❌

Normal view

My Really Fun RSA 2026 Presentations!

9 March 2026 at 23:28

This blog is perhaps a little bit more like an ad, so if you don’t want to check the ads, consider not readingΒ it.

a very cyber imageΒ (Gemini)

But this year at RSA 2026, I’m speaking on three topics: securing AI, using AI for SOC, and sharing lessons about how Google applies AI and other technologies toΒ D&R.

Here are these 3 funΒ things!

First, I’m doing a presentation on governing shadow AI agents. Believe it or not, this presentation was created mostly before OpenClaw became a thing (but updated for it!). So you may be surprised how well the content aged (think wine!) Attend this if you are struggling with shadow AI, specifically shadow agents atΒ work.

Shadow Agents: A Pragmatist’s Guide to Governing Unsanctioned AIβ€Šβ€”β€Š[STR-W08]

  • Wednesday, Mar 25 1:15 PMβ€Šβ€”β€Š2:05 PMΒ PDT

It is not the APT! The new threat is the β€œshadow AI agents” employees already use for work, leaking data and making decisions. Banning them is a losing game. This session will offer a better way: turn this organic behavior into a catalyst for secure progress. Learn to discover, assess, and channel unsanctioned agents into a formal strategy that empowers a team rather than force it underground.

The second is probably the most detailed discussion about how we use AI for detection and response at Google. You probably read our blogs and listen to our talks (especially this), but this time we are revealing a lot more interesting details about the machinery and also how we arrived at the state we’re in. I promise you this will be fun! And detailedΒ too.

This Is How We Do It: Building AI Agents for Cybersecurity and Defenseβ€Šβ€”β€Š[PART3-M07]

  • Monday, Mar 23 2:20 PMβ€Šβ€”β€Š3:10 PMΒ PDT

Presenters will share the playbook for building and scaling AI agents in cybersecurity. Attendees will learn four core lessons: Building trust with the team, prioritizing real problems, measuring value, and establishing solid governance foundations for the agenticΒ SOC.

Finally, the third isn’t a presentation but a discussion that would help you understand the real state of AI in security operations / SOC. This would not be about the slides, but about sharing lessons on what works and whatΒ doesn’t.

AI in SecOps: Sharing Lessons Learned for Adoption Maturityβ€Šβ€”β€Š[CXN-R05]

  • Thursday, Mar 26 12:20 PMβ€Šβ€”β€Š1:10 PMΒ PDT

Attendees in this peer-led discussion will share stories from the AI-powered SOC trenches. Explore real adoption journeys from manual processes to autonomous agents. Share practical use cases on analyst retraining, workflow auditing, malware analysis, remediation automation, RAG pipelines and more. Trade notes on what’s working, what’s breaking, trust gaps, AI hallucinations, and career redesign.

All in all, join me for securing AI and Shadow Agents, learning from Google about detection and response, and comparing the state of practice of AI in theΒ SOC.

See youΒ there!

P.S. Yes, we will also be podcasting from theΒ show.

Related:

RSA 2025: AI’s Promise vs. Security’s Pastβ€Šβ€”β€ŠA Reality Check”


My Really Fun RSA 2026 Presentations! was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

CPT Cybersecurity Conference

19 February 2026 at 10:06

Name : CPT Cybersecurity Conference
Website: https://www.cycomhackingconference.com/
Date: March 4-5, 2026
Location: Allianz Arena, Munich, Germany
CPT 2026: Connect. Protect. Transform.Join Germany’s top voices for Cybersecurity at Munich’s Allianz Arena from March 4–5. Master NIS-2 compliance, AI resilience, and BSI standards through high-level networking and expert keynotes. Secure your strategy for the digital future.

