Podcast Summary
Podcast: RSAC
Episode: Signals from the Sessions: Network & Communications Security at RSAC 2026
Date: January 16, 2026
Hosts: Tatiana Sanchez, Casey Zerkis
Guests: Jennifer Minella (JJ), Chuck Kessler, Lenny Seltzer
Episode Overview
This episode explores the evolution of traditional network security in the face of expanding technologies and a rapidly changing threat landscape. The discussion features the program committee responsible for selecting sessions in the Network & Communications Security track at RSAC 2026: Jennifer Minella, Chuck Kessler, and Lenny Seltzer. They share insights into the biggest challenges facing organizations—particularly with cloud, remote work, and AI—how budgeting and tool selection are evolving, and highlight sessions and trends attendees should not miss.
Key Discussion Points and Insights
Evolution of Traditional Network Security
-
Shift from Perimeter to Identity
- Traditional perimeter-based controls are being replaced by identity-centric approaches and continuous validation.
- “The move from these perimeter based controls to things that are more identity based...and then moving from course segmentation to more granular controls...a lot of that kind of wraps into the zero trust strategy.” — Jennifer (JJ) Minella [02:46]
-
Blurring Network Boundaries
- Network is no longer a singular, well-defined environment; organizations now manage on-prem, cloud, serverless, and third-party networks.
- “The network is so segmented...even the communications go through networks that we don't control or don't manage in a traditional way.” — Lenny Seltzer [03:55]
-
Zero Trust as Foundation & Evolution
- Zero Trust is now table stakes; focus is shifting to what comes after and continuous improvement.
- “This all began with our discussions of zero trust and now have evolved over the years. And that's going to be very exciting to see how practitioners are adapting.” — Lenny Seltzer [03:55]
-
From Network Monitoring to Endpoint & Identity
- Security focus has shifted from monitoring network choke points to endpoint and identity-based monitoring.
- “More emphasis on identity and endpoint controls, less emphasis on worrying about the network itself. It's a bit more of a commodity for me these days.” — Chuck Kessler [06:21]
Contemporary Security Challenges
-
Technology & Tool Sprawl
- The sheer diversity of tools needed for modern network security creates operational and budgetary challenges.
- “A broad diversity of technologies that we now need to incorporate to get visibility into and control over our network security...” — Lenny Seltzer [05:42]
-
Budgetary and Organizational Silos
- Budget constraints force prioritization and sometimes require retiring older tools to make room for new investments.
- “We cannot just keep asking for more and more money. That is never a path to success.” — Lenny Seltzer [10:51]
- Disjointed budgeting and objectives between IT and security teams cause alignment problems.
- “You've got these two groups or buckets of money...they have two different objectives...at some point, you know, we've got to just rip the band aid off, shift, you know, move into a system tools infrastructure that lets us continue moving forward instead of just, you know, duct taping everything together...” — Jennifer (JJ) Minella [12:28 & 13:55]
-
Collaboration is Crucial
- Peer collaboration (internally and at events like RSAC) is vital to keep up with changing demands.
- “Collaboration between our teams is hugely important between our peers, yes, certainly going to conferences like RSAC, but I have a lot of other forums that I engage with my peers...” — Chuck Kessler [11:59]
-
AI as a Disruptor
- AI is “the elephant in the room,” fundamentally changing both enterprise operations and security practices.
- Needs in security now include understanding non-deterministic data flows and adapting privacy controls.
