Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Microsoft’s AI helper, Copilot Vision, is now live

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025

      Trump tariffs reignite Europe’s push for cloud sovereignty

      April 17, 2025
    • Crypto

      XRP Price Slips as Bears Tighten Grip and Short Bets Surge

      June 12, 2025

      HTX Launches TRX Options, Empowering Users with Flexible and Diversified Trading Strategies

      June 12, 2025

      Ethereum Leverage At All-Time High as BlackRock Ramps Up Accumulation

      June 12, 2025

      HBAR Price Downtrend Set To Face Volatility Explosion; Recovery Likely

      June 12, 2025

      Aura (AURA) Token Skyrockets Over 3,500%, But Analysts Urge Caution Amid Rug Pull Fears

      June 11, 2025
    • Technology

      AMD’s powerful AI chips can finally be unleashed on Windows PCs

      June 13, 2025

      Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

      June 13, 2025

      Microsoft’s AI helper, Copilot Vision, is now live

      June 13, 2025

      Microsoft throws shade at macOS Tahoe’s familiar new vista

      June 13, 2025

      WTF is sell-side decisioning?

      June 12, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»RSAC rewind: Agentic AI, governance gaps and insider threats
    Technology

    RSAC rewind: Agentic AI, governance gaps and insider threats

    TechAiVerseBy TechAiVerseMay 30, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    RSAC rewind: Agentic AI, governance gaps and insider threats
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    RSAC rewind: Agentic AI, governance gaps and insider threats

    AI was naturally a major theme of this year’s RSAC conference, but we maybe failed to anticipate how it is coming to dominate every conversation.

    By

    • James Robinson, Netskope

    Published: 29 May 2025

    This year’s RSAC Conference drew record numbers of nearly 44,000 attendees, 730 speakers, 650 exhibitors and 400 media members. And as one of those who attended and spoke with countless organizations, partners and CISO peers, I can safely say that practically every single person there had something to say about the use of or abuse of artificial intelligence (AI) in cyber security.

    We all expected AI to dominate the discussion. But we didn’t anticipate how deeply it would embed into every company update or overview, strategy session, customer conversation and even hallway and happy hour chats. As is often the case, the line between reality and hype can quickly blur. In an attempt to provide a sense of clarity at his particular moment in time, here is a breakdown of three key topic points at the conference:

    Full-blown AI adoption in cyber security, whether we’re ready for it, or not

    We have unofficially transitioned from a proof-of-concept phase to aggressive implementation. In fact, 90%  of organiaations are either currently adopting generative AI for security, or are planning to do so, according to research from the Cloud Security Alliance (CSA). The vast majority of IT and security professionals feel that these technologies can improve their skill sets and support their roles, while freeing them up for more rewarding, valuable assignments.

    On the flip side, cyber criminals are also making abundant use of this ever-evolving innovation – to the point in which AI-enhanced malware ranks as a top risk for enterprise leaders, according to Gartner. This sets up a modern-day Spy vs. Spy scenario in which the good guys and bad guys battle it out in a technology arms race, with the stakes getting increasingly higher and the precarious potential for unleashed, harmful AI growing more likely.

    The term “agentic AI,” for example, loomed large on the minds of many conference attendees. Simply defined, this refers to AI systems that act autonomously to pursue goals and solve problems without constant human guidance or oversight. It is difficult, however, to determine whether the concept signals genuine innovation or just repackaged marketing speak.

    For now, security leaders should focus on the users and ask to what extent are they taking part in Shadow AI, and how are they deploying AI applications? In our own research, we’ve found that most generative AI (GenAI) usage in the enterprise (72%) is currently attributed to shadow IT. 

    We know that AI left alone will transition swiftly in the direction of any and all forms of usage. It’s already starting to resemble the rapidly expanding universe of cloud adoption of years past. Transforming into this level of AI ubiquity requires deeper questions – and answers – about integration, accountability and governance. Which brings us to our next conference topic point.

    Gaps in enterprise AI governance

    Too often, AI governance committees are narrowly fixated on privacy and security concerns, rather than broader considerations such as legal liability, licensing exposure, cost and technology overlap rationalisation and appropriate use. As a result, organizations are approving AI tools without conducting full risk evaluations, including intellectual property and third-party risks such as code contributions.

    For now, leaders seem to prioritise safe operation using local models, outright blocks, incident response and detection, along with other short-term use cases. But they must shift from this approach to a state of broader, enterprise-focused AI planning that is guided by strategic, organisational goals, and not merely functional execution.

    Proliferating insider threats

    These threats, of course, are older than cyber security itself. Think of the embezzling finance employee in the 1950s, or the factory worker who surreptitiously slipped company property in his pocket. There was plenty of chatter onsite about the widespread scam in which top tech firms in the US have been tricked into hiring remote IT workers who happen to be North Korean cyber operatives.

    This speaks to the need for closer alignment among HR, legal and security teams to detect forged employment documents and eliminate hiring platform vulnerabilities. Unfortunately, there aren’t enough ongoing conversations about these emerging threats, with HR, legal, and security teams more likely to collaborate on compliance requirements and reactive, after-the-fact incident investigations.

    Throughout its existence, the RSAC Conference has reflected the present state of cyber security, with impactful trends and challenges conveyed amid the cacophony of booths, presentations, demonstrations and conversations. This most recent conference has proved no exception, especially when it comes to new patterns in AI and insider threats.

    That said, a consistent thread has emerged over the years: The need for proactive accountability, guidance and governance.

    With this, security leaders won’t entirely mitigate the damaging outcomes of AI or ill-willed insiders. But they’ll take major steps in containing them. Hopefully in a few months, when we arrive at Black Hat, we’ll be talking more about how organizations are now able to more consistently and successfully do that.

    James Robinson is chief information security officer at secure access service edge (SASE) and zero-trust specialist Netskope.

    Read more on Security policy and user awareness


    • News brief: AI security risks highlighted at RSAC 2025

      By: Sharon Shea


    • RSAC Conference 2025 video reports

      By: Brenda Horrigan


    • 3 EUC security topics I’ll be looking for at RSAC 2025

      By: Gabe Knuth


    • Data security and identity security themes at RSAC 2025

      By: Todd Thiemann

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleAI and compliance: Staying on the right side of law and regulation
    Next Article Zero-trust is redefining cyber security in 2025
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    June 13, 2025

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    June 13, 2025

    Microsoft’s AI helper, Copilot Vision, is now live

    June 13, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202523 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202518 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 13, 2025

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    AMD’s powerful AI chips can finally be unleashed on Windows PCs Skip to content Image:…

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Microsoft’s AI helper, Copilot Vision, is now live

    Microsoft throws shade at macOS Tahoe’s familiar new vista

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    June 13, 20250 Views

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    June 13, 20250 Views

    Microsoft’s AI helper, Copilot Vision, is now live

    June 13, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.