RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Rsac Podcasts
Each episode of the What It Means podcast features Forrester analysts providing their unique perspective on the latest news and trends impacting marketing, CX, and technology leaders.
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Welcome to the inside track of cybersecurity entrepreneurship. We bring you the best founders, operators, and investors building the future of cybersecurity.
…
continue reading
Podcast by Fortscale
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Security Boulevard Chats is the companion podcast to SecurityBoulevard.com. Hosted by long time cyber insiders, Techstrong CEO Alan Shimel and Techstrong CTO and GM Mitch Ashley discuss cyber-related topics making tomorrows headlines.
…
continue reading
Conversations between the venture investors and operators at Dell Technologies Capital and the people who are building what's next in enterprise technologies.
…
continue reading
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
…
continue reading

1
Episode 140: Signals of Post-Quantum Insecurity
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
…
continue reading

1
Defining AGI, Measuring AI Search, Agency Swirl Continues
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28Are you wondering about the emerging technologies and shifting market dynamics that might shape your strategy for 2026 and beyond? Then this episode is for you. Get a detailed look at how three big shifts could dramatically impact plans and strategies for the year ahead (and get a preview for one of our upcoming 2026 Predictions reports, to boot).…
…
continue reading

1
Intro to Building a Security Blueprint for Agents: Where to Start
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
…
continue reading

1
Sumit Dhawan: Leading Proofpoint’s AI evolution and building toward $5B in ARR
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58In this episode of Inside the Network, we sit down with Sumit Dhawan, CEO of Proofpoint, one of the largest private cybersecurity companies in the world. With over $2 billion in ARR, Proofpoint protects 85 of the Fortune 100 and is on a bold path toward $5 billion in revenue by 2030. Sumit’s journey is a masterclass in modern leadership. Having gra…
…
continue reading

1
Olympic Sports Sponsorships, AI Agents In Customer Success And Manufacturing
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42As we move into September, we dig into new sponsorship options for brands and find out how AI agents are impacting the customer success function as well as the industrial manufacturing and supply chain industries.By Forrester
…
continue reading

1
Jay Chaudhry: Betting on yourself and building a $40B+ Zero Trust giant in Zscaler
53:45
53:45
Play later
Play later
Lists
Like
Liked
53:45In this episode of Inside the Network, we sit down with Jay Chaudhry, founder and CEO of Zscaler, one of the most valuable cybersecurity companies in the world with a market cap of over $40 billion and $3 billion in ARR. Jay’s journey is unlike any other. Raised in a remote Indian village with no electricity, no running water, and a two-and-a-half-…
…
continue reading

1
Anthropic Lawsuit, AI And Energy, CMO Trends
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02As we hurtle toward the end of August, it’s time to look toward the future. More specifically, the future of Anthropic (and other AI firms), the future of AI as a technology, and the future of the CMO role.By Forrester
…
continue reading
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
…
continue reading

1
AI Pricing, Outcome-Based Pricing, Developer Productivity
26:01
26:01
Play later
Play later
Lists
Like
Liked
26:01As the annual budgeting and planning season comes into full swing, we drill down into two unique pricing trends. We then take a detailed look at how to measure developer productivity.By Forrester
…
continue reading

1
Start with Story: What the RSAC Program Committee Wants to Hear About Today’s SOC Challenges
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
…
continue reading

1
Michelle Zatlyn: Scaling Cloudflare to a $70B giant and building a better Internet
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48In this episode of Inside the Network, we sit down with Michelle Zatlyn, Co-founder and President of Cloudflare, one of the most iconic Internet infrastructure companies in the world. From its launch during the depths of the 2009 financial crisis to today’s $70 billion market cap and 5 million+ customers, Cloudflare has become a cornerstone of glob…
…
continue reading

1
Common Vulnerability Scoring System: Unpacking What's New in Version Four
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Every vulnerability announcement comes with a score. We’ve all seen them. We’ve all panicked when they are high. But where did that score come from, how was it calculated, and what is up with that string of random letters next to it? Those answers and more in this intro to where Common Vulnerability Scoring System (CVSS) scores come from, what's ne…
…
continue reading

1
AI Regulation In The US, Vibe Coding, Click To Cancel Hits Home
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55July heats up with a look at the impact of some regulatory moves in the US and a deep dive into a new AI trend for developers that may be more useful than you think.By Forrester
…
continue reading
Planning to submit a session proposal for the RSAC™ 2026 Conference? This podcast offers essential guidance on navigating the Call for Speakers (CFS) process. Join us as we speak with a Program Committee Member who will provide valuable tips and insights on crafting a compelling and innovative submission. Learn how to make your proposal stand out b…
…
continue reading

1
Fear In B2B Buying, Future Of Experiences, Cisco Live Recap
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02In this episode of What It Means, we dig into fear as a motivator in the B2B buying process, the human-centric future of digital experiences, and what CISOs need to know coming out of Cisco Live.By Forrester
…
continue reading

