
Sign up to save your podcasts
Or


In this episode of Techzine TV from RSAC 2026 Conference, Conor Sherman, CISO in Residence at Sysdig, discusses the evolving role of security leaders in the age of AI and cloud-native infrastructure. Sherman shares insights on how CISOs are adapting to rapidly changing threat landscapes where attackers can compromise cloud environments in as little as eight minutes.
Key takeaways:
• The time from vulnerability disclosure to exploitation has collapsed to under 20 hours
• Runtime security has become critical as traditional posture management alone is insufficient
• Security leaders must balance dual mandates: transforming their own organizations while advising the business on AI adoption
• Threat actors are leveraging AI to accelerate attacks, requiring active defense mechanisms at the kernel level
• CISOs should demand proof from vendors through independent testing like Atomic Red Team
Chapters:
0:00 - Introduction to Sysdig and CISO in residence role
1:36 - The CISO mindset: excitement and anxiety
5:20 - Active defense and the department of no
8:56 - Runtime security as a priority
13:00 - The layered security challenge
16:47 - Ephemeral workloads and kernel-level visibility
19:51 - What CISOs should ask vendors
By Coen or SanderIn this episode of Techzine TV from RSAC 2026 Conference, Conor Sherman, CISO in Residence at Sysdig, discusses the evolving role of security leaders in the age of AI and cloud-native infrastructure. Sherman shares insights on how CISOs are adapting to rapidly changing threat landscapes where attackers can compromise cloud environments in as little as eight minutes.
Key takeaways:
• The time from vulnerability disclosure to exploitation has collapsed to under 20 hours
• Runtime security has become critical as traditional posture management alone is insufficient
• Security leaders must balance dual mandates: transforming their own organizations while advising the business on AI adoption
• Threat actors are leveraging AI to accelerate attacks, requiring active defense mechanisms at the kernel level
• CISOs should demand proof from vendors through independent testing like Atomic Red Team
Chapters:
0:00 - Introduction to Sysdig and CISO in residence role
1:36 - The CISO mindset: excitement and anxiety
5:20 - Active defense and the department of no
8:56 - Runtime security as a priority
13:00 - The layered security challenge
16:47 - Ephemeral workloads and kernel-level visibility
19:51 - What CISOs should ask vendors