Cisco at RSAC™ 2026 Conference

Security for the agentic era. Open by design. AI by default.

Relive RSAC 2026 with Cisco and Splunk keynotes and insights.

Continue your learning journey from RSAC 2026 and explore how Cisco and Splunk are shaping the future of the agentic enterprise with open, AI-driven security platforms. Watch keynotes from Cisco’s Jeetu Patel and Splunk’s John Morgan and Fred Frey for inspiring insights on AI-powered security innovation. Deep dive into the Cisco Security and Splunk innovations showcased at RSAC, and catch the latest security reports.

Watch Jeetu Patel's keynote replay

Reimagining security for the agentic workforce

At RSAC 2026, Cisco's President and Chief Product Officer, Jeetu Patel, challenged the industry to fundamentally reimagine security. In an agentic era, AI agents will act as autonomous coworkers. This comes with incredible risk and reward, and to do it right we must protect agents from the world, protect the world from agents, and detect and respond at machine speed. To help organizations adapt, Jeetu announced a suite of open-source tools including DefenseClaw.

Dive deeper into Cisco's open-source commitment and the new security model for the agentic era in Jeetu's blog.

John Morgan and Fred Frey of Splunk headshots

Watch the keynote replay

Lessons from the agentic frontier: How the SOC is winning in the AI era ​

Agentic Al is transforming security operations by enabling machines to decide and act at machine speed. John Morgan, SVP and GM of Security at Splunk, and Fred Frey, Director of Al Engineering for Security at Splunk shared practical insights on building a human-led, machine-accelerated Security Operations Center (SOC) that shifts from reactive response to proactive strategy, blending automation with human.

Security reports

2025 cyber threats wrapped: Cisco Talos Year in Review

Get exclusive access to frontline security intelligence. Cisco Talos' Year in Review arms security teams with insider knowledge on adversary toolsets, network-based attack patterns, and emerging AI threats. Learn what Talos researchers discovered analyzing real-world campaigns, so you can strengthen defenses where it matters most in 2026.

Top 50 Cybersecurity Threats

See how modern attacks move and escalate. Get the latest Top 50 Cybersecurity Threats to detect faster and respond with confidence.

Missed our RSAC 2026 speaking sessions?

Create a free RSAC account and catch all the sessions on demand at RSAC. A free account at RSAC gives you the opportunity to watch the Cisco and Splunk sessions at your convenience.

Cisco Partner Perspective Track Session

From chatbots to change agents: Securing agentic AI​

As organizations race to deploy agentic AI, a new security paradox emerges: the autonomy that makes these agents powerful also makes them impossible to secure with traditional human-centric controls. Your AI agents are having an identity crisis—and it’s yours to solve. In this session we explored how identity-centric security, zero trust, and SASE come together to secure agentic AI. 

  • Matt Caulfield, VP of Product, Identity, Cisco
  • Kevin Kennedy, VP of Product Marketing, Cisco 

Cisco Partner Perspective Track Session

When AI steals your patch window: Beating the clock with runtime defense 

AI is collapsing exploitation timelines from weeks to hours—mining vulnerabilities, automating exploits, and mapping lateral attack paths before patches exist. Traditional patch cycles can't keep pace. This session delivered practical examples of runtime exploit shielding, East-West traffic controls that block lateral movement, and Attack Path Analysis that surgically hardens your critical assets.

  • Dan Wendlandt, VP of Product Management, Cisco 

Splunk Partner Perspective Track Session

Building an agentic SOC: Practical ways defenders win with AI

This session shared real SOC lessons from a leading SecOps provider. Learn what works now: when to trust automation, when to keep humans involved, and how to redesign workflows for effective defense. Viewers will gain practical strategies for an agentic SOC—prioritizing use cases, measuring impact, and scaling AI-driven defenses safely. 

  • Dave Dalling, GVP, Global Cyber Strategy, Splunk
  • Ashwin Rajendra, Manager, Detection & Automation Engineering, Kimberly Clark

PROTECTED: The 7th Annual Report from the SOC at RSAC™

This session shared the experiences of the team securing the RSAC™ wireless network within the Security Operations Center (SOC). Learn about the network security, interesting activities observed, and innovations implemented. Watch this session to hear the new innovations from the Annual Report in the SOC at RSAC 2026. Although this was the 7th year of the report session, this was the 10th year of the SOC at RSAC.

