RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Rsac Podcasts
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
Podcast by Fortscale
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Conversations between the venture investors and operators at Dell Technologies Capital and the people who are building what's next in enterprise technologies.
…
continue reading
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
…
continue reading
1
Episode 142: Revolutionizing Healthcare with Clinical Mobility
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26This conversation explores the transformative impact of clinical mobility and technology in healthcare, focusing on how Zebra Technologies enhances clinical workflows, improves patient and provider safety, and addresses security concerns. The discussion highlights innovations in nursing, the integration of AI, and the importance of measuring ROI in…
…
continue reading
1
Episode 141: Navigating the Intersection of Data and AI – Building a Robust AI Strategy
56:56
56:56
Play later
Play later
Lists
Like
Liked
56:56In this conversation, the speakers discuss the intersection of data strategy and AI strategy, emphasizing the importance of collaboration between different roles within the organization. They outline their 12-month plans for AI implementation, focusing on governance, risk management, and the challenges of data governance. The discussion also touche…
…
continue reading
1
Cybersecurity Awareness Month: Staying Safe Online
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06It's officially Cybersecurity Awareness Month with the theme being ‘Stay Safe Online’ this year. It’s an important month as it helps organizations and people build awareness and serves as a reminder to follow best practices to ensure digital safety. Tune into this podcast as RSAC is joined by the National Cybersecurity Alliance team who will delve …
…
continue reading
1
Bridging the Gap: Cybersecurity and Accessibility
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21Organizations often spend a lot of time ensuring they're complying with cybersecurity standards and regulations, but often, accessibility standards are overlooked. Accessibility, in a sense, starts with compliance as well. However, cybersecurity vendors, platforms, and programs often don't know these standards exist, don't know the legal ramificati…
…
continue reading
1
Episode 140: Signals of Post-Quantum Insecurity
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
…
continue reading
1
Intro to Building a Security Blueprint for Agents: Where to Start
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11Forbes recently reported that 81% of organizations cite AI agents as a top or high priority compared to other AI initiatives, with 51% of organizations already deploying AI agents. Building AI agents can be both rewarding and challenging, and if not built correctly, they can create major security risks. How can organization safely build agents? Tun…
…
continue reading
Learn how to design and maintain resilient, high-availability systems that scale. This session dives into real-world outage scenarios and the engineering strategies that enabled rapid recovery. Discover proven techniques like graceful degradation, fallback logic, and fault isolation, plus practical guidance on scaling cloud-native services. We’ll e…
…
continue reading
1
Start with Story: What the RSAC Program Committee Wants to Hear About Today’s SOC Challenges
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11The RSAC™ 2026 Call for Submissions is now open! Wondering what will WOW the reviewers? We asked our Program Committee members what’s front of mind for them, and they want to read about everything from industry challenges in the SOC to the art of threat intelligence to where AI is having the most impact. Join us to learn how to make your RSAC 2026 …
…
continue reading
1
Common Vulnerability Scoring System: Unpacking What's New in Version Four
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Every vulnerability announcement comes with a score. We’ve all seen them. We’ve all panicked when they are high. But where did that score come from, how was it calculated, and what is up with that string of random letters next to it? Those answers and more in this intro to where Common Vulnerability Scoring System (CVSS) scores come from, what's ne…
…
continue reading
Planning to submit a session proposal for the RSAC™ 2026 Conference? This podcast offers essential guidance on navigating the Call for Speakers (CFS) process. Join us as we speak with a Program Committee Member who will provide valuable tips and insights on crafting a compelling and innovative submission. Learn how to make your proposal stand out b…
…
continue reading
1
Why DNS Is Still the Biggest Blind Spot in Threat Intelligence
