RSAC 2026 Conference: Key Policy and Threat Discussions

Issuing Body / Forum: RSA Conference (RSAC) 2026, an industry-convening event attended by CISOs, government officials, SOC practitioners, and security engineers from across the public and private sectors.


What Was Discussed and Why It Matters to Security Teams

RSAC 2026 surfaced three dominant themes that carry direct operational and compliance weight for security practitioners: the weaponization of AI in offensive operations, shifting global cyber leadership structures, and the policy frameworks being drafted or accelerated in response to both.

These are not abstract strategic discussions. The technical sessions and policy briefings at RSAC 2026 addressed concrete attack patterns, regulatory trajectories, and workforce realignments that SOC teams and CISOs need to factor into roadmaps now.


AI-Driven Threats: From Concept to Active Exploitation

AI-assisted attack tooling was a central technical focus. Presenters documented adversary use of large language models (LLMs) to generate phishing lures at scale, automate vulnerability research, and accelerate malware obfuscation cycles. Nation-state groups and financially motivated actors alike have been observed integrating AI tooling into their initial access and lateral movement phases.

Specific discussion covered AI-generated spear-phishing campaigns that defeat traditional heuristic filters, adversarial prompt injection attacks targeting enterprise AI deployments, and the use of AI to rapidly triage and weaponize newly disclosed CVEs — shrinking the window between public disclosure and active exploitation to hours in some documented cases.

For SOC analysts, this means detection pipelines tuned to known-pattern phishing or static malware signatures face a higher false-negative rate. Organizations running Microsoft Defender, CrowdStrike Falcon, or SentinelOne need to validate that behavioral detection modules are active and tuned, not just signature-based scanning.


Global Cyber Leadership Shifts: What the Reorganizations Mean for Policy

RSAC 2026 panels addressed structural changes in how governments organize national cyber defense. In the United States, ongoing reorganization within CISA and the broader Department of Homeland Security has created questions about mandate continuity for critical infrastructure operators governed under CISA advisories and Binding Operational Directives (BODs).

Speakers representing allied governments — including representatives aligned with the EU NIS2 Directive implementation bodies and the UK National Cyber Security Centre (NCSC) — noted that leadership transitions in U.S. cyber agencies have accelerated multilateral coordination efforts. The EU's NIS2 Directive, which entered enforcement in October 2024, places binding incident reporting and risk management obligations on operators of essential services across 18 sectors. NIS2 compliance is not optional for covered entities operating in EU member states, and RSAC 2026 sessions confirmed that enforcement actions are being initiated against organizations that missed the transposition deadline.

For CISOs with European operations, the NIS2 Article 21 risk management requirements — covering supply chain security, access control, encryption, and multi-factor authentication — are active enforcement targets. Fines under NIS2 reach €10 million or 2% of global annual turnover for essential entities, whichever is higher.


Who Must Comply With Emerging AI and Cyber Policies

Several policy trajectories discussed at RSAC 2026 have defined compliance populations:

  • EU AI Act (Regulation 2024/1689): Fully applicable to high-risk AI systems from August 2026. Security vendors deploying AI-based threat detection tools sold into EU markets must meet conformity assessment requirements. CISOs procuring such tools must verify vendor compliance documentation.
  • NIST AI RMF (AI 100-1): Voluntary in the U.S. but increasingly referenced in federal procurement requirements and sector-specific regulations. Organizations seeking FedRAMP authorization or operating under FISMA should treat NIST AI RMF alignment as a near-term requirement.
  • CISA BODs and Emergency Directives: Federal civilian executive branch agencies remain bound by CISA's directive authority regardless of organizational restructuring. BOD 22-01, which governs the Known Exploited Vulnerabilities (KEV) catalog remediation timeline, remains in force.

Timelines and Penalties

| Framework | Key Deadline | Penalty Exposure | |---|---|---| | EU NIS2 Directive | Enforcement active since Oct 2024 | Up to €10M or 2% global turnover | | EU AI Act (High-Risk) | August 2026 | Up to €30M or 6% global turnover | | CISA KEV BOD 22-01 | Rolling (per CVE publication) | Agency-level reporting / audit findings |

Organizations that missed NIS2 transposition deadlines are already within the enforcement window. EU member state regulators have begun formal inquiries.


What Organizations Should Do Now

1. Audit AI-assisted tools in your stack. Identify every product using AI or ML for detection, response, or user behavior analytics. Verify vendor EU AI Act compliance posture if you operate in EU member states. Request documentation before August 2026 deadlines.

2. Validate KEV remediation workflows. Cross-reference your asset inventory against the CISA KEV catalog. CVEs such as CVE-2023-44487 (HTTP/2 Rapid Reset), CVE-2024-3400 (Palo Alto PAN-OS), and CVE-2024-21762 (Fortinet FortiOS) have appeared on the KEV list with tight remediation windows. Automate KEV tracking into your vulnerability management platform.

3. Map NIS2 obligations if you have EU operations. Article 21 requires documented risk management measures. If your organization qualifies as an essential or important entity under NIS2, conduct a gap assessment against the 10 required security measures and document your incident response and reporting procedures per Article 23's 24-hour early warning requirement.

4. Harden against AI-assisted phishing. Deploy DMARC enforcement (policy: reject), enable anti-phishing controls in email gateways, and run tabletop exercises that include AI-generated lure scenarios. Update security awareness training to reflect LLM-quality social engineering content.

5. Track CISA leadership and directive continuity. Monitor the Federal Register and CISA's official directive page for any BOD amendments or new Emergency Directives that may accompany organizational changes. Do not assume prior guidance has been rescinded without explicit written confirmation.

RSAC 2026 made clear that the gap between policy issuance and enforcement is closing. Security teams that treat compliance timelines as distant deadlines will find themselves in breach during active audit cycles.