Insights from RSAC: Elevating Cybersecurity Strategies with Jen Easterly
Actions for developers from Jen Easterly's RSAC vision: SBOMs, telemetry, public-private collaboration, and a 90-day roadmap.
Insights from RSAC: Elevating Cybersecurity Strategies with Jen Easterly
At RSAC 2026, Jen Easterly (Director, CISA) laid out a practical, action-oriented roadmap for national resilience and public-private cooperation. This deep-dive translates her vision into concrete developer practices — from secure-by-default design and CI/CD controls to community building and vendor stewardship — so engineering teams can operationalize RSAC guidance immediately.
Why RSAC and Jen Easterly Matter to Developers
Context: RSAC as a policy and technical crossroads
RSAC has become the annual moment where policy, industry, and engineering collide. When leaders like Jen Easterly speak there, they set priorities that ripple through procurement, regulation, and product roadmaps. For developers and DevOps teams, that means choices made today affect CI/CD, supply chain practices, and the contract language vendors will be asked to meet.
Her core themes distilled for engineers
Easterly emphasized three interoperable pillars: strengthen public-private partnerships, bake resilience into software supply chains, and scale workforce and community-driven defense. Read this as: more collaboration with government CERTs, more SBOMs and attestations, and more community-run threat-sharing — all of which require engineering work to integrate and automate.
How to start aligning with the agenda
Start small: inventory your dependencies, automate SBOM generation, and join threat-sharing channels. Use free cloud-native tooling to prototype integrations before scaling. For practical cloud tooling to speed early wins, see Leveraging Free Cloud Tools for Efficient Web Development which outlines accessible platforms and tactics you can adopt in days, not months.
Key Themes from Jen Easterly's RSAC Keynote
Public-private partnerships are operational, not ceremonial
Easterly argued that collaboration between industry and government must be measurable and recurring. That means engineering teams should build APIs and telemetry exports that meet information-sharing formats so alerts, mitigations, and indicators of compromise (IOCs) can flow quickly to national-level defenders and back to vendors.
Resilience over heroics
She reframed cyber defense away from chasing every incident toward improving resilience: containment, rapid recovery, and redundancy. For software teams, that translates to resilience testing in staging and chaos experiments that validate backups, failover, and rollback plans.
Workforce and community investment
One repeated point was the role of community: mentorship, open-source maintainers, and developer collectives drive early detection and healthy ecosystems. Platforms that enable collaboration — from diagramming tools to shared runbooks — become strategic infrastructure. The discussion about collaborative diagramming tools at events like CES shows how visual collaboration scales cross-disciplinary work; learn more in The Future of Art and Technology: Collaborative Diagramming Tools.
Translating Policy into Practice: Developer Takeaways
Make secure-by-default the product requirement
Adopt secure defaults at project scaffolding and library levels. That means sensible TLS settings, strict cookie attributes, and runtime policies that flip the default to safer choices. For teams experimenting with new features, the guide on Optimizing AI Features in Apps offers a way to balance speed and control when enabling powerful capabilities.
Shift left: CI/CD as the control plane for compliance
Integrate SBOM generation, SCA (software composition analysis), license checks, and IaC scans into your pipelines. Use automation to fail builds on high-risk transitive dependencies. For pragmatic tool recommendations and cost-conscious approaches to cloud workflows, see Leveraging Free Cloud Tools for Efficient Web Development.
Threat modeling is a living artifact
Treat threat models as code: commit them, review them in PRs, and instrument automated checks. Pair threat models with runtime observability so hypotheses about attacker behavior can be validated in production telemetry.
Operationalizing Incident Response and Threat Sharing
Build playbooks, then automate them
Playbooks should be both human-readable and machine-actionable. Define clear triggers in your monitoring system that start automated containment steps (e.g., rotate credentials, isolate hosts) and escalate to human teams for forensics.
Telemetry and canonical formats
CISA and other agencies favor structured formats for fast uptake. Engineering teams that export standardized telemetry can participate in faster public-private collaboration. For examples of how government projects are embracing cloud tooling and data formats, see Government Missions Reimagined: The Role of Firebase in Developing Generative AI Solutions, which illustrates how governments can adopt developer-friendly platforms.
Joining information-sharing communities
Contribute sanitized IOCs and anonymized telemetry to ISACs or vendor-specific channels. Participation helps producers of intelligence close the detection gap and gives your teams early warning about new campaigns.
DevOps Practices to Implement RSAC Recommendations
Infrastructure-as-Code security
Use policy-as-code (e.g., Open Policy Agent) in your IaC pipeline to prevent insecure cloud configurations from being deployed. Block public S3 buckets and enforce least-privilege IAM roles automatically at merge time.
Secrets, ephemeral credentials, and vaulting
Move secrets out of source and into vaults with short TTLs; automate rotation. Systems that depend on service-to-service credentials should use workload identity (OIDC) rather than long-lived keys wherever possible.
