Full Show Notes
Segment One

From Risk Data to Business Decisions: Enabling Autonomous Cyber Risk Programs – Evelyn Anderson – RSAC26 #5

Key Moments
  • 0:00 - Introduction to AI-Driven Cyber Risk Programs
  • 01:12 - AI Adoption vs Security & Data Challenges
  • 02:17 - Why Asset & Data Inventory Still Fails
  • 03:31 - The Problem with Manual GRC & Spreadsheets
  • 04:01 - Moving Beyond Workflow Automation
  • 04:42 - Aligning Cybersecurity with Business Strategy
  • 05:26 - Regulatory Complexity & Global Compliance
  • 06:07 - Active Governance Framework Explained
  • 07:18 - From Governance to Automated Risk Management
  • 08:09 - Automating Security Assessments with AI
  • 09:19 - Generative AI for GRC & Compliance
  • 10:15 - Solving Assessment Challenges with AI
  • 10:47 - Next Step: Regulatory Knowledge Corpus
  • 11:26 - Mapping Global Regulations & Controls
  • 13:34 - Building a Unified Control Framework
  • 14:29 - Continuous Control Monitoring with APIs
  • 15:24 - Scaling GRC with Real-Time Data
  • 16:33 - Data Enrichment & Security Intelligence
  • 17:38 - Connecting Threats to Business Risk
  • 18:31 - Improving Risk-Based Decision Making
  • 19:23 - Autonomous Security Programs Explained
Guest
Distinguished Engineer and CTO of Cyber Strategy and Risk at IBM

Evelyn Anderson has over 28 years of experience in IT Security. Evelyn is an IBM Distinguished Engineer, which is an executive technical role within IBM. Evelyn has served across IBM’s organization as the global leader for Identity & Access Management, Security, Regulatory, Risk Management, Physical Security, System Currency and Infrastructure Protection where she led the design of a global framework to standardize delivery, automate controls and reduce security risks for IBM and its Clients.

Segment Two

From Cyber Risk to Business Impact: A Conversation with IBM and CyberSaint – Mark Hughes, Fabio Campos – RSAC26 #5

Key Moments
  • 0:00 - Introduction to Cyber Risk & Data Challenges
  • 01:21 - Why Security Data Is Hard to Use
  • 02:30 - Breaking Down Security Data Silos
  • 03:12 - Disconnect Between Security, Risk & Business
  • 04:07 - Turning Security Data into Risk Decisions
  • 05:16 - AI in Cybersecurity: Hype vs Reality
  • 05:47 - Governance First: Securing AI Adoption
  • 07:33 - AI, Automation & Business Process Change
  • 08:37 - Driving Cultural Change in Security Teams
  • 09:07 - Reimagining Security with AI & Automation
  • 10:39 - From Assessment to Continuous Risk Management
  • 12:17 - Continuous Control Monitoring Explained
  • 13:20 - Real-Time Risk Visibility & Decision Making
  • 14:11 - Why Executives Care About Cyber Risk Now
  • 15:13 - The Rise of Risk-Based Security Programs
  • 17:03 - Autonomous Security Programs & AI Agents
  • 18:03 - Governance & Guardrails for AI Security
  • 18:37 - Moving Beyond Spreadsheets to Automation
  • 19:23 - From Static Security to Real-Time Decisions
Guests
Global Managing Partner, Cybersecurity Services at IBM

Mark Hughes leads IBM’s global cybersecurity team of over 5,000 experts in helping organizations transform security into a business enabler and establish cyber resiliency. His role spans the sales and services delivery of threat detection and response, data security, cloud security, IAM, infrastructure, risk management, and ecosystem partnerships.

Global Managing Partner at IBM Cyber Strategy & Risk

As an IBM Global Cybersecurity Senior Executive, Fabio holds the main responsibility over the Global Cyber Strategy, Risk & Resilience practice: Leading and providing sounding board direction, management and oversight to the Global Portfolio Organization Strategy Definition & Execution, including Offering Management, Growth & Profitability, Technical Solutions, Skills & Talent, and Portfolio Delivery domain knowledge capabilities on Global Organizational Change Programs.

Segment Three

Building the Cyber Risk Intelligence Layer: From AI Models to Actionable Security – Srinivas Tummalapenta – RSAC26 #5

Key Moments
  • 0:00 - Introduction to Cyber Risk Intelligence Layer
  • 01:45 - Shift from Point-in-Time to Continuous Risk
  • 03:02 - Rapid Innovation with AI & 7-Week Sprint
  • 03:53 - Where Security Architecture Breaks Down
  • 05:57 - AI Consumption Models & Shared Responsibility
  • 06:41 - Combining AI Techniques: Agents, NLP, GNNs, LLMs
  • 09:11 - From Static Risk Assessments to Real-Time Insights
  • 09:55 - Building a Layered AI Security Architecture
  • 10:45 - Breaking Down Silos with Interoperability
  • 11:33 - Normalizing Security Data Across Systems
  • 13:51 - Using Data Efficiently for Risk & Compliance
  • 15:33 - Mapping Telemetry, Controls & Risk Exposure
  • 16:40 - Managing Global Regulations & AI Policies
  • 18:12 - Risk Quantification & Business Context
  • 20:03 - Inside the Cyber Risk Intelligence Layer
  • 22:10 - Beyond SIEM & GRC: A New Security Model
  • 24:06 - Outcome-Driven Security vs Tool Sprawl
  • 25:08 - How Security Operations Will Change
  • 26:59 - Autonomous vs Human-in-the-Loop Security
  • 29:06 - Continuous Monitoring & Autonomous Controls
Guest
Distinguished Engineer & CTO, Master Inventor at IBM Cybersecurity Services

Srinivas is a technical leader and a subject matter expert in Information Security. Srini has degrees in Technology and Business Administration, and has a cumulative experience of 20+ years. As an IBM Distinguished Engineer he is a key technical leader for IBM XForce Protection Platform, Security Services. A believer in secure by design concepts, he has incorporated automation to enable security technologies and services at cloud speed delivered through IBM Cloud Security Services. He works with a team at IBM Security Services to design, deliver, and scale security solutions throughout the client base.

Srini has 5 patents and has various filings in areas of security analytics, threat monitoring and response, and blockchain disclosures under review.

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds