Insights from RSAC: Elevating Cybersecurity Strategies with Jen Easterly
cybersecurityeventsinnovation

Insights from RSAC: Elevating Cybersecurity Strategies with Jen Easterly

UUnknown
2026-03-26
12 min read
Advertisement

Actions for developers from Jen Easterly's RSAC vision: SBOMs, telemetry, public-private collaboration, and a 90-day roadmap.

Insights from RSAC: Elevating Cybersecurity Strategies with Jen Easterly

At RSAC 2026, Jen Easterly (Director, CISA) laid out a practical, action-oriented roadmap for national resilience and public-private cooperation. This deep-dive translates her vision into concrete developer practices — from secure-by-default design and CI/CD controls to community building and vendor stewardship — so engineering teams can operationalize RSAC guidance immediately.

Why RSAC and Jen Easterly Matter to Developers

Context: RSAC as a policy and technical crossroads

RSAC has become the annual moment where policy, industry, and engineering collide. When leaders like Jen Easterly speak there, they set priorities that ripple through procurement, regulation, and product roadmaps. For developers and DevOps teams, that means choices made today affect CI/CD, supply chain practices, and the contract language vendors will be asked to meet.

Her core themes distilled for engineers

Easterly emphasized three interoperable pillars: strengthen public-private partnerships, bake resilience into software supply chains, and scale workforce and community-driven defense. Read this as: more collaboration with government CERTs, more SBOMs and attestations, and more community-run threat-sharing — all of which require engineering work to integrate and automate.

How to start aligning with the agenda

Start small: inventory your dependencies, automate SBOM generation, and join threat-sharing channels. Use free cloud-native tooling to prototype integrations before scaling. For practical cloud tooling to speed early wins, see Leveraging Free Cloud Tools for Efficient Web Development which outlines accessible platforms and tactics you can adopt in days, not months.

Key Themes from Jen Easterly's RSAC Keynote

Public-private partnerships are operational, not ceremonial

Easterly argued that collaboration between industry and government must be measurable and recurring. That means engineering teams should build APIs and telemetry exports that meet information-sharing formats so alerts, mitigations, and indicators of compromise (IOCs) can flow quickly to national-level defenders and back to vendors.

Resilience over heroics

She reframed cyber defense away from chasing every incident toward improving resilience: containment, rapid recovery, and redundancy. For software teams, that translates to resilience testing in staging and chaos experiments that validate backups, failover, and rollback plans.

Workforce and community investment

One repeated point was the role of community: mentorship, open-source maintainers, and developer collectives drive early detection and healthy ecosystems. Platforms that enable collaboration — from diagramming tools to shared runbooks — become strategic infrastructure. The discussion about collaborative diagramming tools at events like CES shows how visual collaboration scales cross-disciplinary work; learn more in The Future of Art and Technology: Collaborative Diagramming Tools.

Translating Policy into Practice: Developer Takeaways

Make secure-by-default the product requirement

Adopt secure defaults at project scaffolding and library levels. That means sensible TLS settings, strict cookie attributes, and runtime policies that flip the default to safer choices. For teams experimenting with new features, the guide on Optimizing AI Features in Apps offers a way to balance speed and control when enabling powerful capabilities.

Shift left: CI/CD as the control plane for compliance

Integrate SBOM generation, SCA (software composition analysis), license checks, and IaC scans into your pipelines. Use automation to fail builds on high-risk transitive dependencies. For pragmatic tool recommendations and cost-conscious approaches to cloud workflows, see Leveraging Free Cloud Tools for Efficient Web Development.

Threat modeling is a living artifact

Treat threat models as code: commit them, review them in PRs, and instrument automated checks. Pair threat models with runtime observability so hypotheses about attacker behavior can be validated in production telemetry.

Operationalizing Incident Response and Threat Sharing

Build playbooks, then automate them

Playbooks should be both human-readable and machine-actionable. Define clear triggers in your monitoring system that start automated containment steps (e.g., rotate credentials, isolate hosts) and escalate to human teams for forensics.

Telemetry and canonical formats

CISA and other agencies favor structured formats for fast uptake. Engineering teams that export standardized telemetry can participate in faster public-private collaboration. For examples of how government projects are embracing cloud tooling and data formats, see Government Missions Reimagined: The Role of Firebase in Developing Generative AI Solutions, which illustrates how governments can adopt developer-friendly platforms.

Joining information-sharing communities

Contribute sanitized IOCs and anonymized telemetry to ISACs or vendor-specific channels. Participation helps producers of intelligence close the detection gap and gives your teams early warning about new campaigns.

