By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: RSAC 2026: What We Expect at the Biggest Cybsecurity Event of the Year
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > RSAC 2026: What We Expect at the Biggest Cybsecurity Event of the Year
News

RSAC 2026: What We Expect at the Biggest Cybsecurity Event of the Year

News Room
Last updated: 2026/03/22 at 12:38 PM
News Room Published 22 March 2026
Share
RSAC 2026: What We Expect at the Biggest Cybsecurity Event of the Year
SHARE

Security professionals and observers are on the way to one of the biggest annual cybersecurity events, the RSAC Conference in San Francisco. RSAC is happening a little earlier than usual this year, in March instead of April or May. It kicks off bright and early on Monday, March 23, and concludes on March 27 with a closing celebration featuring actor Hugh Jackman.

We’ll be there, covering all of the big news and important discussions about the future of online security (and hopefully getting a selfie with Wolverine). Until then, here’s a sneak peek at some of the stories we’re following before the conference kicks off.


The Psychology Powering Social Engineering

Online scammers are like kids’ birthday party magicians: Once you see how the tricks work, the magic disappears, and they’re just a person shoving a rabbit into a fedora. With that in mind, we look forward to learning all about scammers’ manipulation and persuasion tactics from Randy Rose, a vice president of security operations at the Center for Internet Security. At RSAC, Rose will present a session titled “Mental Malware: Why the Human OS Keeps Getting Hacked.” We expect the presentation to examine human biases, emotions, trust issues, and other psychological factors that tech-assisted criminals use to manipulate all of us online, through our phones, and via screens. 

When we understand the human psyche a little better, we may detect deception more often when scammers contact us via spammy phone calls, phishing emails, or text messages, helping us avoid scams. To get a head start on this discussion, check out our article about the most dangerous scams to avoid this year.

PCMag Logo

How to Avoid Online Dating Scams


AI as Therapist—What Could Go Wrong?

AI chatbots are emerging as unlikely confidantes for survivors of domestic violence, providing online care that comes with little comfort and a lot of privacy and security risks. On Monday, Dr. Diana Freed and Julio Poveda from Brown University will present a structured discussion about the privacy problems chatbots pose at a foundational level.

We also expect to hear a great deal about the dangers these chatbots pose to the safety of at-risk individuals. The team may offer suggestions from healthcare professionals and AI industry experts about securing AI systems. After all, Dr. Freed’s background is in AI governance relating to sensitive populations. We’re curious to see whether Dr. Freed and Mr. Poveda believe there is a future in which these chatbots can be used safely as confidantes, or if the risks are too great, even with stronger protections in place. 


Fighting the Rise of Elder Fraud

Also on Monday, we’ll hear from a couple of cyber industry giants: Rick Swenson, managing director at TIAA, a financial services company, and Lisa Plaggemier, executive director of the National Cybersecurity Alliance, about how to protect elderly people from online scams. 

We last spoke to Plaggemier for an article about AI-generated tax scams, and she recommended changing how we interact with media online, such as taking time to verify a message sender’s identity before responding and hovering over links to determine whether they are valid before clicking. We expect a business-focused discussion at RSAC that educates customers and helps them change how they interact with products to prevent future successful scams.


Newsletter Icon

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

4 easy things you can do to be more secure online — Clarification Please

PCMag Logo

4 easy things you can do to be more secure online — Clarification Please


The “Black Box” Problem, Explained

On Thursday, we plan to attend a presentation by Mitch Ashley, VP & Analyst at Futurum Research, to ask a question that’s long been on our minds: “Can or will we secure AI?” We’re anticipating a nuanced discussion on why AI hasn’t been able to be secured like other emerging technologies, and we’re interested in hearing what Mr. Ashley thinks the next logical steps are to make it safer. 

We think he will touch on the “Black Box” problem of AI, which is that, unlike a linear program that can be analyzed at every step of the process, you cannot view the logical thread of every single decision an AI makes with 100% certainty due to the dynamic way in which a neural network works. The nature of the black-box problem is what many consider an impossible hurdle in truly securing AI against traditional attack vectors.

