Security Visionaries

Live @ RSAC 2026: AI FOMO

Episode Summary

On the latest episode of Security Visionaries, host Max Havey and guest James Robinson, CISO at Netskope, connect live and in-person at RSAC 2026 to discuss the cutting edge of security in the age of AI, particularly for highly regulated industries. They dive into the conference's biggest trends, focusing on the rise of agentic AI, the necessity of heavy guardrails, and the complex challenge of data sovereignty in a global regulatory landscape. James offers insights on the major hurdles facing highly regulated industries as they adopt AI, and shares practical advice for security leaders on shifting their AI governance approach from "no" to enablement. The discussion also covers innovative data governance strategies like moving from data classification to detailed data categorization, and the critical importance of utilizing red teaming and incident investigation to build robust defenses against emerging threats like prompt injection. If you couldn’t make it to the conference, hopefully this will fill you in on some of what you missed.

Episode Notes

On the latest episode of Security Visionaries, host Max Havey and guest James Robinson, CISO at Netskope, connect live and in-person at RSAC 2026 to discuss the cutting edge of security in the age of AI, particularly for highly regulated industries. They dive into the conference's biggest trends, focusing on the rise of agentic AI, the necessity of heavy guardrails, and the complex challenge of data sovereignty in a global regulatory landscape. James offers insights on the major hurdles facing highly regulated industries as they adopt AI, and shares practical advice for security leaders on shifting their AI governance approach from "no" to enablement. The discussion also covers innovative data governance strategies like moving from data classification to detailed data categorization, and the critical importance of utilizing red teaming and incident investigation to build robust defenses against emerging threats like prompt injection. If you couldn’t make it to the conference, hopefully this will fill you in on some of what you missed.