DevOps Practices to Implement RSAC Recommendations

Infrastructure-as-Code security

Use policy-as-code (e.g., Open Policy Agent) in your IaC pipeline to prevent insecure cloud configurations from being deployed. Block public S3 buckets and enforce least-privilege IAM roles automatically at merge time.

Secrets, ephemeral credentials, and vaulting

Move secrets out of source and into vaults with short TTLs; automate rotation. Systems that depend on service-to-service credentials should use workload identity (OIDC) rather than long-lived keys wherever possible.

Testing: fuzzing, SBOMs, and dependency hygiene

Automate SCA to flag known vulnerabilities and generate SBOMs as deliverables. For guidance on navigating patents and platform risks when selecting cloud providers and libraries, read Navigating Patents and Technology Risks in Cloud Solutions, which helps infosec and legal teams assess vendor risk early.

Secure Innovation: Speed Without Sacrificing Safety

Responsible AI and adversarial thinking

Easterly's remarks around emerging threats include AI-enabled attack vectors. Incorporate adversarial testing and red-team exercises into sprint cycles. The balance between innovation and control is discussed in depth in The Battle of AI Content, which helps product teams anticipate threat vectors from model misuse.

Product security review gates

Make security gates part of launch checklists: privacy review, data flow mapping, external dependencies, rate-limit testing, and abuse-case mitigation. For tactical steps on incremental deployment of new features, consider the sustainable deployment guide at Optimizing AI Features in Apps.

Procurement and vendor risk

Vendor contracts increasingly require clear SLAs, breach notification clauses, and evidence of secure development. Use procurement checklists that require SBOMs and attestations; this reduces surprise remediation costs later. For guidance on procurement trade-offs and hardware lifecycle costs, see the cost-focused analysis in Future-Proofing Your Tech Purchases.

Community Building: The Root of Resilient Ecosystems

Mentorship, open-source maintainers, and sharing

Investing in maintainers and community-run tooling prevents single points of failure in common libraries. Sponsor maintainers, contribute patches, and upstream fixes rather than forking unmaintained projects.

Design your vulnerability disclosure program to be friendly and actionable. Clear triage timelines and safe-harbor language increase participation and speed remediation. For onboarding and identity-related risks that affect crypto and blockchain teams, The Future of Onboarding provides context on identity fraud prevention.

Training and collaborative tooling

Everyone from junior devs to SREs should have access to practice environments for incident simulation and an internal wiki of evidence-backed runbooks. Collaborative diagramming and documentation methods lower the onboarding time for responders; see The Future of Art and Technology: Collaborative Diagramming Tools for examples of usable techniques.

Implementing Public-Private Partnerships at Team Level

Talk standards, not just contacts

Define what you can share (sanitized telemetry, IOCs) and the formats you'll use. Following common schemas speeds integration with national partners. Examples of government adoption of developer platforms and standards are highlighted in Government Missions Reimagined.

Participating in exercises and drills

Engage with tabletop exercises hosted by regional ISACs or CISA. These exercises reveal personnel gaps and tooling weaknesses before a crisis occurs and improve your incident playbooks.

Always coordinate through your privacy and legal teams to ensure shared artifacts can't be reverse-engineered to expose customer data. Well-structured anonymization pipelines enable useful threat intelligence without privacy risk.

90-Day Roadmap: Concrete Steps for Engineering Teams

30-day quick wins

Run an SBOM baseline, enable SCA in CI, and fix high-severity findings. Use lightweight cloud tools to prototype telemetry exports. For step-by-step free tooling options, revisit Leveraging Free Cloud Tools.

60-day integrations

Automate SBOM generation and retention, integrate policy-as-code in IaC checks, and roll out a secret management vault. Connect your telemetry exports to an internal threat mailbox and build a default playbook for common incidents.

90-day measurable outcomes

Measure reduced mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR), percentage of critical dependencies remediated, and number of staff trained in incident playbooks. For cost justification and procurement support, consult analyses like Future-Proofing Your Tech Purchases.

Benchmarks, Metrics, and the Business Case

Core security KPIs to track

Track MTTD, MTTR, percentage of infrastructure under policy enforcement, percentage of builds with SBOMs, and open-source dependency health. These metrics translate security investment into operational outcomes.

SLAs and uptime expectations

Define SLAs for detection and notification, especially if you are a vendor to critical infrastructure. Embedding observability and alerts into your SLAs improves trust with customers and partners.