Recommended by Our Editors

We’re interested in Mr. Ashley’s proposed solution to this problem and whether it will hinge on AI as a verifier. If it does, we’ll want to hear his take on issues of AI recursion and how an AI verifier or auditor could be proven as trustworthy. Mr. Ashley’s talk hints at ways forward beyond traditional models, so we’re especially looking forward to any novel solutions he may present. 


Breaking Biometric Security

One of the final talks on Thursday is by Jake Moore, ESET’s Global Cybersecurity Advisor, on how flawed facial recognition systems can be. This demonstration-based presentation will feature real-life scenarios of Moore bypassing, breaking, and hacking various forms of facial recognition. We anticipate the talk to begin with a showcase of a special set of smart glasses that Moore has configured to identify strangers in real time. 

We believe the demonstrations will continue with a display of how security systems using seemingly secure facial recognition software can be defeated with what Moore claims are free AI tools accessible to anyone. We expect Moore to expose the cracks in facial recognition systems and to pose some interesting questions about the consequences of his findings in a world increasingly reliant on the technology. We have our own thoughts on the dangers of face ID, so we’re curious to see where Moore lands on the issue. 


Get Ready for a Week With Security Geeks

We’ll be at the conference all week, so be sure to bookmark our RSAC page for the latest news as it happens.

About Our Experts

Kim Key

Kim Key

Senior Writer, Security


Experience

I review privacy tools like hardware security keys, password managers, private messaging apps, and ad-blocking software. I also report on online scams and offer advice to families and individuals about staying safe on the internet. Before joining PCMag, I wrote about tech and video games for CNN, Fanbyte, Mashable, The New York Times, and TechRadar. I also worked at CNN International, where I did field producing and reporting on sports that are popular with worldwide audiences.

In addition to the categories below, I exclusively cover ad blockers, authenticator apps, hardware security keys, and private messaging apps.

Read Full Bio

Justyn Newman

Justyn Newman

Senior Writer, Security


Experience

My writing journey started in 2012 and has taken me through various niches, but my main focus has always been on tech. I contributed to several growing PC hardware and software sites, focusing on gaming, peripherals, and privacy.

As the amount of information we put out on the internet has grown, so have the threats and the tools we use to combat them. With VPNs gaining traction in the late 2010s as a tool for the public instead of just an option for business security, I found myself reviewing countless options in this continuously changing landscape.

This led to my role before PCMag over at WizCase, where I honed my knowledge of VPNs and privacy tools and eventually oversaw all of the content produced. I led a talented team of fellow writers and editors to evaluate VPNs, password managers, antivirus, and parental controls.

Read Full Bio

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 3 Cool Things You Didn’t Know An Apple TV Could Do – BGR 3 Cool Things You Didn’t Know An Apple TV Could Do – BGR
Next Article Chimp Slasher Flick 'Primate' Hits Streaming. Warning: This Ain't No Punch the Monkey Story Chimp Slasher Flick 'Primate' Hits Streaming. Warning: This Ain't No Punch the Monkey Story
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Never Do Any Of These 5 Things On Your Router – BGR
Never Do Any Of These 5 Things On Your Router – BGR
News
Crypto Trends 2026: The Growth of Low-Cost Altcoins
Crypto Trends 2026: The Growth of Low-Cost Altcoins
Gadget
Watch NASA’s experimental supersonic jet land early after system warning
Watch NASA’s experimental supersonic jet land early after system warning
News
Get the New Book ‘Apple: The First 50 Years’ for 30% Off on Amazon
Get the New Book ‘Apple: The First 50 Years’ for 30% Off on Amazon
News

You Might also Like

Never Do Any Of These 5 Things On Your Router – BGR
News

Never Do Any Of These 5 Things On Your Router – BGR

8 Min Read
Watch NASA’s experimental supersonic jet land early after system warning
News

Watch NASA’s experimental supersonic jet land early after system warning

6 Min Read
Get the New Book ‘Apple: The First 50 Years’ for 30% Off on Amazon
News

Get the New Book ‘Apple: The First 50 Years’ for 30% Off on Amazon

3 Min Read
The Hidden Perks Of Upgrading To Fiber Internet – BGR
News

The Hidden Perks Of Upgrading To Fiber Internet – BGR

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?