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40In this episode, DomainTools' Daniel Schwalbe is joined by Renee Burton (Infoblox), Raymond Dijkxhoorn (Surbl), and Peter Lowe (FIRST.org) to unpack the inaugural DomainTools Intelligence Report and what it reveals about DNS-based threats in 2024. The panel digs into evolving detection challenges, the pitfalls of domain scoring, the growing complex…
…
continue reading
1
Episode 139: RSAC 2025 Unpacked - Expert Reactions from the CNXN Security Team
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference. From the rise of AI-powered defenses and identity threats to the growin…
…
continue reading
1
From Newsroom to Threat Room: Audra Streetman’s Journey into Cybersecurity
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55In this episode of Breaking Badness, Kali Fencl sits down with Audra Streetman, a former journalist turned threat intelligence analyst at Splunk. Audra shares her journey from local newsrooms to the frontlines of cybersecurity, detailing how her storytelling skills translate directly into threat research.Audra walks us through how ransomware attack…
…
continue reading
1
Exposing Your Attack Surface on Purpose: API Chaos, AI Risk, and Quantum Reality
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Exposing Your Attack Surface on Purpose: API Chaos, AI Risk, and Quantum Reality by DomainToolsBy DomainTools
…
continue reading
1
Zero-Knowledge Threats, Shadow AI, and the Future of Cyber Attribution
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17In this RSA Conference 2025 special episode, we dive into the evolving world of cyberattribution, AI-powered threat tactics, and real-world incident response in AWS and GCPenvironments.Our guests include:● Tal Darsan and Etay Maor from Cato Networks, discussing stealthy attacker techniques,AI-powered evasion, and lessons from ransomware groups like…
…
continue reading
1
Courage and Resilience : Getting it, Keeping it, and Growing it
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on…
…
continue reading
1
Inside Ransomware’s Supply Chain: Attribution, Rebrands, and Affiliate Betrayal
44:47
44:47
Play later
Play later
Lists
Like
Liked
44:47In this RSA Conference 2025 special episode, we explore two critical frontiers shaping thefuture of cybersecurity.First, Jon DiMaggio (Author of The Ransomware Diaries, Analyst1) breaks down the hiddensupply chains behind ransomware gangs, including the economics of affiliate betrayal and thechallenge of accurate attribution. He walks us through hi…
…
continue reading
1
Unmasking the Risks of Generative AI Deception
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
…
continue reading
1
Beyond the Perimeter: How Attackers Use Domains, Phishing & AI and How to Fight Back
1:08:24
1:08:24
Play later
Play later
Lists
Like
Liked
1:08:24Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast!Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joi…
…
continue reading
1
Episode 138: Elevating Patient-centered Care with Intelligent Healthcare Technology
42:36
42:36
Play later
Play later
Lists
Like
Liked
42:36Join Jamal Khan and Jennifer Johnson as they explore the evolving landscape of AI in healthcare, focusing on its applications, ethical considerations, data privacy, and the role of Chief AI Officers. This discussion highlights the importance of governance, patient consent, and the potential of AI to improve healthcare workflows while addressing dat…
…
continue reading
In this episode of Breaking Badness, we sit down with Raji Vannianathan, a cybersecurity leader at Microsoft driving the charge on AI security and safety. Raji shares her experience leading the team responsible for managing the end-to-end lifecycle of AI vulnerability disclosures, building proactive safety frameworks, and cultivating a global commu…
…
continue reading
1
Beyond Learning to Code: How to Get Kids Curious About Cybersecurity
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cyb…
…
continue reading
1
Building Secure Campaigns and Better Humans: A Conversation with Mick Baccio
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03In this episode of Breaking Badness, Kali Fencl sits down with Mick Baccio, Global SecurityAdvisor at Splunk and former CISO for Pete Buttigieg’s 2020 presidential campaign. Mickshares his journey from aspiring Navy nuclear engineer to leading security in some of thehighest-stakes environments, including the White House.They explore how threat inte…
…
continue reading
1
Hacking the Stage: John Donovan on RSAC, BSides SF, and the Human Side of Cybersecurity
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
…
continue reading
1
Episode 137: Quantum Computing Threats and Countermeasures
