Events , NIST Standards , RSA Conference

NIST CSF 2.0 and the State of Cybersecurity

RSA CEO Rohit Ghai on Impact of New Regulations, Trends in Identity and AI
Rohit Ghai, CEO, RSA

The federal government has expanded its regulations for cybersecurity best practices with the long-awaited NIST CSF 2.0 standards, and the new guidelines place more emphasis on governance and overall risk management, as well as the "outsized role of identity in the context of a zero trust security posture," said Rohit Ghai, CEO, RSA.

See Also: Shift From Perimeter-Based to Identity-Based Security

The new regulations, which replace the NIST rules adopted 10 years, include badly needed updates that recognize the many challenges in the threat environment facing everyone. "2.0 broadens the scope of the document to beyond just critical infrastructure. Cybersecurity is now everybody's problem," Ghai said.

In this video interview with Information Security Media Group at RSA Conference 2024, Ghai also discussed:

  • The state of the identity technology market and key trends including passwordless authentication;
  • The implications artificial intelligence tools have for identity and why AI is a double-edged sword for our sector;
  • Strategies for defending against a wide range of cybercriminals' tactics such as MFA bypass.

Ghai provides oversight to the Archer, Outseer and RSA Security businesses as a member of the board of directors. He advises global customers on their digital and security transformation initiatives. Previously, he served as president and chief executive of Dell EMC's Enterprise Content Division, Documentum.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.