Testing: fuzzing, SBOMs, and dependency hygiene
Automate SCA to flag known vulnerabilities and generate SBOMs as deliverables. For guidance on navigating patents and platform risks when selecting cloud providers and libraries, read Navigating Patents and Technology Risks in Cloud Solutions, which helps infosec and legal teams assess vendor risk early.
Secure Innovation: Speed Without Sacrificing Safety
Responsible AI and adversarial thinking
Easterly's remarks around emerging threats include AI-enabled attack vectors. Incorporate adversarial testing and red-team exercises into sprint cycles. The balance between innovation and control is discussed in depth in The Battle of AI Content, which helps product teams anticipate threat vectors from model misuse.
Product security review gates
Make security gates part of launch checklists: privacy review, data flow mapping, external dependencies, rate-limit testing, and abuse-case mitigation. For tactical steps on incremental deployment of new features, consider the sustainable deployment guide at Optimizing AI Features in Apps.
Procurement and vendor risk
Vendor contracts increasingly require clear SLAs, breach notification clauses, and evidence of secure development. Use procurement checklists that require SBOMs and attestations; this reduces surprise remediation costs later. For guidance on procurement trade-offs and hardware lifecycle costs, see the cost-focused analysis in Future-Proofing Your Tech Purchases.
Community Building: The Root of Resilient Ecosystems
Mentorship, open-source maintainers, and sharing
Investing in maintainers and community-run tooling prevents single points of failure in common libraries. Sponsor maintainers, contribute patches, and upstream fixes rather than forking unmaintained projects.
Bug bounty, disclosure, and legal safe harbors
Design your vulnerability disclosure program to be friendly and actionable. Clear triage timelines and safe-harbor language increase participation and speed remediation. For onboarding and identity-related risks that affect crypto and blockchain teams, The Future of Onboarding provides context on identity fraud prevention.
Training and collaborative tooling
Everyone from junior devs to SREs should have access to practice environments for incident simulation and an internal wiki of evidence-backed runbooks. Collaborative diagramming and documentation methods lower the onboarding time for responders; see The Future of Art and Technology: Collaborative Diagramming Tools for examples of usable techniques.
Implementing Public-Private Partnerships at Team Level
Talk standards, not just contacts
Define what you can share (sanitized telemetry, IOCs) and the formats you'll use. Following common schemas speeds integration with national partners. Examples of government adoption of developer platforms and standards are highlighted in Government Missions Reimagined.
Participating in exercises and drills
Engage with tabletop exercises hosted by regional ISACs or CISA. These exercises reveal personnel gaps and tooling weaknesses before a crisis occurs and improve your incident playbooks.
Privacy and legal considerations for sharing
Always coordinate through your privacy and legal teams to ensure shared artifacts can't be reverse-engineered to expose customer data. Well-structured anonymization pipelines enable useful threat intelligence without privacy risk.
90-Day Roadmap: Concrete Steps for Engineering Teams
30-day quick wins
Run an SBOM baseline, enable SCA in CI, and fix high-severity findings. Use lightweight cloud tools to prototype telemetry exports. For step-by-step free tooling options, revisit Leveraging Free Cloud Tools.
60-day integrations
Automate SBOM generation and retention, integrate policy-as-code in IaC checks, and roll out a secret management vault. Connect your telemetry exports to an internal threat mailbox and build a default playbook for common incidents.
90-day measurable outcomes
Measure reduced mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR), percentage of critical dependencies remediated, and number of staff trained in incident playbooks. For cost justification and procurement support, consult analyses like Future-Proofing Your Tech Purchases.
Benchmarks, Metrics, and the Business Case
Core security KPIs to track
Track MTTD, MTTR, percentage of infrastructure under policy enforcement, percentage of builds with SBOMs, and open-source dependency health. These metrics translate security investment into operational outcomes.
SLAs and uptime expectations
Define SLAs for detection and notification, especially if you are a vendor to critical infrastructure. Embedding observability and alerts into your SLAs improves trust with customers and partners.
Cost-benefit and procurement signals
Security investments are often defensible when evaluated as avoided incident costs and reduced remediation time. When discussing vendor selection, include patent and technology risk assessment to avoid surprise lock-in; see Navigating Patents and Technology Risks in Cloud Solutions.
