In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.
What youโll learn:
-- Why credential theft remains the #1 initial access vector and what โphishing resistantโ MFA actually requires
-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it
-- Managing identity across the joinerโmoverโleaver lifecycle to close high-risk gaps
-- The โassume breachโ mindset: zero trust, least privilege, and blast radius reduction
-- The CISOโs evolving mandate: business vs. technology, board communication, and risk quantification
-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense
-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness
Who should watch:
Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.
๐ท Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity
๐ท Newsletter: www.cxotalk.com/subscribe
๐ท LinkedIn: www.linkedin.com/company/cxotalk
๐ท Twitter: twitter.com/cxotalk
#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk
00:00 ๐ Understanding Identity in Cybersecurity
03:51 โ ๏ธ How Identity is Breached
10:46 ๐ก๏ธ Improving Identity Security
13:03 ๐ Social Engineering and MFA Vulnerabilities
16:02 ๐ก๏ธ Protecting Personal Information and Identity
19:43 ๐ฉโ๐ผ The Evolving Role of CISOs in Cybersecurity
26:38 ๐ The Role of Regulation in Improving Data Privacy and Cybersecurity
28:51 ๐ Reframing Cybersecurity as Cyber Resilience
35:11 ๐ก๏ธ Practical Recommendations for Combating Phishing and Social Engineering
38:00 ๐ค The Role of AI in Cybersecurity
41:59 ๐ฐ Economics of AI in Cybersecurity
44:25 ๐ข Board-Level Cybersecurity Strategy
49:08 ๐ก๏ธ Understanding Ransomware and Response Framework
50:56 ๐ RSA Security's Focus Areas for Cybersecurity
52:47 ๐ข Closing Remarks and Call to Action