[Events](https://www.govinfosecurity.com/events-c-363) , [Governance -& Risk Management](https://www.govinfosecurity.com/governance-risk-management-c-93) , [RSAC Conference](https://www.govinfosecurity.com/rsac-conference-c-502)ISMG Editors: RSAC Conference 2025 Wrap-Up==========================================Panelists Discuss Deepfake, Trust Frameworks, AI Skepticism, Venture Capital Woes [Anna Delaney](https://www.govinfosecurity.com/authors/anna-delaney-i-3368) ([annamadeline](https://www.twitter.com/annamadeline)) • May 4, 2025 [](https://www.bankinfosecurity.com/ismg-editors-rsac-conference-2025-wrap-up-a-28255#disqus_thread) * * * * * [Credit Eligible](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* [](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* Get Permission* Aseem Jakhar, Michael Novinson, Tom Field, Anna Delaney, Rahul Neel Mani and Mathew SchwartzDeepfake threats and trust challenges with emerging AI technology dominated discussions as ISMG editors unpacked the news and major themes from the final day of RSAC Conference in San Francisco. But uncertainty over continued government support for cybersecurity programs overshadowed many discussions at RSAC.**See Also:** [How Generative AI Enables Solo Cybercriminals](https://www.govinfosecurity.com/how-generative-ai-enables-solo-cybercriminals-a-28189?rf=RAM_SeeAlso)For example, the U.S. government recently moved to cut funding for the CVE program, but the industry’s response to the prospect of losing an important vulnerability management resource is heartening, said Mathew Schwartz, executive editor for DataBreachToday and Europe. Despite federal budget cuts, CVE will receive private funding that will expand beyond Mitre’s government-backed program. Quoting Tod Beardsley of runZero, he said, ‘There’s a plan for how we’re going to make it better.’The panelists – Anna Delaney, director, productions; Tom Field, senior vice president, editorial; Schwartz; Rahul Neel Mani, vice president, community engagement and editorial; Michael Novinson, managing editor, ISMG business; and Aseem Jakhar, co-founder, EXPLIoT – also discussed:* Default credentials remaining top vulnerabilities across embedded systems and industrial sectors;* Global community expansion beyond traditional regional divisions at RSAC Conference;* The venture capital funding crisis requiring secondary market solutions for investor returns.### Interested in More RSA Coverage?Check out ISMG’s sites for video interviews and articles about noteworthy RSAC Conference 2025 sessions and cybersecurity newsmakers in San Francisco this week. Visit the [RSAC Conference 2025](/rsacconference#p-1) page for details.  #### [Anna Delaney](https://www.govinfosecurity.com/authors/anna-delaney-i-3368)*Director, Productions, ISMG* An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.[](https://twitter.com/annamadeline) [](mailto:adelaney@ismg.io)  ##### [Security Workflow Automation Cuts Complexity](https://www.govinfosecurity.com/security-workflow-automation-cuts-complexity-a-28186?rf=RAM_Resources) ##### [Practical Approaches to Unleashing Autonomous AI Defenders](https://www.govinfosecurity.com/practical-approaches-to-unleashing-autonomous-ai-defenders-a-28150?rf=RAM_Resources) ##### [Why Cyberattackers Love ‘Living Off the Land’](https://www.govinfosecurity.com/cyberattackers-love-living-off-land-a-28154?rf=RAM_Resources) ##### [Is Your Data Security Program Ready for the AI Explosion?](https://www.govinfosecurity.com/your-data-security-program-ready-for-ai-explosion-a-28131?rf=RAM_Resources) ##### [AI, Zero Trust and SASE: Modernizing Security](https://www.govinfosecurity.com/ai-zero-trust-sase-modernizing-security-a-28151?rf=RAM_Resources) [Events](https://www.govinfosecurity.com/events-c-363)##### [Harry Coker Urges Unified Public-Private Cyber Defense](https://www.govinfosecurity.com/harry-coker-urges-unified-public-private-cyber-defense-a-28261) [Endpoint Security](https://www.govinfosecurity.com/endpoint-security-c-506)##### [Human Insight Is Key to Securing Cyber-Physical Systems](https://www.govinfosecurity.com/human-insight-key-to-securing-cyber-physical-systems-a-28262) [Events](https://www.govinfosecurity.com/events-c-363)##### [ISMG Editors: RSAC Conference 2025 Wrap-Up](https://www.govinfosecurity.com/ismg-editors-rsac-conference-2025-wrap-up-a-28255) [Artificial Intelligence -& Machine Learning](https://www.govinfosecurity.com/artificial-intelligence-machine-learning-c-469)##### [AI Narrows the Cyber Gap Between Attackers and Defenders](https://www.govinfosecurity.com/ai-narrows-cyber-gap-between-attackers-defenders-a-28254) [Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)##### [Nation-State Hackers Embed Stealthily in US infrastructure](https://www.govinfosecurity.com/nation-state-hackers-embed-stealthily-in-us-infrastructure-a-28247)[Overview](https://www.govinfosecurity.com/webinars/risk-management-framework-learn-from-nist-w-255) * Twitter* Facebook* LinkedIn* * * From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:* Understand the current cyber threats to all public and private sector organizations;* Develop a multi-tiered risk management approach built upon governance, processes and information systems;* Implement NIST’s risk management framework, from defining risks to selecting, implementing and monitoring information security controls.Presented By———— [Presented By](/authors/ron-ross-i-558)—————————————#### [Ron Ross](/authors/ron-ross-i-558)*Sr. Computer Scientist -& Information Security Researcher, National Institute of Standards and Technology (NIST)*
Related Tags:
NAICS: 71 – Arts
Entertainment
Recreation
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 72 – Accommodation And Food Services
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 92 – Public Administration
NAICS: 711 – Performing Arts
Spectator Sports
Related Industries
NAICS: 721 – Accommodation
NAICS: 51 – Information
Associated Indicators:
null