  • Jessica Oppenheimer, Director Security Operations
  • Tony Iacobelli, Senior Manager, Splunk Advanced Response

Supply chain under siege: Strategic defense in a regulated world

This panel explored how increasingly strict global regulations and rising supply chain attacks are reshaping supply chain security strategy. Experts shared legal, technical, and operational insights to help CISOs and risk managers build resilient, compliant supply chain defense programs in a new era of legal mandates for supply chain security.

Panel: 

  • Christopher Hale, Senior Director, Cyber and National Security Law, Cisco
  • Kate Growley, Partner & Senior Director, Crowell & Moring LLP & Crowell Global Advisors
  • Cassie Crossley, CEO & Co-founder, VulNow
  • Katherine McDaniel, Director, Cyber Legal, T-Mobile

Beyond Jericho: Salvaging zero trust from Buzzword Bingo

Despite years of enthusiasm since the Jericho Forum and Google's BeyondCorp, many still struggle to implement zero trust. The principles are known, but operationalizing ZTA stalls. Have CISOs been gaslit? The disconnect between promise and reality is painful. This session delivered a practical framework for turning buzzwords into building blocks for successful programs.

  • Helen Patton, Cybersecurity Advisor, Cisco
  • Wolfgang Goerlich, CISO, Oakland County

Continue your learnings with these Cisco and Splunk innovations

Demo Description

Mind the gaps, stop the spread

Hybrid Mesh Firewall​

Attackers rely on unchecked lateral movement. See how Cisco Hybrid Mesh Firewall meets you where you are on your segmentation journey—delivering both agentless and agent-based segmentation across traditional and modern workloads, including Kubernetes. Reduce your attack surface and contain threats before they spread.

Protect industrial environments

Hybrid Mesh Firewall​

IT and OT convergence shouldn't mean increased risk. See how Cybervision, Cisco Identity Services Engine (ISE), and Cisco Secure Firewall work together to deliver unified threat detection and policy enforcement across industrial environments—without disrupting the production systems your operations depend on.

Stop zero days and encrypted threats

Hybrid Mesh Firewall​

Policy sprawl is a security risk. See how Cisco Security Cloud Control gives you a single place to manage and deploy L3/4 policies across Cisco and non-Cisco firewalls, and apply L7 inspection to uncover threats hiding in encrypted traffic—driving consistent enforcement across your entire enterprise.

Protect AI apps with Cisco AI Defense

Hybrid Mesh Firewall​

You can't protect what you can't see. See how Cisco AI Defense automatically discovers AI assets across your enterprise, maps your AI ecosystem, and delivers purpose-built protection against threats targeting AI applications—giving you the centralized visibility and control needed to keep your AI investments secure and compliant.

Zero trust for the agentic workforce

Zero Trust Access​

AI agents are taking on business-critical work—and that means they need to be secured like any other privileged identity. See how Cisco Zero Trust for Agentic AI gives security teams visibility into agent activity, enforces fine-grained access controls, and enables real-time intervention when agent behavior puts data or systems at risk.

Optimize identity-driven segmentation

Zero Trust Access​

Network location alone is no longer a reliable trust signal. See how Cisco Identity Services Engine (ISE) and TrustSec enforce segmentation based on who or what is connecting—dynamically applying identity-based policies across campus and data center environments.

Outsmart identity attacks

Zero Trust Access​

Identity is the leading cause of breaches—and the foundation of zero trust. See how Cisco's security-first IAM approach stops identity-based attacks with end-to-end phishing resistance, while Cisco Identity Intelligence feeds continuous risk insights into your broader security stack to enable dynamic access decisions and real-time threat response.

