Artwork

Content provided by Michael Krigsman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael Krigsman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

RSA Security CEO: Dangers of Weak Identity Security | CXOTalk #89

53:38
 
Share
 

Manage episode 508271731 series 1431021
Content provided by Michael Krigsman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael Krigsman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.

What you’ll learn:

-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires

-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it

-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps

-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction

-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification

-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense

-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness

Who should watch:

Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.

🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity

🔷 Newsletter: www.cxotalk.com/subscribe

🔷 LinkedIn: www.linkedin.com/company/cxotalk

🔷 Twitter: twitter.com/cxotalk

#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk

00:00 🔐 Understanding Identity in Cybersecurity

03:51 ⚠️ How Identity is Breached

10:46 🛡️ Improving Identity Security

13:03 🔒 Social Engineering and MFA Vulnerabilities

16:02 🛡️ Protecting Personal Information and Identity

19:43 👩‍💼 The Evolving Role of CISOs in Cybersecurity

26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity

28:51 🌐 Reframing Cybersecurity as Cyber Resilience

35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering

38:00 🤖 The Role of AI in Cybersecurity

41:59 💰 Economics of AI in Cybersecurity

44:25 🏢 Board-Level Cybersecurity Strategy

49:08 🛡️ Understanding Ransomware and Response Framework

50:56 🔒 RSA Security's Focus Areas for Cybersecurity

52:47 📢 Closing Remarks and Call to Action

  continue reading

537 episodes

Artwork
iconShare
 
Manage episode 508271731 series 1431021
Content provided by Michael Krigsman. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michael Krigsman or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.

What you’ll learn:

-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires

-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it

-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps

-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction

-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification

-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense

-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness

Who should watch:

Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.

🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity

🔷 Newsletter: www.cxotalk.com/subscribe

🔷 LinkedIn: www.linkedin.com/company/cxotalk

🔷 Twitter: twitter.com/cxotalk

#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk

00:00 🔐 Understanding Identity in Cybersecurity

03:51 ⚠️ How Identity is Breached

10:46 🛡️ Improving Identity Security

13:03 🔒 Social Engineering and MFA Vulnerabilities

16:02 🛡️ Protecting Personal Information and Identity

19:43 👩‍💼 The Evolving Role of CISOs in Cybersecurity

26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity

28:51 🌐 Reframing Cybersecurity as Cyber Resilience

35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering

38:00 🤖 The Role of AI in Cybersecurity

41:59 💰 Economics of AI in Cybersecurity

44:25 🏢 Board-Level Cybersecurity Strategy

49:08 🛡️ Understanding Ransomware and Response Framework

50:56 🔒 RSA Security's Focus Areas for Cybersecurity

52:47 📢 Closing Remarks and Call to Action

  continue reading

537 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play