1
Why DNS Is Still the Biggest Blind Spot in Threat Intelligence
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40In this episode, DomainTools' Daniel Schwalbe is joined by Renee Burton (Infoblox), Raymond Dijkxhoorn (Surbl), and Peter Lowe (FIRST.org) to unpack the inaugural DomainTools Intelligence Report and what it reveals about DNS-based threats in 2024. The panel digs into evolving detection challenges, the pitfalls of domain scoring, the growing complex…
…
continue reading

1
Episode 139: RSAC 2025 Unpacked - Expert Reactions from the CNXN Security Team
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference. From the rise of AI-powered defenses and identity threats to the growin…
…
continue reading

1
From Newsroom to Threat Room: Audra Streetman’s Journey into Cybersecurity
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55In this episode of Breaking Badness, Kali Fencl sits down with Audra Streetman, a former journalist turned threat intelligence analyst at Splunk. Audra shares her journey from local newsrooms to the frontlines of cybersecurity, detailing how her storytelling skills translate directly into threat research.Audra walks us through how ransomware attack…
…
continue reading

1
Joe Levy: Scaling Sophos to $1B+ revenue and defending the 350M overlooked businesses
1:05:03
1:05:03
Play later
Play later
Lists
Like
Liked
1:05:03In this episode of Inside the Network, we sit down with Joe Levy, CEO of Sophos, a 40-year-old cybersecurity company that has quietly become one of the most important global players, serving over 600,000 organizations and generating over $1 billion in revenue. Throughout his career, Joe has operated with a founder's mindset: thinking in bets, build…
…
continue reading

1
TV Options For B2C, GenAI For CRM, Data Centers Go Nuclear
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00From pickleball to nuclear energy, this week’s episode covers a lot of ground. Listen in as Forrester analysts put three recent business headlines into context for sales, marketing, and technology leaders.By Forrester
…
continue reading

1
Exposing Your Attack Surface on Purpose: API Chaos, AI Risk, and Quantum Reality
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Exposing Your Attack Surface on Purpose: API Chaos, AI Risk, and Quantum Reality by DomainToolsBy DomainTools
…
continue reading

1
Zero-Knowledge Threats, Shadow AI, and the Future of Cyber Attribution
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17In this RSA Conference 2025 special episode, we dive into the evolving world of cyberattribution, AI-powered threat tactics, and real-world incident response in AWS and GCPenvironments.Our guests include:● Tal Darsan and Etay Maor from Cato Networks, discussing stealthy attacker techniques,AI-powered evasion, and lessons from ransomware groups like…
…
continue reading

1
Courage and Resilience : Getting it, Keeping it, and Growing it
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on…
…
continue reading

1
Perplexity’s Strategy, B2B Influencers, Salesforce Buys Informatica
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03If there’s one constant in business today, it’s change. New partnerships, new strategies, and new risks are popping up in all areas. In this episode, we look at three major changes taking place in the B2C, B2B, and enterprise application spaces and tap our analysts for their guidance on how to manage these changes.…
…
continue reading

1
Inside Ransomware’s Supply Chain: Attribution, Rebrands, and Affiliate Betrayal
44:47
44:47
Play later
Play later
Lists
Like
Liked
44:47In this RSA Conference 2025 special episode, we explore two critical frontiers shaping thefuture of cybersecurity.First, Jon DiMaggio (Author of The Ransomware Diaries, Analyst1) breaks down the hiddensupply chains behind ransomware gangs, including the economics of affiliate betrayal and thechallenge of accurate attribution. He walks us through hi…
…
continue reading

1
Unmasking the Risks of Generative AI Deception
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
…
continue reading

1
Beyond the Perimeter: How Attackers Use Domains, Phishing & AI and How to Fight Back
1:08:24
1:08:24
Play later
Play later
Lists
Like
Liked
1:08:24Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast!Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joi…
…
continue reading

1
Episode 138: Elevating Patient-centered Care with Intelligent Healthcare Technology
42:36
42:36
Play later
Play later
Lists
Like
Liked
42:36Join Jamal Khan and Jennifer Johnson as they explore the evolving landscape of AI in healthcare, focusing on its applications, ethical considerations, data privacy, and the role of Chief AI Officers. This discussion highlights the importance of governance, patient consent, and the potential of AI to improve healthcare workflows while addressing dat…
…
continue reading

1
New AI Lessons In Coding, Marketing, And Product Design
19:47
19:47
Play later
Play later
Lists
Like
Liked
19:47In this episode, we look at how to avoid the risks of AI-enabled tools in three common business use cases: coding, marketing, and product design. The key takeaway from all three areas: There’s still a strong need to have a human in the loop to review your AI outputs.By Forrester
…
continue reading
In this episode of Breaking Badness, we sit down with Raji Vannianathan, a cybersecurity leader at Microsoft driving the charge on AI security and safety. Raji shares her experience leading the team responsible for managing the end-to-end lifecycle of AI vulnerability disclosures, building proactive safety frameworks, and cultivating a global commu…
…
continue reading