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43Quantum computing represents a significant shift in computational power, offering both opportunities and challenges for securing sensitive data. Join the Connection Security Center of Excellence team as we delve into the transformative threats that quantum computing poses for cybersecurity and the countermeasures we should be considering to address…
…
continue reading
1
Inside Morphing Meerkat and Proton66: How Cybercrime Is Getting Easier
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
…
continue reading
Summary In this episode of the DTC podcast, Deepak Jeevankumar interviews Karl Mattson, a senior security leader at Endor Labs, discussing the RSA Conference's significance in cybersecurity, the impact of AI on security, and the current concerns of CISOs. They explore strategies for startups to maximize their presence at the conference and the impo…
…
continue reading
SUMMARY In this conversation, Deepak Jeevankumar interviews Ben Carr, the Chief Security and Trust Officer at Halcyon Security, discussing the evolving landscape of cybersecurity, particularly in relation to AI and the RSA Conference. They explore the challenges of AI adoption in enterprises, the changing role of the CISO, and the importance of bui…
…
continue reading
SUMMARY In this episode, Deepak Jeevankumar interviews Renee Gutmann, a seasoned CISO with extensive experience attending the RSA Conference. They discuss the evolution of the conference, advice for new CISOs, emerging trends in cybersecurity, the role of AI and automation, and the future challenges posed by quantum computing. Rene shares insights …
…
continue reading
1
DFIR Foundations: Real-World Lessons in Containment, Eradication, and Recovery
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
…
continue reading
1
DFIRside Chat: Lessons from the Frontlines of Incident Response
42:36
42:36
Play later
Play later
Lists
Like
Liked
42:36In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
…
continue reading
1
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
…
continue reading
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place t…
…
continue reading
1
Third Party & Vendor Risk Management: The Program Committee's Perspective
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuab…
…
continue reading
1
DNS Masterclass: Attacks, Defenses, and the Day the Internet Was Saved
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
…
continue reading
1
Guiding the Guide: Influence in Crisis Mode
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33This Podcast explores the essential skills needed to effectively influence leadership during a crisis. It begins by exploring different roles of crisis management and attendees will learn the importance of understanding what motivates the stakeholders and how aligning with these priorities enhances influence and explores the importance of building …
…
continue reading
1
From ValleyRAT to Silver Fox: How Graph-Based Threat Intel is Changing the Game
57:53
57:53
Play later
Play later
Lists
Like
Liked
57:53In this episode of Breaking Badness, host Kali Fencl welcomes Wes Young of CSIRT Gadgets and Daniel Schwalbe, CISO and head of investigations at DomainTools, dive into a recent DomainTools Investigations (DTI) analysis involving ValleyRAT and Silver Fox, and how new tools are enabling faster, more accessible analysis for junior and seasoned analyst…
…
continue reading
1
APT 41’s VPN Exploits & The Great Firewall’s Leaky Secrets
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17In this episode of Breaking Badness, we dive into two major cybersecurity stories: the exploitation of a VPN vulnerability by Chinese APT 41 and the newly discovered “Wall Bleed” flaw in the Great Firewall of China.APT 41 has been using a critical VPN vulnerability to infiltrate operational technology (OT) organizations, targeting industries like a…
…
continue reading
1
Hacked Chats & Telecom Takedowns: Black Basta & Salt Typhoon
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Episode 202 of Breaking Badness takes a deep dive into two of the biggest cybersecurity stories of the year (so far):● Black Basta’s Leaked Chats – A major data leak has exposed internal conversations from this notorious ransomware gang, revealing their internal struggles, ransom negotiations, and even workplace drama.● Salt Typhoon’s Cyber Espiona…
…
continue reading
1
Twine Security CEO Benny Porat on Hiring & Building in the Earliest Days
29:01
29:01
Play later
Play later
Lists
Like
Liked
29:01Building the Future of Cybersecurity with AI – Benny Porat, CEO of Twine Security Episode Description: In this episode of the DTC Podcast, Deepak Jeevankumar sits down with Benny Porat, co-founder & CEO of Twine Security. Benny shares his journey from co-founding Claroty to launching Twine, diving into the evolving cybersecurity landscape, the chal…
…
continue reading
1
Unpacking the Critical Infrastructure Track: A Committee Perspective
