"A human in the loop is not scalable if we think about our traditional security controls...and I also worry that it will give a boring job to the human. I think we've got to really think about how...humans get insights from AI, rather than trying to be the controller or the reviewer of everything, because it's just not going to scale." – Emma Smith, Global CISO, VodafoneThe idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.
|
Two cybersecurity leaders tested out AI in their respective SOCs for six months — and here's what they learned.
|
[From DR TECHNOLOGY]: JPMorgan Chase uses digital fingerprints and digital twins to spot online attackers and malicious behaviors while also reducing pesky false alerts.
|
RSAC Conference Preview: When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.
|
RSAC Conference Preview: MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says. |
Tuesday | March 24 | 8:30 AM - 9:20 AM PDT Speaker: T.J. Patterson, VP, Information Security Officer, STAR Financial Bank This session will show how cybersecurity risk assessments can bridge business and technical teams, influence culture, and drive clarity. Will discuss practical examples and strategies to engage subject matter experts and executives. More importantly, attendees will walk away with practical insights to help influence cybersecurity in their organizations in the way they've been trying to for years. |
Tuesday | March 24 | 8:30 AM - 9:20 AM PDT Session participants: Sandeep Kumbhat, Head of Global Field CTO, Okta; Akhila Nama, Head, Enterprise Security, Box AI agents often act as unmanaged "super admins," creating major security gaps. With 80% of organizations seeing agents exceed their scope, treating them as first-class identities is vital. This session will show how to build a secure identity layer using MCP and Cross App Access. Learn to authorize, trace, and govern the agent lifecycle to safely scale your agentic enterprise. |
Tuesday | March 24 | 9:40 AM- 10:30 AM PDT Speaker: Randy Rose, VP, Security Operations, Center for Internet Security Social engineering works because it targets what makes us human—our biases, shortcuts, emotions, and trust. This session explores psychological underpinnings that allow attackers to manipulate our very behavior. Drawing on insights from Kahneman, Cialdini, Milgram, and more on our cognitive machinery. You’ll leave with a deeper understanding of the psychology behind deception—and how to push back. |
Tuesday | March 24 | 1:15 PM - 2:05 PM PDT Speakers: Richard Horne, CEO, UK National Cyber Security Centre; Sandra Joyce, VP, Google Threat Intelligence, Google Security Our cyber risk is rising to unprecedented levels as our dependence on technology grows. Cyber attacks carry tangible, real-world consequences that ripple through societies and supply chains. Today’s connected web of threat actors is blurring boundaries and amplifying impact. In a world where cyber threats are multi-dimensional, our approach to defending our societies must match that. |
Tuesday | March 24 | 1:15 PM – 2:05 PM PDT Speakers: Mike Phillips, Security Architect, Dell Technologies; Jane Yuan, Security Architect, Dell Technologies As large-scale quantum computing moves closer to reality, organizations must act now. This session explores key challenges and best practices for PQC migration, bringing insights from real-world experience. Whether you're just getting started or already in motion, join to gain actionable guidance on scope, risk-based prioritization, algorithm selection, and more for a successful PQC transition. |
Tuesday | March 24 | 2:25 PM – 3:15 PM PDT Speakers: Omar ElAhdan, Principal, Mandiant; Joseph Mehegan, Practice Leader, Mandiant As cloud complexity and integrations grow, so do incident response (IR) challenges. We explore notable multi-cloud incidents from 2025. Gain a deeper understanding of emerging threats, proven techniques for navigating complex IR scenarios and actionable insights on proactive defense. Attendees will gain best practices for robust multi-cloud defense, detection, and response. |
Tuesday | March 24 | 2:25 PM – 3:15 PM PDT Speakers: Tim Haugh, Former Director and Commander (Ret.), NSA and US Cyber Command; Ted Schlein, Chairman & General Partner and General Partner, Ballistic Ventures and Kleiner Perkins; Paul M. Nakasone, Director, Institute of National Security, Vanderbilt University; Mike Rogers, Operating Partner, Team8; General Keith Alexander (Ret.), Former Director and First Commander, NSA and US Cyber Command Offensive cyber has long been a state-only domain, but private-sector “hack-back” calls are rising. This panel will feature four former NSA Directors, commanders of US Cyber Command, and four-star military officials as they debate ethics, policy, and escalation risks, offering rare insights into whether–and how–the private sector should go on the offensive. |
|
|
Comments
Post a Comment
Please leave a comment about our recent post.