Navigated to RSA Security CEO: Dangers of Weak Identity Security | CXOTalk #892
CXOTalk

·E892

RSA Security CEO: Dangers of Weak Identity Security | CXOTalk #892

September 24
53 mins

View Transcript

Episode Description

In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.

What you’ll learn:

-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires

-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it

-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps

-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction

-- The CISO’s evolving mandate: business vs. technology, board communication, and risk quantification

-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense

-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readiness

Who should watch:

Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.

🔷 Show notes and resources: https://www.cxotalk.com/episode/rsa-security-ceo-ai-identity-board-level-cybersecurity

🔷 Newsletter: www.cxotalk.com/subscribe

🔷 LinkedIn: www.linkedin.com/company/cxotalk

🔷 Twitter: twitter.com/cxotalk

#Cybersecurity #IdentitySecurity #MFA #ZeroTrust #CISO #BoardGovernance #AI #Ransomware #RiskManagement #CXOTalk

00:00 🔐 Understanding Identity in Cybersecurity

03:51 ⚠️ How Identity is Breached

10:46 🛡️ Improving Identity Security

13:03 🔒 Social Engineering and MFA Vulnerabilities

16:02 🛡️ Protecting Personal Information and Identity

19:43 👩‍💼 The Evolving Role of CISOs in Cybersecurity

26:38 🔒 The Role of Regulation in Improving Data Privacy and Cybersecurity

28:51 🌐 Reframing Cybersecurity as Cyber Resilience

35:11 🛡️ Practical Recommendations for Combating Phishing and Social Engineering

38:00 🤖 The Role of AI in Cybersecurity

41:59 💰 Economics of AI in Cybersecurity

44:25 🏢 Board-Level Cybersecurity Strategy

49:08 🛡️ Understanding Ransomware and Response Framework

50:56 🔒 RSA Security's Focus Areas for Cybersecurity

52:47 📢 Closing Remarks and Call to Action

See all episodes

Never lose your place, on any device

Create a free account to sync, back up, and get personal recommendations.