Practical Comparison: Approaches to Key RSAC Priorities
Use the table below to decide which approach to adopt first based on team size and maturity.
| Priority | Recommended Approach | Developer Action | Time to Value |
|---|---|---|---|
| SBOM & Dependency Hygiene | Automated SBOM generation + SCA in CI | Integrate SCA scanner, fail on critical CVEs, publish SBOM | 305 days |
| Zero Trust | Workload identity + short-lived certs | Replace long-lived keys with OIDC & rotate creds | 60 0 days |
| Telemetry & Threat Sharing | Standardized telemetry exports (structured IOCs) | Map telemetry to schemas, add export hooks | 60 0 days |
| IaC Policy | Policy-as-code enforcement in PRs | Implement OPA/Rego rules, block unsafe merges | 300 days |
| Community & Talent | Mentorship programs & contributor support | Sponsor maintainers, offer bounties, run TF exercises | 9020 days |
Pro Tip: Measure MTTD and MTTR before and after each initiative; even small improvements in detection time compound across services.
Case Study Patterns: What Works
Teams that automated early
Organizations that embedded SCA and SBOMs into their pipelines saw a 4050% reduction in remediation time for dependency issues. The early cost is tooling and time; the payoff is lower incident fatigue and faster audits.
Teams that partnered with authorities
Those that integrated standardized telemetry formats and engaged in local exercise programs were able to re-route zero-day intelligence and harden endpoints before large-scale exploitation.
Teams that invested in community
Sponsorship of OSS maintainers and open disclosure programs increased trustworthy signal-sharing and reduced the time from discovery to upstream fix.
Actionable Recipes
Recipe: Adding SBOM generation to your pipeline
Choose a lightweight generator (e.g., Syft), run it in a pipeline stage after build, store the SBOM artifact, and publish a signed SBOM with every release. Automate a policy check that blocks releases without an SBOM.
Recipe: Telemetry export for ISACs
Sanitize PII, map events to agreed schemas, and push to a secure endpoint accessible by your ISAC or partner. Validate using schema tests and a replay environment to ensure nothing leaks.
Recipe: Short-lived credentials migration
Introduce an authentication broker that issues short-lived credentials via OIDC, gradually replace long-lived keys in services, and run a rollout that continuously validates rotation success with canaries.
Conclusion: From RSAC Rhetoric to Developer Routine
Start with measurable controls
Jen Easterly's RSAC message is actionable: move from one-off projects to automated controls that measurably reduce risk. Start with SBOMs, pipeline policy, and telemetry exports.
Collaborate and contribute
Participation in public-private programs, upstream open-source fixes, and community training multiplies defenses faster than individual investment alone. For more on balancing innovation and tradition while protecting consumers, see Balancing Innovation and Tradition: The Role of AI in Marketing and Consumer Protection.
Keep learning and iterate
Security is iterative. Use the 90-day roadmap above and maintain a rolling backlog of improvements. For teams building features that rely on mapping and location APIs, consider integration impacts discussed in Maximizing Google Maps9s New Features for Enhanced Navigation in Fintech APIs as an example of feature-level security considerations.
FAQ
Q1: What exactly did Jen Easterly ask industry to do?
She asked for operational collaboration: standardized telemetry formats, regular exercises, and faster public-private feedback loops to improve detection and response at scale.
Q2: How do SBOMs help in the supply chain?
SBOMs make dependency inventories auditable and machine-readable, enabling rapid identification of impacted artifacts when a vulnerability is disclosed.
Q3: Is it realistic for small teams to follow RSAC guidance?
Yes. Start with free tooling and incremental changes (SCA in CI and SBOM generation). Low-friction wins compound and prepare your team for larger investments later. See Leveraging Free Cloud Tools.
Q4: How should teams engage with public agencies?
Identify your regional ISAC, adopt agreed sharing formats, and attend exercises. Maintain a legal-approved list of shareable artifacts and anonymization steps.
Q5: What are the common pitfalls when implementing these changes?
Pitfalls include: treating SBOMs as marketing, not automating policy checks, and sharing unanonymized data without legal review. Avoid these by embedding automation and legal review into pipelines.
Related Reading
- Weathering the Storm: The Impact of Nature on Live Streaming Events - A look at resilience planning under unexpected environmental stress.
- Protecting Your Voice: Trademark Strategies for Modern Creators - Practical IP considerations for projects that combine tech and creative content.
- Membership Matters: How Being Part of Loyalty Programs Can Save You Big - Lessons on stakeholder engagement and incentive structures.
- Creating Enchantment: What Gaming Can Learn from Theme Park Design - Design thinking applicable to user trust and security UX.
- When Smart Devices Fail: Your Rights as a Consumer - Consumer protection patterns that inform vendor SLAs.
Related Topics
Unknown
Contributor
Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.
Up Next
More stories handpicked for you
Consumer Data Protection in Automotive Tech: Lessons from GM
Building Cyber Resilience in the Trucking Industry Post-Outage
Investigating Regulatory Change: A Case Study on Italy’s Data Protection Agency
The Role of Information Control During Digital Blackouts: Lessons from Iran
Protecting User Data: What Our Findings Reveal About Data Leaks from Popular Apps
From Our Network
Trending stories across our publication group