Skip to content

Cyber Innovation Vanguard at RSAC Conference 2025: Pioneering the Future of Cybersecurity

Highlights of the event included ransomware discussions, quantum computing, and artificial intelligence as the main areas of emphasis.

Highlights from this year's event included discussions on ransomware, advancements in quantum...
Highlights from this year's event included discussions on ransomware, advancements in quantum computing, and a predictable emphasis on artificial intelligence.

Cyber Innovation Vanguard at RSAC Conference 2025: Pioneering the Future of Cybersecurity

In this dynamic cybersecurity world, IT bigwigs are constantly juggling evolving threats and emerging technologies to stay one step ahead of attackers. With nation-states providing a helping hand to threat groups with increasingly sharp and pointed objectives, coupled with the rapidly advancing AI technology in cybersecurity, it's a time both alarming and exhilarating to specialize in this field.

At the RSAC conference held in San Francisco, Scott Becker, the director of Webinar Programs at ActualTech Media, and Alan Liska, threat intelligence analyst and 'ransomware sommelier' at Recorded Future, discuss the sector's future, comparing threats like ransomware to emerging concerns such as quantum decryption, and why AI is the topic on everyone's lips.

Highlights

"I see a growing concern around data protection, more emphasis on understanding where your data is and maintaining control, whether it's inside or outside your network. And I've noticed that many vendors are focusing on addressing this need as data theft has become a crucial component of ransomware attacks."

"China is home to some incredibly skilled hackers. They've had this talent for a long time, and their experience, spanning 30 years or more, is indispensable. However, much of what happens behind the scenes in Chinese nation-state cyberattacks remains unknown due to our lack of access and insight."

"The idea of shifting more of the responsibility for defense onto state and local governments seems questionable to me. I don't doubt their capabilities, nor those of their employees working diligently in security. But from a realistic perspective, they're going up against adversaries like China, Russia, and sophisticated cybercriminal groups. The intelligence provided by CISA is invaluable in these scenarios."

"Suppose quantum computing is still 10 years away. In that case, governments should start planning their encryption strategy immediately to ensure data encryption is completed in time. This is just a reality we need to face."

Get informed with our daily newsletter

Sign up today and receive a free copy of our Future Focus 2025 – the most comprehensive guidance on AI, cybersecurity, and other IT challenges based on insights from 700+ senior executives.

"If quantum computing is 10 years away, governments need to start figuring out their encryption strategy now so they can start getting that data encrypted, to have it encrypted in time. I mean, that's just the reality."

Footnotes

  • RSAC 2024: Pulse of the Industry
  • RSAC 2025: Evolving Threat Landscape
  • RSAC 2026: Balancing Defenses and Offenses
  • RSAC 2027: The Age of Quantum Cybersecurity
  • "The Role of Data Governance": Microsoft Security VP on how data management will shape the future of cybersecurity
  • "Embracing AI in Cybersecurity": Cybersecurity experts discuss the challenges and opportunities brought on by AI integration in cyber defense
  • "Paradigm Shift in CyberEspionage": A closer look at the growing role of China and other nation-states in cyberattacks and what it means for global security
  • RSAC 2028: Reshaping the Future of Cybersecurity

Subscribe

  • Subscribe to The IT Pro Podcast on Apple Podcasts
  • Subscribe to The IT Pro Podcast on Spotify
  • Subscribe to the IT Pro newsletter
  • Follow us on LinkedIn

Insights from Enrichment Data:

The cybersecurity landscape in 2025 is marked by rapid evolution, driven by technological advancements and shifting threat actor strategies. Below is an analysis of current trends and emerging concerns, focusing on data governance, quantum decryption, AI adoption, and nation-state threats, including those from China.

Data Governance

  • Strict Regulatory Requirements: Organizations face mounting pressure to comply with complex data protection regulations, necessitating robust policies for data classification, access controls, and breach reporting.
  • Third-Party Risks: Increased reliance on third-party vendors and cloud services has expanded the attack surface, making supply chains a prime target for attackers seeking to compromise data via less-secure partners.
  • Data Privacy and Integrity: The proliferation of IoT devices and remote work environments has led to new vulnerabilities, demanding heightened data privacy controls and integrity checks across distributed systems.

Quantum Decryption

  • Emerging Quantum Threats: Quantum computing poses a significant long-term risk to current encryption standards. While not yet operational for breaking widely-used encryption algorithms, the potential for quantum computers to decrypt secure communications is prompting preemptive action.
  • Post-Quantum Cryptography: Organizations are beginning to evaluate and adopt post-quantum cryptographic algorithms to safeguard sensitive data against future quantum decryption threats.
  • Readiness Gaps: Many enterprises are not yet fully prepared for quantum threats, highlighting a need for awareness and strategic planning in data protection.

AI Adoption in Cybersecurity

  • Enhanced Detection and Response: AI and machine learning are increasingly integrated into security operations centers, automating threat detection, incident analysis, and response.
  • Predictive Threat Intelligence: AI-driven analytics enable organizations to predict and preemptively address vulnerabilities by identifying patterns and anomalies in real-time.
  • Double-Edged Sword: AI strengthens defenses, but it is also used by adversaries to create more sophisticated attacks, such as AI-driven phishing, malware, and deepfake-based social engineering.
  • Gaps and Challenges: Despite AI’s promise, implementation gaps remain, including integration issues with legacy systems and the need for skilled personnel to manage and interpret AI-driven insights.

Nation-State Threats: Focus on China

  • Sophisticated APTs: Nation-states, including China, sponsor Advanced Persistent Threat (APT) groups that conduct cyberespionage, data theft, and sabotage. These groups are increasingly sophisticated, often remaining undetected for extended periods.
  • Geopolitical Motivations: State-backed actors target critical infrastructure, intellectual property, and sensitive government data to advance geopolitical agendas and gain strategic advantages.
  • AI and Social Engineering: Nation-state actors leverage AI to enhance their attack methods, including AI-driven phishing campaigns and automated reconnaissance. Social engineering tactics are now more targeted and harder to distinguish from legitimate communications.
  • Blurred Lines: The distinction between cybercrime and cyberespionage is fading, as state-sponsored groups employ tactics traditionally associated with criminal organizations, such as ransomware and double extortion.
  1. In their podcast discussion at the RSAC conference, Scott Becker and Alan Liska highlighted the need for increased focus on data governance in the rapidly evolving cybersecurity landscape, due to the growing concern around data protection and the crucial role it plays in ransomware attacks.
  2. As nations like China continue to develop their cyber capabilities, the domain of data-and-cloud-computing and AI technology in cybersecurity becomes even more significant, given the increasing sophistication of state-backed Advanced Persistent Threat (APT) groups and their impacts on global security.

Read also:

    Latest