Join daily and weekly newsletters to obtain the latest updates and exclusive content to cover the leading artificial intelligence in the industry. Learn more
Meanwhile, more than 20 sellers announced security agents, platforms and platforms based on artificial intelligence Rsac 2025The most insightful news from the conference is a rare and encouraging direction of security leaders. For the first time in three years, the effectiveness of cyberspace in general improved.
Venture scale partners (SVP) recently released 2025 Report of Cyber Security Perspective, Which participated in the average effectiveness of cybersecurity protection for the first time in three years, and rose to 61 % this year of 48 % in 2023. According to the report, “70 % of security leaders were more protection than public hunting attacks, with only 28 % of the settlement reporting companies.”
SVP also found that 77 % of CISOS believe that protecting artificial intelligence models and data pipelines is a priority to improve their security position by 2025, an increase of 55 % last year. It is worth noting that due to the flow of new AI Agence solutions announced in RSAC, 75 % of companies expressed their interest in taking advantage of artificial intelligence to automate the investigations by using artificial intelligence agents to finate large amounts of security alerts to prevent security incidents.

SVP height in effectiveness numbers is not transverse; It is the result of CISO and their teams that adopt automating on a large scale with the unification of their platforms successfully and reduce the gaps that attackers have gone through in the past.
“If you do not have a complete vision, the attackers will go through cracks between the products,” said ETay Maor, director of security strategy at Cato Networks, for Venturebeat during RSA 2025.
Agentic AI moves quickly to no more than the minimum of the vibrant product to the platform DNA
The MAOR perspective explains why there is a new definition of the minimum applicable product of the artificial intelligence agent in cybersecurity. RSA 2025 revealed how AI Agency became mature. There is a group of sellers who use Agency AI as a code -based adhesive to unify the rules and applications of code together, then there are those who have been in this for years, and Agency AI is the essential for their code.
Cyber security provides in this last group, where Agency AI is essential for their platform, and in many cases, they continue to spend R&D on output in Agency AI. This includes Cato Networks Sase Cloudand Defense CISCO AIand Falcon agent individual for Crowdstrikeand Darktrace’s Cyber AIand Flexible assistant from artificial intelligenceand Microsoft Copilot and Defender XDR Suite. Palo Alto Networks’ Cortex Xsiamand Sentinelone platform exclusivity and Cognito platform at Vectra AI.
Organizations that depend on integrated detection that depends on artificial intelligence with automatic containment reduces housing times after that 40 %. They too Nearly twice To neutralize clinical interventions before the occurrence of side motion. Sellers in the exhibition hall often depend on identity management scenarios and access to show how their work agent can help in trim the work burdens of the security operations center analysts (SOC).

“Identity will be an important component of artificial intelligence throughout its life cycle. Artificial intelligence agents will need identities. They will need to understand zero confidence, and how do we verify it? Jakkal said briefly,” Artificial intelligence must begin first with safety. It is very important to develop our security mechanisms quickly as we develop artificial intelligence. “
There was a common topic for every experimental show of artificial intelligence in the exhibition hall is the triangulation of attack data, and quickly gained visions in the form of Tradecraft that are used and then determining the actual time containment strategy.
Crowdstrike explained how the artificial intelligence agent can burn from detection to actual time through a direct investigation into the North Korean threat campaign to put a Devops tenant in strategic technology companies in the United States and around the world. Tradecraft of The famous Chollima DPRK During the impersonation of the Devops employment from a distance, the human resource checks and the high legitimate tools, including RMM and VS Code, are slipped for quietly penetrating data. It was a sharp reminder, although the strong AI, still depends on the human being in the ring to discover adaptive threats and microblogging models before the signal is lost in the noise.
GEN AI’s goal: discovery of Tradecraft in the nation -state and killing it
They are attacks in which no one, company or nation is coming and which are the most destructive and challenging to contain and overcome them. Thinking about the destructive threats that the power, payment, banking or supply chain can easily close the minds of many of the most creative and most innovative technologies in cybersecurity.
Geto Patel, CICO’s chief product official, stressed the urgency to enhance cybersecurity with artificial intelligence so that destructive threats that may be destroyed can be found as soon as they are now operated and neutralized. “Amnesty International mainly changes everything, and cyber security is at its core. We no longer deal with human scale threats; these attacks occur on the scale of machines,” Patel said during the keynote.