Instant attack verification

Agentic SOC

Alert fatigue shouldn't slow down your response to real threats. See how Cisco XDR uses AI to surface and prioritize the incidents that matter most—while Cisco XDR Forensics enables remote acquisition of digital evidence at scale, accelerating investigations without breaking chain of custody.
Accelerate and secure AI trafficUsers, devices, and AI agents need secure access wherever work happens. See how Cisco SD-WAN, Cisco Secure Access, Cisco Identity Services Engine (ISE), and Cisco Duo come together to deliver identity-centric zero trust—with context-aware policies, seamless connectivity, and consistent protection that extends to GenAI applications and agentic workflows.
Demo Description

Build the agentic SOC on a data fabric foundation

Agentic SOC

The Cisco Data Fabric is purpose-built for the AI era, enabling organizations to innovate faster, strengthen security, and achieve greater business agility. By unifying and activating machine data from every corner of the enterprise, the framework delivers turnkey solutions that reduce cost and complexity while overcoming the challenges of managing distributed data at scale. This capability breaks down traditional data barriers, enabling faster, more accurate threat detection and response through real-time, AI-enhanced analytics without compromising data governance or security.

Deploy AI agents for the SOC

Agentic SOC

Strengthens alert triage with AI-powered prioritization and context. Obtain key details and guided automation and response and help analysts quickly assess findings by leveraging multiple services to reduce noise and focus on what matters. 

Author and tune detections

Agentic SOC

Obtain a complete detection lifecycle experience that enables detection engineers to seamlessly plan, develop, test, deploy, and monitor detections, thereby improving confidence in detection deployment and enabling faster mean-time-to-detect. 

Automate and orchestrate SOC workflows

Agentic SOC

Accelerates time-to-value and enables teams to identify, configure, and validate automation content faster—turning natural language prompts into tested SOAR playbooks that just work, without requiring deep platform expertise. 

Build custom security apps

Agentic SOC

Unlock addtional use cases and capabilities that re-use security data with apps like Splunk Detection Insights, Splunk App for Fraud Analytics, and the Splunk OT Security add-on.

Unlock asset visibility and insights

Agentic SOC

Generate accurate, comprehensive inventories of asset and identity entities, and their interrelationships within Splunk ES, enabling complete, current, and context-rich asset and identity data. 

Integrate TDIR workflows

Agentic SOC

Learn how to simplify the analyst experience through integrated workflows and merging Splunk Security capabilities into one platform.

Identify and mitigate insider threats

Agentic SOC

Mitigate insider threats in real time using OOTB, proven, and scalable ML models, and trigger high-fidelity alerts fully integrated in investigation workflows​.

Hybrid Mesh Firewall demos

  • Stop lateral movement 
  • Reduce patching gap 
  • Streamline firewall management   
  • Protect critical and industrial environments 
  • Protect AI applications

Zero Trust Access​

  • Control application access   
  • Protect against AI agents   
  • Outsmart identity attacks

Agentic SOC / XDR

  • Instant attack verification​

Agentic SOC

  • Unlock machine data for the SOC  
  • Author and tune detections  
  • Integrated TDIR workflows  
  • Identify and mitigate insider threats  
  • Deploy AI agents for the SOC  
  • Automate and orchestrate SOC workflows  
  • Build custom security apps  
  • Unlock asset visibility and insights

Customer stories

ARUP

Arup empowers its cloud-first workforce with Cisco Secure Access and zero trust.

Black Hat

Black Hat makes Cisco Duo Directory its worldwide IdP.

USGA

Cisco technology improves network reliability and performance at USGA Golf Championships.

Webster Bank

Webster bank builds trust, drives operational efficiency with Splunk Enterprise Security Premier.

Build the infrastructure that powers AI

At Cisco, we don’t just adapt to change — we drive it. Here your ideas move fast and have real impact, powering the AI era and shaping the future of technology. With our global reach and deep expertise, you’ll tackle bold challenges and grow your career without limits. Join us to build the future in a culture that values innovation, inclusion, and your unique contribution.

Follow Cisco Events

Live and on demand

See the latest from Cisco Live around the world

Join us in person, digitally, or on demand to be inspired, discover technical education on a variety of topics, and learn how Cisco will help you connect, protect, and thrive in the AI-driven world.