CPT 2026: Strategic Resilience & Digital SovereigntyWho determines our digital future?Technological dependencies, data sovereignty, and AI-driven transformation are no longer abstract conceptsβ€”they are the decisive factors for Europe’s future. At CPT 2026, we bring together the leading voices of the Munich cybersecurity ecosystem to move from reactive implementation to active sovereignty.The Key QuestionsIn the heart of Munich’s tech hub, we address the core challenges of our industry:

  • How can we preserve digital sovereignty while maintaining global connectivity?
  • How much technological dependency is unavoidable β€” and what are the strategic consequences?

Who sets the rules β€” governments, global corporations, or the specialized expertise within our network?

Why You Should AttendCPT 2026 acts as a high-level summit for 400 selected decision-makers and experts, creating a space for perspectives that rarely meet directly.

  • Eye-Level Dialogue: Engage with Claudia Plattner (BSI), Dunja Hayali, Uli Hoeneß and top industry leaders.
  • Knowledge Advantage: 16 interactive Masterclasses (e.g., AI liability, BSI-C5 standards) and 4 panel discussions.
  • Network & Connect: Strengthen your ties within the Munich Cybersecurity Network and build lasting relationships with technology and policy experts.

Secure your place at the centre of the dialogue and establish your lead in the 2026 transformation.Get your ticket: https://www.cpt.events/

The post CPT Cybersecurity Conference appeared first on CISO MAG | Cyber Security Magazine.

Stone, parchment or laser-written glass? Scientists find new way to preserve data

Hard disks and magnetic tape have a limited lifespan, but glass storage developed by Microsoft could last millennia

Some cultures used stone, others used parchment. Some even, for a time, used floppy disks. Now scientists have come up with a new way to keep archived data safe that, they say, could endure for millennia: laser-writing in glass.

From personal photos that are kept for a lifetime to business documents, medical information, data for scientific research, national records and heritage data, there is no shortage of information that needs to be preserved for very long periods of time.

Continue reading...

Β© Photograph: Tetra Images/Erik Isakson/Getty Images

Β© Photograph: Tetra Images/Erik Isakson/Getty Images

Β© Photograph: Tetra Images/Erik Isakson/Getty Images

What 5 Million Apps Revealed About Secrets in JavaScript

17 February 2026 at 15:40
Leaked API keys are nothing new, but the scale of the problem in front-end code has been largely a mystery - until now. Intruder's research team built a new secrets detection method and scanned 5 million applications specifically looking for secrets hidden in JavaScript bundles. Here's what we learned. [...]

Cycom Hacking Conference

17 February 2026 at 10:16

Name : Cycom Hacking Conference
Website: https://www.cycomhackingconference.com/
Date: April 23-24, 2026
Location: Montpellier, France
The CYCOM Hacking Conference is the annual cybersecurity event organized by Devensys Cybersecurity. A key event in Montpellier and Occitanie, CYCOM brings together the entire cybersecurity ecosystem for several days: professionals, technical experts, students, specialized schools, institutions, local authorities, technology partners, and industry associations.

Designed as a technical, educational, and community event, CYCOM highlights offensive, defensive, and operational cybersecurity practices through a packed program of conferences, demonstrations, feedback sessions, round tables, workshops, technical presentations, and professional meetings.
The event also includes highly anticipated highlights, such as its nighttime Capture The Flag (CTF), a hacking challenge lasting several hours that brings together enthusiasts, student teams, and experienced technical professionals.

Before the opening, a half-day event called EDUCYCOM is entirely dedicated to schools, students, and people undergoing retraining. It offers orientation workshops, introductions to major certifications (CCT, CEH, CISSP, OSCP), and an educational β€œhackathon” on cybersecurity.

CYCOM has two main goals:

  1. To share a high level of technical expertise in an accessible and practical way.
  2. To encourage networking and discussion between different players in the digital sector, both public and private.

Held at Kiasma in Castelnau-le-Lez (Montpellier MΓ©tropole), CYCOM welcomes several hundred participants each year and continues to expand its format with new activities, more conferences, and a growing partner village.

The post Cycom Hacking Conference appeared first on CISO MAG | Cyber Security Magazine.

❌