1
Andy Cao and Hugh Thompson: Inside RSAC 2025’s biggest moments and boldest ideas
52:52
52:52
Play later
Play later
Lists
Like
Liked
52:52In this RSAC special episode of Inside the Network, we sit down not with one, but two remarkable guests from the center of the cybersecurity world. First, we’re joined by Andy Cao, COO of ProjectDiscovery, a company focused on open-source vulnerability management tools, which won the "Most Innovative Startup" award at the RSA Conference 2025 Innova…
…
continue reading

1
Temu On Tariffs, RSAC Review, SaaS Pricing Trends
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13In this episode, we look at how one online retailer is working to minimize the impact of tariffs on its business, provide a review of a major cybersecurity conference, and highlight a new trend in software-as-a-service (SaaS) pricing.By Forrester
…
continue reading

1
Beyond Learning to Code: How to Get Kids Curious About Cybersecurity
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cyb…
…
continue reading

1
Building Secure Campaigns and Better Humans: A Conversation with Mick Baccio
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03In this episode of Breaking Badness, Kali Fencl sits down with Mick Baccio, Global SecurityAdvisor at Splunk and former CISO for Pete Buttigieg’s 2020 presidential campaign. Mickshares his journey from aspiring Navy nuclear engineer to leading security in some of thehighest-stakes environments, including the White House.They explore how threat inte…
…
continue reading

1
Hacking the Stage: John Donovan on RSAC, BSides SF, and the Human Side of Cybersecurity
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
…
continue reading

1
Episode 137: Quantum Computing Threats and Countermeasures
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43Quantum computing represents a significant shift in computational power, offering both opportunities and challenges for securing sensitive data. Join the Connection Security Center of Excellence team as we delve into the transformative threats that quantum computing poses for cybersecurity and the countermeasures we should be considering to address…
…
continue reading

1
Google’s Monopolies, Microsoft’s AI Agents, Intel’s Latest Deal
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57In this episode, we look at a major legal ruling that could shake up the adtech market, some new capabilities to make AI agents even smarter, and a tech industry deal that could breathe new life into a struggling giant.By Forrester
…
continue reading

1
Inside Morphing Meerkat and Proton66: How Cybercrime Is Getting Easier
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
…
continue reading
Summary In this episode of the DTC podcast, Deepak Jeevankumar interviews Karl Mattson, a senior security leader at Endor Labs, discussing the RSA Conference's significance in cybersecurity, the impact of AI on security, and the current concerns of CISOs. They explore strategies for startups to maximize their presence at the conference and the impo…
…
continue reading
SUMMARY In this conversation, Deepak Jeevankumar interviews Ben Carr, the Chief Security and Trust Officer at Halcyon Security, discussing the evolving landscape of cybersecurity, particularly in relation to AI and the RSA Conference. They explore the challenges of AI adoption in enterprises, the changing role of the CISO, and the importance of bui…
…
continue reading
SUMMARY In this episode, Deepak Jeevankumar interviews Renee Gutmann, a seasoned CISO with extensive experience attending the RSA Conference. They discuss the evolution of the conference, advice for new CISOs, emerging trends in cybersecurity, the role of AI and automation, and the future challenges posed by quantum computing. Rene shares insights …
…
continue reading

1
DFIR Foundations: Real-World Lessons in Containment, Eradication, and Recovery
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
…
continue reading

1
Oracle’s Data Breach Silence, Tariff Impacts, Homegrown Social Influencers
27:33
27:33
Play later
Play later
Lists
Like
Liked
27:33In this episode, we look at the ongoing fallout from two healthcare data breaches involving Oracle servers and what the on-again, off-again tariffs could mean for CIOs. Then we discuss the rising prominence of social media influencers in the B2B space — and why tapping your own employees could be a smart move.…
…
continue reading

1
DFIRside Chat: Lessons from the Frontlines of Incident Response
42:36
42:36
Play later
Play later
Lists
Like
Liked
42:36In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
…
continue reading
There are some exciting changes coming to Forrester’s What It Means podcast. Get a sneak preview this week and tune in next week to hear a full episode.By Forrester
…
continue reading

1
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
…
continue reading

1
Dug Song: Values over valuation—reflections on building Duo Security and leading with purpose
1:25:31
1:25:31
Play later
Play later
Lists
Like
Liked
1:25:31In this episode of Inside the Network, we sit down with Dug Song, the legendary co-founder and former CEO of Duo Security. Dug's journey is nothing short of iconic—he turned a side project into a cybersecurity powerhouse with over 50,000 customers and a $2.35 billion exit to Cisco. In a world obsessed with unicorn status and funding hype, Dug stand…
…
continue reading
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place t…
…
continue reading

1
Third Party & Vendor Risk Management: The Program Committee's Perspective
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuab…
…
continue reading

1
DNS Masterclass: Attacks, Defenses, and the Day the Internet Was Saved
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
…
continue reading