Editor's note
The RSAC 2026 Conference theme is "The Power of Community." In a tech landscape where the letters A and I are inescapable, this year's RSAC homes in on the importance of people in cybersecurity -- namely, their ability to forge relationships, collaborate strategically and create a unified front to protect an ever-expanding attack surface from a barrage of threats, vulnerabilities and attacks.
What better place for CISOs and security professionals to gather as a community than at the world's premier cybersecurity conference, along with 44,000 of their peers?
Now in its 35th year, RSAC will be held March 23-26, 2026, at the Moscone Center in San Francisco. With 700-plus vendors, 500-plus sessions across 25-plus tracks, and more than 600 exhibitors and vendors on the RSAC Expo Floor, RSAC 2026 will be the place for security pros to coordinate efforts, share information and learn from one another.
Informa TechTarget's editorial team will be on-site, reporting from the conference floor. This guide will gather up-to-date information from SearchSecurity, Dark Reading and Cybersecurity Dive to keep readers informed on the latest from the cybersecurity industry's biggest show.
1News from the conference floor
Check out the latest coverage from RSAC 2026 Conference.
-
Article
AI dominates RSAC Innovation Sandbox
The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year. Read Now
-
Article
Why a 'near-miss' database is key to improving information sharing
Organizations disclose attack details, though information may be limited, following a breach, but what if they did the same with close calls? Read Now
-
Article
ISACs confront AI's promise and peril for threat intelligence-sharing
Any use of AI for ISAC work must preserve members' trust, representatives of three critical infrastructure sectors said. Read Now
2Security operations and management
From SOCs to cyber attribution, read the latest from RSAC on security operations and management.
-
Article
How organizations can use mistakes to level up their security programs
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes. Read Now
-
Article
Blame game: Why public cyber attribution carries risks
Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge. Read Now
-
Article
How a large bank uses AI digital twins for threat hunting
JPMorganChase uses digital fingerprints and digital twins to spot online attackers and malicious behaviors while also reducing pesky false alerts. Read Now
-
Article
CISOs debate human role in AI-powered security
The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week. Read Now
-
Article
AI in the SOC: What could go wrong?
Two cybersecurity leaders tested out AI in their respective SOCs for six months -- and here's what they learned. Read Now
3Threats and vulnerabilities
Read up on the latest threats, vulnerabilities and risks to look out for.
-
Article
Automotive cybersecurity threats grow in era of connected, autonomous vehicles
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance. Read Now
-
Article
SANS: Top 5 most dangerous new attack techniques to watch
For the first time, SANS Institute's five top attack techniques all have one thing in common -- AI. Read Now
-
Article
'Do not shift budgets to AI': How businesses should and shouldn’t respond to evolving threats
Experts said companies rushing to buy AI services risked letting their existing, still-vital defensive measures deteriorate. Read Now
-
Article
How AI coding tools crushed the endpoint security fortress
Security vendors have spent years building up defenses around the endpoint, but one researcher says AI coding tools have brought the walls down. Read Now
-
Article
AI poised to most help low-skilled hackers in the near term
The expected rise in automated cyberattacks means more work for defenders -- but they can use AI to fight back. Read Now
4Government discussions
Read government-related news from RSAC 2026.
-
Article
Congress wants details from White House on cyber strategy, Iran resilience measures
Lawmakers’ aides from both parties say they want to be kept in the loop on implementation. Read Now
-
Article
At RSAC, the EU leads while US officials are sidelined
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges. Read Now
-
Article
Ex-NSA directors discuss 'red line' for offensive cyberattacks
Four former NSA chiefs representing a near-complete history of US Cyber Command debate the role of offensive cyber in the government at RSAC. Read Now
-
Article
The CVE Program, a bedrock of global cyber defense, is teetering on the brink
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future. Read Now
5Pre-conference coverage
What does RSAC 2026 have in store? Check out our pre-show coverage of the big event.
-
Article
AI conundrum: Why MCP security can't be patched away
RSAC Conference Preview: MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says. Read Now
-
Article
Clear communication: The missing link in cybersecurity success
When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups. Read Now
-
Article
Software development practices help enterprises tackle real-life risks
Organizations can borrow secure-by-design processes to manage nontechnical challenges like governance or the inevitable human error. Read Now
-
Article
AI agent overload: How to solve the workload identity crisis
Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play? Read Now
-
Article
The case for why better breach transparency matters
It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse -- not disclose the incident at all. Read Now
-
Article
Enigma cipher device still holds secrets for cyber pros
The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyberthreats. Read Now
-
Article
Lessons from AI hacking: Every model, every layer is risky
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities. Read Now
-
Article
Connected and compromised: When IoT devices turn into threats
Reused passwords, a lack of network segmentation and poor sanitization processes make IoT attack surfaces more dangerous. Read Now
-
Article
Top cyber industry defenses spike CO2 emissions
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks. Read Now
-
Article
OT attacks get scary with 'living-off-the-plant' techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever. Read Now
6RSAC 2025 recap
As you prepare for RSAC 2026, check out what happened at last year's show and read our experts' post-conference assessments.
-
Article
RSAC 2025 Conference: Identity security highlights
RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security. Read Now
-
Article
Key network security takeaways from RSAC 2025
Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats. Read Now
-
Article
RSAC Conference 2025 video reports
We chatted on camera with attendees and presenters at RSAC 2025. Check out this video collection to get highlights from one of the world's major cybersecurity conferences. Read Now
-
Article
RSAC 2025: The time for crypto-agility adoption is now
An RSAC 2025 speaker explained why companies should begin their quantum-safe journey now and how crypto-agility adoption helps prepare for post-quantum cryptography. Read Now
-
Article
AI domination: RSAC 2025 social media roundup
Documented in a series of social media posts, cybersecurity experts shared with Dark Reading their insights on RSAC 2025 throughout the week. Read Now