RSAC Rewind: Agentic AI, Governance Gaps, and Insider Threats
The recent RSAC Conference highlighted artificial intelligence (AI) as a dominant theme, revealing its pervasive influence in cybersecurity discussions. With nearly 44,000 attendees, 730 speakers, and 650 exhibitors, the event underscored the urgency of addressing both the potential and risks associated with AI technologies.
Full-Blown AI Adoption in Cybersecurity
Organizations have moved from a proof-of-concept phase to aggressive implementation of AI solutions. Research from the Cloud Security Alliance (CSA) indicates that 90% of organizations either currently adopt or plan to adopt generative AI for security purposes. This trend reflects a growing belief among IT and security professionals that AI can enhance their capabilities and free them for more strategic roles.
However, the rise of AI also presents significant challenges. Cybercriminals are leveraging AI to develop AI-enhanced malware, which has emerged as a primary risk for enterprise leaders. This dual-use of technology creates a modern-day Spy vs. Spy scenario, intensifying the stakes in the ongoing battle between cybersecurity defenders and malicious actors.
The term “agentic AI” was frequently mentioned at the conference, referring to AI systems that operate autonomously to achieve objectives without continuous human oversight. While this concept may signal innovation, it raises critical questions about governance and ethical implications in its application.
Security leaders are urged to focus on user involvement in Shadow AI—the unauthorized use of AI tools—and assess how these applications are being deployed within organizations. Notably, research indicates that 72% of generative AI usage in enterprises is attributed to shadow IT, emphasizing the need for better oversight and governance.
Gaps in Enterprise AI Governance
AI governance committees often concentrate narrowly on privacy and security concerns, neglecting broader issues such as legal liability, licensing exposure, and cost rationalization. Consequently, organizations may approve AI tools without conducting comprehensive risk evaluations, which include assessing intellectual property and third-party risks.
Current approaches tend to prioritize safe operations through local models and incident responses, but a shift towards broader, enterprise-focused AI planning is necessary. This strategy should align with organizational goals rather than simply functional execution.
Proliferating Insider Threats
Insider threats have existed long before the advent of modern cybersecurity, exemplified by historical cases of embezzlement and theft. Recent discussions at the conference highlighted alarming trends, such as the deception of major tech firms into hiring remote IT workers who are, in fact, North Korean cyber operatives.
Such incidents underline the critical need for collaboration among HR, legal, and security teams to detect fraudulent employment documents and address vulnerabilities in hiring platforms. Unfortunately, there is a lack of continuous dialogue about these emerging threats, with teams often focusing on compliance rather than proactive threat detection.
The RSAC Conference serves as a reflection of the current landscape in cybersecurity, where impactful trends and challenges are shared amidst a vibrant exchange of ideas. This year’s conference emphasized the importance of accountability, governance, and strategic planning in the face of rapid technological advancements.
While the challenges posed by AI and insider threats are significant, proactive measures can help mitigate potential harms. As the industry moves forward, it is essential to foster discussions on how organizations can effectively navigate these complex issues.