Cost-benefit and procurement signals

Security investments are often defensible when evaluated as avoided incident costs and reduced remediation time. When discussing vendor selection, include patent and technology risk assessment to avoid surprise lock-in; see Navigating Patents and Technology Risks in Cloud Solutions.

Practical Comparison: Approaches to Key RSAC Priorities

Use the table below to decide which approach to adopt first based on team size and maturity.

Priority Recommended Approach Developer Action Time to Value
SBOM & Dependency Hygiene Automated SBOM generation + SCA in CI Integrate SCA scanner, fail on critical CVEs, publish SBOM 305 days
Zero Trust Workload identity + short-lived certs Replace long-lived keys with OIDC & rotate creds 60 0 days
Telemetry & Threat Sharing Standardized telemetry exports (structured IOCs) Map telemetry to schemas, add export hooks 60 0 days
IaC Policy Policy-as-code enforcement in PRs Implement OPA/Rego rules, block unsafe merges 300 days
Community & Talent Mentorship programs & contributor support Sponsor maintainers, offer bounties, run TF exercises 9020 days
Pro Tip: Measure MTTD and MTTR before and after each initiative; even small improvements in detection time compound across services.

Case Study Patterns: What Works

Teams that automated early

Organizations that embedded SCA and SBOMs into their pipelines saw a 4050% reduction in remediation time for dependency issues. The early cost is tooling and time; the payoff is lower incident fatigue and faster audits.

Teams that partnered with authorities

Those that integrated standardized telemetry formats and engaged in local exercise programs were able to re-route zero-day intelligence and harden endpoints before large-scale exploitation.

Teams that invested in community

Sponsorship of OSS maintainers and open disclosure programs increased trustworthy signal-sharing and reduced the time from discovery to upstream fix.

Actionable Recipes

Recipe: Adding SBOM generation to your pipeline

Choose a lightweight generator (e.g., Syft), run it in a pipeline stage after build, store the SBOM artifact, and publish a signed SBOM with every release. Automate a policy check that blocks releases without an SBOM.

Recipe: Telemetry export for ISACs

Sanitize PII, map events to agreed schemas, and push to a secure endpoint accessible by your ISAC or partner. Validate using schema tests and a replay environment to ensure nothing leaks.

Recipe: Short-lived credentials migration

Introduce an authentication broker that issues short-lived credentials via OIDC, gradually replace long-lived keys in services, and run a rollout that continuously validates rotation success with canaries.

Conclusion: From RSAC Rhetoric to Developer Routine

Start with measurable controls

Jen Easterly's RSAC message is actionable: move from one-off projects to automated controls that measurably reduce risk. Start with SBOMs, pipeline policy, and telemetry exports.

Collaborate and contribute

Participation in public-private programs, upstream open-source fixes, and community training multiplies defenses faster than individual investment alone. For more on balancing innovation and tradition while protecting consumers, see Balancing Innovation and Tradition: The Role of AI in Marketing and Consumer Protection.

Keep learning and iterate

Security is iterative. Use the 90-day roadmap above and maintain a rolling backlog of improvements. For teams building features that rely on mapping and location APIs, consider integration impacts discussed in Maximizing Google Maps9s New Features for Enhanced Navigation in Fintech APIs as an example of feature-level security considerations.

FAQ

Q1: What exactly did Jen Easterly ask industry to do?

She asked for operational collaboration: standardized telemetry formats, regular exercises, and faster public-private feedback loops to improve detection and response at scale.

Q2: How do SBOMs help in the supply chain?

SBOMs make dependency inventories auditable and machine-readable, enabling rapid identification of impacted artifacts when a vulnerability is disclosed.

Q3: Is it realistic for small teams to follow RSAC guidance?

Yes. Start with free tooling and incremental changes (SCA in CI and SBOM generation). Low-friction wins compound and prepare your team for larger investments later. See Leveraging Free Cloud Tools.

Q4: How should teams engage with public agencies?

Identify your regional ISAC, adopt agreed sharing formats, and attend exercises. Maintain a legal-approved list of shareable artifacts and anonymization steps.

Q5: What are the common pitfalls when implementing these changes?

Pitfalls include: treating SBOMs as marketing, not automating policy checks, and sharing unanonymized data without legal review. Avoid these by embedding automation and legal review into pipelines.

Further developer resources referenced in this guide include technology, procurement, and community resources. Related operational patterns and tool reads are linked inline, including practical guides on free cloud tooling, responsible AI deployment, and navigating vendor risks.

Advertisement

Related Topics

#cybersecurity#events#innovation
U

Unknown

Contributor

Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.

Advertisement
2026-03-26T00:00:12.226Z