- “AI is fundamentally changing the way a lot of enterprises operate, changing the way our security teams operate as well, obviously.” — Chuck Kessler [14:18]
Notable Quotes & Memorable Moments
-
On the State of Network Security:
“Now the network is so segmented into micro networks and on prem and off prem and cloud and serverless, it's been even challenging for us to decide what do we consider in scope for this track, what is the network nowadays...” — Lenny Seltzer [03:55] -
On Technical and Knowledge Debt:
“For a lot of organizations there's a lot of technical debt and related to the Technical debt is this knowledge debt that we get from just lack of communication, collaboration among teams...” — Jennifer (JJ) Minella [08:05] -
On Budgeting for Security:
“We need to...recognize that if the organization uses a new set of technologies...we need to find budget by deciding what we don't need anymore. Because we cannot just keep asking for more and more money.” — Lenny Seltzer [09:44] -
On the Impact of Tooling:
“I've certainly seen a lot of tools that I've implemented over time that quite frankly just brought a lot of noise into the pipeline for my teams to look at. And finding signal to that noise was very difficult.” — Chuck Kessler [11:27] -
On Band-Aid Approaches:
“At some point, you know, we've got to just rip the band aid off, shift, you know, move into a system tools infrastructure that lets us continue moving forward instead of just, you know, duct taping everything together on the back end and crossing your fingers and hoping that your phone doesn't ring at 2 o’ clock in the morning.” — Jennifer (JJ) Minella [13:55]
Conference Sessions to Watch (RSAC 2026)
-
AI and MCP (Model Context Protocol) Sessions
- “I'm definitely interested. I think we have two talks in our track around MCP, so that definitely is very interesting to me and I hope to be at both of those talks.” — Chuck Kessler [15:45]
- MCP is equated to “an API gateway for AI,” representing shifts in AI security practice.
-
Beyond Zero Trust
- “The presentation that I'm really looking forward to is one that is labeled Beyond Zero Trust...they’ll be talking about how they’ve been able to implement continuous validation...” — Lenny Seltzer [16:23]
-
Zero Trust: Practical Perspectives and Next Steps
- Contributors from LinkedIn and other leaders will present on Zero Trust in real-world terms.
- “If you see Zero Trust on a [RSAC] agenda, there’s a reason for it.” — Jennifer (JJ) Minella [17:13]
-
Mobile Security, IoT, and Learning Labs
- Sessions on cellular IoT breach pathways, mobile security (with input from Ericsson and others), and hands-on learning labs.
- “If you're going RSA and you've never taken advantage of the learning labs, check those out...” — Jennifer (JJ) Minella [17:13]
-
Quantum Computing
- Noticeable uptick in submissions; most content currently focuses on the encryption threats, yet presenters are beginning to address practical, near-term impacts.
- “It’s starting to feel like, yes, now is the time. It is very much current and we’ve got some really interesting talks that are looking at quantum cryptography or talking about post quantum world in a way that's very practical and pragmatic.” — Lenny Seltzer [19:30]
Timestamps for Key Segments
- [02:46] – Jennifer Minella on network security trends (identity-based, Zero Trust)
- [03:55] – Lenny Seltzer on redefining the “network”
- [06:21] – Chuck Kessler on shifting focus to endpoints and identity
- [08:05] – Jennifer Minella on technical and knowledge debt
- [09:44] – Lenny Seltzer on budgeting and reallocation of tools
- [11:27] – Chuck Kessler on tool noise vs. signal
- [13:55] – Jennifer Minella on breaking down IT and security silos
- [14:18] – Chuck Kessler on AI as a disruptive force
- [15:45] – Chuck Kessler on AI sessions (MCP)
- [16:23] – Lenny Seltzer on the Beyond Zero Trust session
- [17:13] – Jennifer Minella on Learning Labs, Zero Trust sessions, and variety of tracks
- [18:48] / [19:30] – Chuck Kessler and Lenny Seltzer on quantum computing emerging as a hot topic
Additional Highlights and Recommendations
- Learning Labs are highly recommended for hands-on learning and community engagement.
- Conference Networking is encouraged as an essential component of continuous improvement and adaptation in cybersecurity.
- Check the RSAC agenda for the full list of sessions, especially if your focus is AI, quantum computing, endpoint security, Zero Trust, or practical implementation experiences.
Conclusion
This episode captures the dynamism of the network security field: rising complexity, disruptive technologies like AI and quantum, and the ongoing need for smarter collaboration and resource allocation. The guests urge practitioners to move past legacy thinking, invest in continuous validation, and embrace practical, peer-driven learning—much of which will be showcased at RSAC 2026.
For more detailed session listings and to register for the RSAC 2026 conference, visit rsaconference.com.
