Full Show Notes
Segment One

Post-Quantum Compliance Starts in Your Containers, and Sooner Than You Think – George Manuelian – RSAC26 #6

Key Moments
  • 0:00 - – Intro: RSAC 2026 & Post-Quantum Cryptography (PQC)
  • 0:32 - – 2028 Deadline: Why Financial Institutions Must Act Now
  • 0:52 - – Why PQC Adoption Is Slower Than Expected
  • 01:21 - – Open Source & Cryptography: The Hidden Dependency Problem
  • 01:35 - – Are Containers the Easy Fix for PQC?
  • 02:06 - – Application vs Infrastructure: The Two-Part Challenge
  • 02:22 - – Quantum Threat Explained: Why Current Encryption Will Break
  • 03:13 - – PQC in Defense, Automotive & Critical Infrastructure
  • 04:15 - – Step 1: Discovering Your Cryptography Inventory
  • 05:29 - – Kubernetes Complexity: Managing Thousands of Containers
  • 05:42 - – Why Inventory Is Critical for Security & Compliance
  • 06:17 - – Eliminating False Positives in Vulnerability Scanning
  • 07:00 - – The Real Problem: Too Many Vulnerabilities, Not Enough Context
  • 08:00 - – Step-by-Step Strategy: Discovery → Filtering → Fixing
  • 09:21 - – Saving Engineering Time with Smart Automation
  • 10:19 - – Binary Identical Containers: Fix Without Breaking Apps
  • 11:20 - – Scaling Security: Automating Open Source Fixes
  • 12:13 - – Developer Challenges: Version Lock & Risk of Change
  • 13:04 - – Secrets, TLS & Open Source Cryptography Management
  • 14:26 - – Where to Start: Practical PQC Adoption Roadmap
  • 15:13 - – Final Thoughts: Preparing for the Post-Quantum Future
Guest
Chief Strategy and Revenue Officer at RapidFort

George Manuelian is a veteran technology executive with deep expertise in cybersecurity, networking, and cloud infrastructure. Before joining RapidFort, Manuelian was VP of Worldwide SASE GTM at Palo Alto Networks, driving over $1.2 billion in revenue. He has also led key partnerships at AWS, grew Versa Networks to $100M ARR as VP of Sales Engineering, and spent over 20 years at Cisco, leading innovations in mobile and cloud services.

Segment Two

Authenticated, But Not Verified: The Workforce Identity Gap – Aaron Painter – RSAC26 #6

Key Moments
  • 0:00 - – Intro: RSAC 2026 & Identity Security Challenges
  • 0:17 - – What “Nametag” Does: Verifying the Human Behind the Identity
  • 0:40 - – Rise of AI Impersonation Attacks in Enterprises
  • 01:40 - – Fake Employees & Insider Threats Explained
  • 02:03 - – The Biggest Security Gap: Onboarding & Account Recovery
  • 03:34 - – Why MFA & Passkeys Still Have Weak Points
  • 03:58 - – Manual Identity Verification: Risks & Inefficiencies
  • 04:55 - – Automating Identity Verification to Reduce Human Error
  • 05:35 - – Impersonation-as-a-Service: New Cybercrime Model
  • 06:20 - – Social Engineering Tactics That Fool Help Desks
  • 07:33 - – Agentic AI Risks: Who Is Responsible for Actions?
  • 08:08 - – Human Accountability in AI-Driven Workflows
  • 08:49 - – Why Passkeys Alone Don’t Prove Human Identity
  • 09:31 - – Zero Trust Limitations in the Age of AI
  • 10:53 - – Deepfakes & Voice Cloning: The New Authentication Threat
  • 11:18 - – Securing Identity Lifecycle: Onboarding to Recovery
  • 11:43 - – Practical Steps to Prevent Identity-Based Attacks
  • 12:33 - – Risk vs Cost: In-Person Verification vs Remote Hiring
  • 12:57 - – Awareness Gaps & Real-World Breach Examples
  • 13:52 - – Why Video Calls Can’t Be Trusted Anymore
  • 14:59 - – The Future of Identity: Human Verification + Security Tech
  • 15:16 - – Final Thoughts: Solving Identity Security Together
Guest

Aaron Painter is the CEO of Nametag Inc., the world’s first identity verification platform built to protect accounts from impersonators and AI-driven deepfakes. Aaron has nearly 20 years of global experience in security leadership, including senior roles at Microsoft across four continents. He is the author of the best-selling book LOYAL, a Fellow at the Royal Society of Arts, and a frequent commentator on cybersecurity and leadership.

Segment Three

OWASP Gen AI Security Project RSAC 2026 – Scott Clinton – RSAC26 #6

Key Moments
  • 0:00 - Welcome to RSAC 2026 Interview
  • 0:20 - Introduction to OWASP Gen AI Security Project
  • 0:35 - Beyond the LLM Top 10 Explained
  • 01:02 - Securing the Gen AI Lifecycle (SDLC)
  • 01:20 - Growth of the AI Security Community
  • 02:02 - Why Traditional Security Lists Fall Short
  • 02:23 - New 2026 Data Security Guide Released
  • 02:50 - Agentic AI Security & Emerging Risks
  • 03:20 - Mapping AI Security Solutions & Tools
  • 04:07 - Secure AI Architecture & MCP Design
  • 04:40 - Moving from “Don’t Do This” to Secure Design
  • 05:40 - Enabling Safe AI Adoption for Organizations
  • 06:08 - Building Actionable AI Security Programs
  • 07:07 - CISO Compass & AI Security Strategy
  • 07:50 - Tailoring Security for Different Audiences
  • 08:48 - AI Threat Research & Incident Response
  • 09:40 - Education & Rapid Iteration in AI Security
  • 10:30 - How to Contribute to OWASP Gen AI Project
  • 11:46 - Growing a Global AI Security Community
  • 12:31 - Virtual Summits & Global Collaboration
  • 12:43 - Prompt Injection Risks & Overtrust Issues
  • 13:33 - AI Coding Risks & Human Oversight
  • 15:00 - Making AI Safe, Not Restrictive
  • 15:48 - Future Roadmap & How to Get Involved
Guest
Co-chair, Co-founder at OWASP GenAI Security Project

