
In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now. What you’ll learn: -- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires -- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it -- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps -- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction -- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification -- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense -- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness Who should watch: Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business. 🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity 🔷 Newsletter: www.cxotalk.com/subscribe 🔷 LinkedIn: www.linkedin.com/company/cxotalk 🔷 Twitter: twitter.com/cxotalk #Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk 00:00 🔐 Understanding Identity in Cybersecurity 03:51 ⚠️ How Identity is Breached 10:46 🛡️ Improving Identity Security 13:03 🔒 Social Engineering and MFA Vulnerabilities 16:02 🛡️ Protecting Personal Information and Identity 19:43 👩💼 The Evolving Role of CISOs in Cybersecurity 26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity 28:51 🌐 Reframing Cybersecurity as Cyber Resilience 35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering 38:00 🤖 The Role of AI in Cybersecurity 41:59 💰 Economics of AI in Cybersecurity 44:25 🏢 Board-Level Cybersecurity Strategy 49:08 🛡️ Understanding Ransomware and Response Framework 50:56 🔒 RSA Security's Focus Areas for Cybersecurity 52:47 📢 Closing Remarks and Call to Action
From "CXOTalk"
Comments
Add comment Feedback