Patel stressed that the models driven by artificial intelligence are not inevitable: “It will not give you the same answer every time, which achieves unprecedented risks.”
CISO needs to understand the risks and complex threats today
“I was asked to give one, and said,” What about us are we talking about something that really matters at the present time, like getting a Ciso seat on the plate table? “This line has handed over two things at the same time: comic relief and a sharp axis to the issue specified for the Cyber Security Command in 2025.
In keywords, “CISO Guide to Securing the Board of Directors,” Courtz issued a clear call To workIon: “Cyber security is no longer a proposal to comply. It is an authorization of governance. I have changed the financial council of the Supreme Education Council CISO.” Not only developed paintings; They are forced at the expense of electronic risks as a fundamental threat to business.
Corz supported his argument with difficult numbers: 72 % of the councils say they are actively looking for cybersecurity, but only 29 % have already they have already.. “This is not just a talent gap,” said Kuzz. “It is an opportunity if you are ready to progress,” encouraged the audience.
It was a map of the way for CISOS to reach the tactical and practical meeting hall:
- Raise your business fluency. “Understanding the place of creating the value of the work. If you cannot talk to the margin, ARR or legal risks, you will not last long on the table.”
- The language of the council occurs. “Each meeting hall works on three priorities: time, money and legal risks. If you cannot translate the Internet into these, you will remain on the sidelines.”
- Build your brand outside the safety bubble. “Members of the Board of Directors in multiple councils. The road is through confidence and reputation, not just artistic excellence.”
KURTZ follows the path from organizational reform to the influence of the Board of Directors by reviewing how Sarbanes-oxley converts in 2002 to the financial manager to strong shareholders. He said that SEC’s 2024 reports of SEC did the same for Cisos. “The threats are pushing the organization, and forming the council to pay the organization,” he said. “This is our moment.”
His advice was not abstract. He urged Cisos to study the agent’s data, and to determine the needs at the committee and the network strategically with the members of the Board of Directors “who are always looking to fill the roles.” He referred to Crowdstrike Ciso Adam Zoller, now on the Adventhealth panel, as a model. Zoller says, says Curtz, he is a person who got his seat by staying in the room, learning how the council works and sees as more than a security expert.
Cortz closed with a challenge: “I hope to return within ten years, still with red hair, watching Ciso on 50 % of the panels, just like the financial manager. Don’t wait for the Board of Directors permission. The only question is: Will you be?”
“Amnesty International is not magic – it’s mathematics”
Diana Kelly, CTO from Protecting artificial intelligenceI drew one of the most important early crowds in RSAC 2025 with a sharp message: “Artificial intelligence is not magic – it is mathematics. Just as we believe in software, we must accurately believe in the life cycle of artificial intelligence.” The keyword has provided a healthy background that cut Gen AI slices, highlighting the real risks of artificial intelligence models that each organization needs to defend before starting any work on its models. Kelly presented in -depth visions of typical poisoning, immediate injection and hallucinations, and called for a complete approach to artificial intelligence security.
Owasp Top 10 was presented to Gen AI, focusing on the need to secure artificial intelligence from zero, partner with early Cisos, the threat of power and the treatment of claims, outputs and agents chains as distinctive offensive surfaces.
Palo Alto networks announced Its intention is to obtain artificial intelligence protection On the same day Kelly, another worker leads Many conversations about her keywords.
RSA 2025 explains the reason for the customer’s connection from artificial intelligence
RSC 2025 explained one thing clear: artificial intelligence agents enter the progress of the security work, but the councils want to prove that they are working. For CISO under pressure to justify spending and reduce risk, the concentration of innovative noise turns into operational effect. The real victory, including 40 % of the time for housing and the flexibility of up to 70 %, came from the standardization of the platform and the automation of the alarm sorting, which are all installed technologies and technologies. The moment of the truth in the customer of artificial intelligence here, especially for the sellers who enter the market.
https://venturebeat.com/wp-content/uploads/2025/04/KURTZ_b5630a.jpg?w=1024?w=1200&strip=all
Source link