Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » On Location at RSA: How Cybersecurity Is Evolving With AI and Identity-Centric Security
Cybersecurity

On Location at RSA: How Cybersecurity Is Evolving With AI and Identity-Centric Security

Chris HughesBy Chris HughesMay 2, 20233 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

I recently returned home from RSA Conference 2023. RSA, of course, is one of the largest cybersecurity events in our entire industry. This year it boasted around 49,000 registrants. Here are some key takeaways from my perspective as a chief information security officer (CISO), analyst, and longtime cybersecurity practitioner.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

AI-Enabled Defense

It seems you can’t turn anywhere today without seeing an article about artificial intelligence (AI). Every day there are new headlines on topics ranging from AI’s impact in the classroom to nation-states integrating AI with national security capabilities to governments potentially regulating AI risks.

The buzz at RSA was no different, with many vendors putting AI front and center. As I walked the expo floor of the robust vendor ecosystem, I observed countless vendor discussions on the part AI was playing in capabilities and products, especially in the areas of automating secure code reviews, threat modeling, and vulnerability prioritization.

The Chief Security Officer (CSO) of RSA himself took the stage, accompanied by an AI avatar. He discussed the implications of AI on technology, cybersecurity, and society. The AI avatar said there is “zero chance of zero trust, without the use of AI”.

As an industry, we are emphasizing the role AI will play in cybersecurity, and AI seems to agree with us.

Identity-Centric Security

We’ve continued to see an industry-wide push for zero trust, with identity now being a core focus, and many stating that we’re moving away from the legacy perimeter-based model to an “identity-centric” security model. The trends that surfaced at RSA supported that claim, with many vendors emphasizing the role of identity and access management (IAM) in helping organizations manage identities, permissions, access control, and more, and doing so in our modern complex multi-cloud and hybrid cloud environments.

Capabilities I saw included things such as:

  • phishing-resistant multi-factor authentication
  • dynamic least-permissive access control
  • context-aware automation to facilitate access from the distributed and remote workforce
Insights into the Why & How to Secure SaaS Applications_featured
Guidebook: Secure SaaS Applications

Managing the Complex Modern Attack Surface

Ask any cyber practitioner, and they will tell you that the modern attack surface is robust, and the threat landscape is constantly changing. Another central theme I saw among vendors and products at RSAC 2023 was trying to manage the modern attack surface, or, as some called it, exposure management.

We now have data and workloads running in multi-cloud and hybrid-cloud environments, hundreds of different software-as-a-service (SaaS) applications, a distributed workforce with bring-your-own device (BYoD) endpoints — all of which the enterprise has limited control over.

All of these factors lead to a challenging attack surface to monitor, manage, and govern. Connect that to the growth of software supply chain attacks, third-party risk management, and application programming interface (APIs), and the problem is even more complex and daunting.

Many vendors at the conference were trying to help organizations address this complex attack surface by ensuring they are both producing and consuming secure software components, monitoring their interconnections and data flows to and from third parties, and getting a handle on their API security in modern DevSecOps microservices environments.

Final Thoughts

At the end of the day, we’re seeing the industry evolve, grapple with complex attack surfaces, focus on identity-centric cybersecurity, and leverage AI and automation to try and keep pace with the changing threat landscape that easily surpasses what humans alone can do.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

ai Artificial Intelligence automation CISO devsecops featured multi-cloud phishing SaaS supply chain zero trust
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter

July 3, 2025

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.