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58In this Podcast, we're joined by the Critical Infrastructure Program Committees to discuss the exciting submissions they've received for RSAC 2025. We'll delve into the key trends they observed, what submissions stood out to them, and what they're most looking forward to experiencing at Conference. Tune in to hear valuable insights and reflections …
…
continue reading
1
Building a Hacker Conference from Scratch: The Wild Origins of ShmooCon
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32In this episode of Breaking Badness, we sit down with Bruce and Heidi Potter, two of the masterminds behind ShmooCon, the legendary cybersecurity conference that ran for 20 years. They take us behind the scenes, from its hilarious bar-napkin origins to how they built a tight-knit hacker community that thrived for two decades.…
…
continue reading
1
Episode 136: Future-Proofing IT Operations with AIOps and Automation
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44AIOps is revolutionizing IT operations, enabling businesses to manage infrastructure more efficiently than ever. In this episode, we explore how automation, AI, and machine learning are reshaping IT management—driving self-healing systems, autonomous operations, and proactive performance optimization. As organizations scale, ensuring resilience, mi…
…
continue reading
1
Takeovers, DeepSeek Deceptions & the Cloud’s Dirty Laundry
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14In this episode of Breaking Badness, we dive into two major cybersecurity concerns: the risks of abandoned S3 buckets and a wave of phishing attacks impersonating DeepSeek. Watchtowr Labs uncovers how forgotten AWS storage can be hijacked for malicious purposes, potentially compromising military, government, and enterprise systems. Meanwhile, attac…
…
continue reading
1
Empowering Seniors: Practical Cybersecurity for the Digital Age
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50Seniors face growing cyberthreats like phishing and identity theft. This session simplifies cybersecurity, offering practical tools and strategies to help older adults and their caregivers recognize and avoid scams. Attendees will gain clear, actionable steps to protect themselves and their loved ones from evolving online dangers.Speakers:Alex East…
…
continue reading
1
Episode 135: Unveiling the Hidden Threats in Hyperconnected Healthcare (A Cyber-Thriller's Take on IoMT Security)
19:31
19:31
Play later
Play later
Lists
Like
Liked
19:31In a world where hospitals rely on interconnected medical devices to save lives, there are continuous hidden vulnerabilities lurking beneath the surface. This podcast dives into the realities of IoMT security with John Chirillo, Principal Security Architect and author of the newly released novella Silent 1ntrusions, alongside cybersecurity expert R…
…
continue reading
1
Cybersecurity’s Evolution, 200 Puns Later!
44:36
44:36
Play later
Play later
Lists
Like
Liked
44:36Welcome to the 200th episode of Breaking Badness! 🎉 In this special milestone edition, we take a nostalgic stroll down memory lane, discuss the evolution of cybersecurity, and explore how the podcast—and the security landscape—has changed since 2019.In this special milestone episode, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce are joine…
…
continue reading
1
Zero Trust, Secure Coding & Developer Incentives: Tanya Janca on AppSec’s Biggest Challenges
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49In this episode of Breaking Badness, we welcome back Tanya Janca, aka SheHacksPurple, to discuss her latest book, Alice and Bob Learn Secure Coding. Tanya dives deep into the fundamental principles of secure software development, the psychology behind developer incentives, and the often-overlooked importance of zero trust security.…
…
continue reading
1
A Conversation with Our Security Strategy & Architecture Program Committee
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11In today’s technological landscape, integrating AI into business operations presents both opportunities and complex security challenges. Our podcast will explore the importance of our Security Strategy and Architecture track, which examines robust security strategies from a diverse set of subject matter experts. We will cover foundational topics in…
…
continue reading
1
DNS Errors and Malware Builders Turning on Attackers
35:10
35:10
Play later
Play later
Lists
Like
Liked
35:10In this episode of Breaking Badness, we analyze two fascinating cybersecurity incidents that expose both corporate misconfigurations and hacker missteps. Security researcher Philippe Caturegli discovered a typo in MasterCard’s DNS records, which left the company open to traffic hijacking and data exposure. This long-overlooked flaw, dating back yea…
…
continue reading