of expansion and innovation.

Segment Fourteen

Hard Truths: The Lies We Keep Buying in Cybersecurity – Andrew Rubin – RSAC26 #3

Key Moments
  • 0:00 - Introduction to RSAC 2026 & Cybersecurity Myths
  • 0:21 - The Big Lie: “We Can Be 100% Safe”
  • 0:57 - Accepting Breaches as Inevitable
  • 01:37 - Why Cybersecurity Is Not Binary (Safe vs Breached)
  • 02:00 - The Inventory Problem in Cybersecurity
  • 02:21 - Understanding Risk Beyond Black-and-White Thinking
  • 03:41 - Dwell Time & Why Detection Speed Matters
  • 04:01 - AI Accelerates Attacks Beyond Human Speed
  • 04:58 - The Misunderstanding of Cyber Risk
  • 05:39 - Why Security Investments Don’t Match Real Risk
  • 07:12 - The Importance of Basic Cyber Hygiene
  • 07:44 - AI Speed vs Security Limitations
  • 08:23 - How AI Gives Attackers a Massive Advantage
  • 09:29 - Rethinking the Cybersecurity Playbook
  • 10:18 - Why Traditional Security Models Won’t Work for AI
  • 10:52 - The Need for Honest Industry Conversations
  • 11:29 - Reactive vs Proactive Cybersecurity Mindsets
  • 12:24 - Fixing Security Hygiene & Closing Attack Surface Gaps
  • 12:55 - AI, MCP, and Expanding Network Complexity
  • 13:13 - The Explosion of Attack Surface with AI Infrastructure
  • 14:13 - Final Thoughts on the Future of Cybersecurity
Guest
CEO and Founder at Illumio

As Founder, CEO, and Board Member of Illumio, Andrew is responsible for the overall strategy and vision of the company. With deep expertise in Zero Trust, segmentation, network security, and regulatory and compliance management, Andrew is the Executive Sponsor of many of Illumio’s largest customers worldwide, including Citi, HSBC, Salesforce, and Microsoft. Andrew frequently participates in panels, articles, and podcasts for leading industry events and publications. Andrew was named to Goldman Sachs’ “100 Most Intriguing Entrepreneurs” seven times as part of its Builders & Innovators program and received Ernst & Young’s Bay Area Entrepreneur of the Year 2024.

Andrew serves as a Board Member of Emigrant Bank, as well as an advisor to several cyber and technology start-ups, and is an active angel investor. Andrew graduated from Washington University in St. Louis with a BSBA in Finance, and he is both a guest lecturer on entrepreneurship and a National Council member of the Skandalaris Center for Entrepreneurial Studies at the university.

Segment Fifteen

RSAC 2026 Day 3: AI Security Trends, MCP Risks & The Future of Cybersecurity – RSAC26 #3

Key Moments
  • 0:00 - RSAC 2026 Day 3 Recap & Key Takeaways
  • 0:30 - Early Stage Expo Insights & Startup Trends
  • 0:58 - The Real Problem: Securing AI Model Context Protocol (MCP)
  • 02:10 - MCP vs APIs – The New Security Challenge
  • 03:58 - Lack of Visibility = No Protection in AI Systems
  • 04:38 - Agentic AI Overload & Market Saturation
  • 05:08 - Too Many Cybersecurity Vendors, Not Enough Buyers
  • 05:35 - Industry Consolidation & Startup Survival Reality
  • 06:49 - AI Driving Market Consolidation in Cybersecurity
  • 07:21 - Massive Marketing Spend & Big Vendor Presence at RSAC
  • 08:02 - Collaboration Over Competition – New Industry Trend
  • 08:38 - Open Ecosystems & Data Sharing in Security Platforms
  • 09:32 - The End of Point Solutions in Cybersecurity
  • 10:07 - From Alerts to Outcomes – The Future of Security
  • 11:31 - Autonomous Security & Human-in-the-Loop Evolution
  • 12:16 - Trusting AI for Automated Cyber Defense
  • 12:47 - The Risk of Losing Human Expertise in Security
  • 13:15 - The Future of Cybersecurity Careers & Skills Gap
  • 14:17 - Rise of AI Security Roles & Prompt Engineering
  • 14:26 - Final Thoughts & RSAC 2026 Wrap-Up

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds