3 Critical Questions for Security Leaders at RSAC 2026
- Patrick Bryden
- Mar 3
- 3 min read
The experiment is over. As we head to the Moscone Center for RSAC 2026, the industry is grappling with the reality of Agentic AI - autonomous systems no longer confined to simple chat interfaces, but empowered to plan and execute tasks across enterprise systems. This autonomy comes with a price: Gartner predicts that 40% of AI-related data breaches will stem from GenAI misuse and misconfigurations by 2027.
For security leaders, the mission has moved past adoption. We are now in a race to secure the "agentic workforce" before it creates a governance nightmare. If the data isn’t secured, you’re not AI-ready - you’re AI-risky.
We’ve compiled three burning questions every leader should seek to answer at RSAC 2026.

1. If your AI agents have "Identity," who owns the data they access?
In 2026, identity has evolved beyond human users; when an autonomous agent plans and executes a task, it often inherits the broad permissions of a service account. Traditional IAM (Identity & Access Management) isn't granular enough for these agentic workflows - if configured improperly, agents can effectively become "bad actors" with legitimate credentials. The efficiency gains of Agents are quickly negated the moment they consume or share sensitive information they shouldn't.
Confidencial Insight: Data-centric Zero Trust via selective encryption is the only way to ensure agents don’t overreach. By embedding protection directly into the metadata of the data itself, you ensure that even an "authorized" agent can see only the specific fields it needs to perform its job, neutralizing the risk of autonomous data ingestion.
2. How are you shrinking the "Blast Radius" in a borderless data economy?
In a "Data Economy," enterprise information is constantly moving between the cloud, on-premises servers, and third-party LLMs. Companies must ask: If a single credential or agent is compromised, how much data is at risk? In a borderless environment, a single point of failure shouldn't result in the total compromise of your data estate.
Confidencial Insight: We advocate for data-level security. By using Selective Encryption, a breach of one system doesn't result in a total data giveaway. When security is attached to the data, the blast radius is confined to the specific object, not the entire network. Even if a partner or supplier is breached, they may have the file, but the sensitive information remains cryptographically obscured and useless to unauthorized eyes.
3. Is your "Data in Use" actually secure, or just obscured?
To gain a competitive advantage, training AI models on proprietary datasets is essential. However, this exposes a critical architectural flaw: data is at its most vulnerable when it is being processed. Standard encryption handles data at rest and in transit, but most AI tools still require raw data to be "unlocked" to function, creating a massive exposure window during execution.
Confidencial Insight: True data sovereignty requires protection that persists during computation. Through selective data-level controls, organizations can finally unlock the value of their datasets without ever exposing the raw "crown jewels." You can experience the full benefits of AI innovation without the fear of exposing sensitive information during the active processing phase.
The Roadmap to AI-Ready Security
The big shift leading up to RSAC 2026 is clear: the traditional security perimeter hasn't just moved; it has dissolved into the data itself. This means for organizations to be truly "AI-Ready," organizations must stop securing the agents and start securing the data.
As you navigate the sessions and expo floors this week, look for solutions that move past simple "blocking and tackling" and toward ambient, autonomous protection. The goal is a security posture where data is self-defending, identity is granular, and the blast radius is non-existent.
Trusted by security leaders in North America, Confidencial is ready to help you turn these questions into a concrete strategy.
Step up your security game (and your footwear).
Book a meeting with Confidencial at RSAC 2026 to see our Selective Encryption in action, and you could qualify for a free pair of Custom Nikes!




Comments