Scott Clinton is Co-Chair and Co-Founder of the OWASP GenAI Security Project, leading strategy, operations, and growth. A 25+ year industry executive and 20-year open source leader, he has built and scaled open source businesses and industry consortiums across security, DevOps, AI/ML, and data markets. Scott is a published author and research lead, including the Gen AI Security Landscape and AI Security Center of Excellence Guide. Scott also holds multiple board and advisory roles with technology companies helping guide organization scale and growth.

Segment Four

Maximizing the Safe Usage of AI Starts With Observability – Pete Constantine – RSAC26 #6

Key Moments
  • 0:00 - – RSAC 2026 Intro & The AI Explosion
  • 0:35 - – The Biggest AI Security Challenge Today
  • 01:10 - – Do Companies Lack AI Visibility?
  • 02:00 - – Hidden Risks of AI Agents & Shadow AI
  • 03:38 - – Beyond Endpoint Security: What Users Are REALLY Doing
  • 04:22 - – Safe AI Usage vs Risky Behavior
  • 05:30 - – AI Governance: Monitoring Prompts to Outcomes
  • 07:33 - – AI Beyond Developers: Business-Wide Adoption Risks
  • 08:12 - – Does AI Security Slow Down Developers?
  • 10:08 - – AI Policies, Blocking, and Safe Enablement
  • 10:43 - – Measuring AI ROI & Business Impact
  • 11:28 - – Avoiding Data Overload in AI Observability
  • 13:16 - – Granular AI Monitoring: Org to Individual Level
  • 14:13 - – First Steps to Secure AI in Your Organization
Guest
Chief Product Officer at Origin

Pete Constantine has a storied history in product management and development of endpoint security products. Formerly the Chief Product Officer of Tanium, Pete now leads product development at Origin, focusing on building capabilities that enable teams to drive observability into the presence and usage of AI agents

Segment Five

The Convergence of Physical and Digital Risk – David Muse – RSAC26 #6

Key Moments
  • 0:00 - RSAC 2026 Intro & Executive Protection Trends
  • 0:22 - The Rise of Digital & Physical Threat Convergence
  • 01:29 - Why Executive Protection Is Growing in Cybersecurity
  • 02:13 - Digital Footprint → Physical Threats Explained
  • 02:44 - Cyber vs Physical Attack Surface Convergence
  • 04:06 - Protecting Facilities, Supply Chains & Infrastructure
  • 05:19 - AI & OSINT: The Explosion of Threat Intelligence Data
  • 07:11 - AI-Powered Attacks at Scale
  • 07:43 - Automation & the Future of Cyber Attacks
  • 08:57 - The New “Agentic Attack Surface”
  • 10:00 - Defender vs Attacker Speed: Who Wins?
  • 10:51 - Where to Start: Visibility & Risk Awareness
  • 11:17 - Executive Risk Education & Digital Hygiene
  • 13:14 - The Human Factor in Cybersecurity Risk
Guest
CEO at ZeroFox

David Muse brings extensive global leadership experience to ZeroFox. His career includes serving as CEO of Elemica, a leading Digital Supply Chain Network. Additionally, he was the CEO of Dharma Platform, President and CEO of Enviance, and COO at P2 Energy Solutions. He also held leadership positions at Honeywell, Aspen Technology, and IBM Global Business Services.

Segment Six

Understanding Where Agentic AI Stands in the Enterprise – Fred Kneip – RSAC26 #6

Key Moments
  • 0:00 - RSAC 2026 Intro & AI Adoption Chaos
  • 01:02 - Why Companies Are Going “AI-First” Without a Plan
  • 02:19 - Hidden Risks of AI Usage in Enterprises
  • 02:40 - Do You Need Prompt-Level Visibility for AI?
  • 03:51 - MCP, AI Agents & New Security Exposure
  • 05:01 - AI Guardrails vs Visibility: Where to Start
  • 06:01 - Experimentation Phase vs Security Control
  • 06:43 - Managing PII Risks in AI Workflows
  • 07:18 - Balancing AI Innovation with Security Controls
  • 07:51 - Will AI Security Be Driven by Major Incidents?
  • 08:31 - AI Data Risks & The Hallucination Tradeoff
  • 09:47 - AI Escaping Guardrails & Security Challenges
  • 10:19 - AI Model Behavior Changes & Risk Management
  • 10:47 - AI Red Teaming & Prompt Injection Risks
  • 11:30 - Observability: The Key to AI Security
  • 12:03 - How to Monitor AI Usage Across Enterprise Systems
Guest
CEO and co-founder at Helmet Security

Fred Kneip is a veteran security and risk executive with deep leadership experience across the technology and financial sectors. He has held senior roles at Bridgewater Associates and McKinsey & Company and is the former CEO of CyberGRX, which was acquired by the Marlin Equity Partners–backed ProcessUnity in 2023. Fred is now the CEO and co-founder of Helmet Security, where he focuses on helping organizations secure their agentic workflows. He holds a B.S.E. from Princeton University and an M.B.A. from Columbia Business School.

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds