Posted: 5 Min ReadExpert Perspectives

5 RSAC™ Trends SecOps Pros Are Watching

Check out the hottest tracks in security before you get to the party

  • At RSAC™ 2025 Conference, we’ve identified five trends SecOps pros will be watching across booths, speaker sessions and workshops.
  • AI is still topping the charts for attackers and defenders, but they’re not the only players changing the scene.
  • There are no solo acts in cybersecurity—collective efforts are making for unforgettable performances at the conference and IRL. 

With a dizzying lineup that’ll have you spinning like a record (baby, right round), this year’s RSAC™ 2025 Conference is pulling out all the stops. From exclusive 1:1 meet-ups with industry rockstars to deep-dives on the latest trends in cybersecurity, the RSAC 2025 stage is set—and the spotlight is on innovation and community.  

With over 500 events packed into five epic days—keynotes, hands-on labs, seminars and after-hour parties—there’s a lot to take in. But don’t worry: walk you through the big topics taking center stage this year. From API vulnerabilities in identity security to AI’s grip on the industry, we’ve curated a list of what’s heating up the scene—no skips, all bangers.

Take 5: Top trends to have on your radar

Here’s what we predict you’ll be hearing and seeing at booths, sessions and keynotes all week. 

1. Livin’ in an AI world

Expect talks around predictive security and AI-driven solutions as teams leverage AI and machine learning (ML) to stay ahead of automated attack tools and AI-enhanced malware. With AI driving both innovation and risk in cybersecurity, organizations integrating it in security and productivity tools need ways to simplify data governance. The security of their assets depends on it. 

We’ll be on site joining the conversation with our own perspective—and we’ll have the tech to back it up. We’ll be showcasing our recently released Incident Prediction, a first-of-its-kind capability that can accurately predict an attackers’ next four or five moves with up to 100% confidence. With the threat of attackers inevitably leveraging AI agents to do much of their heavy lifting, innovations like Incident Prediction help ensure that even if we are living in an AI world, we can stay ahead of the threat curve.

2. Pressure pushing down on me ECH

Encrypted Client Hello (ECH) has been getting quite the positive reception, with some calling it the missing piece of the privacy puzzle. But threat actors are already finding ways to hide within encrypted traffic, using ECH to mask their movements and bypass traditional detection methods. 

68% of surveyed organizations have been hit by this tactic, with 44% experiencing it more than once—more than enough proof that a lack of visibility and awareness is being weaponized. Another 7% suspect they’ve been attacked but aren’t sure.

So yeah, we’re all under pressure. But you’re not in this alone. Catch our experts, Arnauld Taddei and Roelof du Toit, as they break down what ECH means for your security posture and what you can do to protect your business.

ECH: Hello to Enhanced Privacy or Goodbye to Visibility?
Arnauld Taddei and Roelof Du Toit
Monday, April 28th at 10:50 am
Session code: NCS-M03  

3. Another one bites the SMB

Nation-state attackers and APTs have shifted their focus from high-profile targets like big enterprises and government entities to supply chains, critical vendors and even smaller businesses. Their unique vulnerabilities are simply irresistible to bad actors. This persistent rise in attacks on SMBs is making nation-states one of the most called-out threats of the season—and it underscores the need for even the smallest organizations to deploy enterprise-grade security. 

For an exclusive look into how these threats keep escalating and the defenses you need to block these stalkers, don’t miss out on Eric Chien and Jason Rolleston’s data-backed, candid conversation. 

Under Siege: How APTs and Nation-States Are Coming for Everyone
Eric Chien and Jason Rolleston
Tuesday, April 29th at 2:25 pm
Session Code: Partner Perspectives 

4. Secure your API—with a little help from your friends

The explosion of Generative AI and Large Language Models (LLMs) has dramatically raised concerns for API security in 2025. As the backbone of GenAI systems, APIs shuttle a lot of information between users and systems, making them prime targets. With LLMs embedded into nearly everything, bad actors can easily attack unsecured APIs and cause a host of damage.

As organizations continue to roll out more AI-driven features, the API attack surface grows. Predicting and preventing API-related breaches is becoming paramount, and experts agree secure communications are no longer just a backend concern—it’s a shared responsibility across teams and industries. Hey, there’s no shame in getting by with a little help from your friends

5. We are family 

RSAC 2025’s message this year is clear—intelligence sharing and cross-sector collaboration offer the strongest strategy to outpace today’s trending threats like ransomware cartels, expanding attack surfaces and complex cloud vulnerabilities. No single company, government or regulator can (or should) tackle these challenges alone. United under Broadcom, Symantec and Carbon Black stand together as pioneers in global cybersecurity

Within this community, the Symantec Threat Hunter Team is a vital force that relentlessly tracks down emerging threats and shares frontline intelligence. Recently, they uncovered Medusa, a ransomware-as-a-service (RaaS) operation attributed to the group Spearwing. Our hunters exposed their activities, tools and tactics, giving defenders the intel they needed to quickly detect and respond to similar attacks. 

After all, we are family—bound by purpose and driven by a shared mission to protect.

How’s this for an encore?

Symantec and Carbon Black are gearing up to make RSAC 2025 more than a conference. For us, it’s the stage for the ultimate collab track, and we want you on it. But before you hit the show floor, let us set the mood. 

  • Check out our carefully curated RSAC 2025 playlist to get you in the zone for epic collaborations before the sessions even start.
  • See everywhere you can find us. We’ve planned an unforgettable start-to-finish experience.
  • Swing by our booth to enter our exclusive AI-driven experience that puts you on the cover of some of the most iconic albums in history.

Ok, now you’re ready. Make sure to find us at booth N-5345 in the Moscone’s Center’s North Hall—your all-in-one stop for cutting-edge solutions that bring the heat. 

Symantec Enterprise Blogs
You might also enjoy
5 Min Read

One Booth at RSAC™ 2025 Conference Will Justify Your Whole Trip

Find us at RSAC 2025 for a backstage pass to some of the industry’s greatest hits

Symantec Enterprise Blogs
You might also enjoy
4 Min Read

Your RSAC™ 2025 Conference Playlist is Here

We’ve got the beats for the biggest security conference of the year

About the Author

Monica White

Chief Marketing Officer, Enterprise Security Group, Broadcom

Monica White is Chief Marketing Officer for Broadcom’s Enterprise Security Group, which offers cybersecurity solutions from Symantec and Carbon Black. She has spent more than two decades in cybersecurity working to make the world safer and more secure.

Want to comment on this post?

We encourage you to share your thoughts on your favorite social platform.