The Security Strategist

EM360Tech

With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively. Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.

  1. How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground

    1D AGO

    How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground

    Financial crime is no longer a peripheral concern for banks and fintechs; it is a defining operational challenge. The pressure to grow transaction volumes, onboard customers quickly, and keep pace with increasingly sophisticated fraud actors has placed finance and compliance teams at the very heart of business strategy. For many institutions, the question is no longer how to use artificial intelligence in their fraud detection stack, but how to use it responsibly. In this Security Strategist podcast, hosted by Jonathan Care, Senior Lead Analyst at KuppingerCole, he speaks with Kunal Datta, Chief Product Officer at Unit21, about the changes in financial crime prevention technology and the gaps that remain in the industry. The role of AI in fraud detectionFor most of the past two decades, financial crime prevention operated on one of two tracks. Larger, data-rich institutions invested in machine learning models capable of identifying complex behavioural patterns across millions of transactions. Smaller players, or those entering new product categories with thin data histories, tended to rely on rules-based systems, which are explicit, human-authored logic that flags transactions meeting predefined criteria. Both approaches have genuine strengths. Rules-based systems are auditable, easy to explain to a regulator, and quick to update when a new fraud typology emerges. Machine learning systems are far more powerful at surfacing non-obvious correlations and adapting to evolving attack patterns, but they require substantial training data and significant engineering effort to deploy. The arrival of large language models and generative AI has introduced a third paradigm, one that is fundamentally non-deterministic. Unlike a rule that fires predictably on every run, or an ML model that produces a consistent probability score for a given feature vector, a generative AI system may reason differently across identical inputs. This has profound implications for how institutions build, test, and govern their fraud detection infrastructure. Balancing revenue growth and fraud riskPerhaps the most underappreciated tension in financial crime prevention is not technical; it is commercial. Every fraud control is also a friction point. A transaction declined as suspicious is, from the customer's perspective, simply a transaction that failed. Every false positive erodes trust, damages conversion rates, and risks losing a customer to a competitor with a more permissive onboarding flow. According to Datta: “Machine learning excels at identifying complex patterns, but rules-based systems can quickly adapt to new types of fraud that humans can spot with minimal examples.” This means that fraud teams are never simply optimising for fraud prevention in isolation. They are solving a constrained optimisation problem that is minimising fraud losses while simultaneously protecting revenue, preserving customer experience, and staying within the bounds of what regulators require. AI can shift that frontier, enabling more precise risk assessment that reduces both fraud and false positives simultaneously. But only if it is deployed and governed carefully. The future of AI in financial crimeLooking forward, Datta sees the trajectory of AI in financial crime prevention pointing towards systems that combine the pattern-recognition power of machine learning with increasingly robust mechanisms for transparency and accountability. The goal is not to choose between a powerful AI and an explainable one — it is to build infrastructure that delivers both. Several technical approaches are emerging to close this gap. Structured output formatting — requiring AI systems to return decisions in machine-readable formats like JSON, with explicit reasoning chains, makes it possible to audit AI behaviour at scale. Evaluation sets, which establish a curated baseline of labelled cases against which model performance is continuously benchmarked, allow institutions to detect drift and maintain defensible performance records.  The institutions that will lead this space are those treating AI governance not as a compliance overhead but as a competitive advantage. A well-governed AI system is faster to get regulatory approval, faster to deploy new capabilities, and more resilient when regulatory scrutiny increases. The most striking thread in Datta's thinking is his insistence on placing financial crime prevention within a broader moral frame. Financial crime is not merely an operational risk; it is a conduit for some of the most serious harms in the world: human trafficking, modern slavery, terrorist financing, and the systematic exploitation of vulnerable people. Viewed through this lens, the deployment of better AI in financial crime prevention is not primarily a business efficiency story. It is a contribution to a more just and safer world. Datta says: “AI should be viewed not only as an efficiency driver but as a tool to address broader societal issues like human trafficking and exploitation. Better detection is a moral obligation.” This framing matters for how organisations think about investment in financial crime technology. If AI in fraud prevention is purely a cost centre, it will always lose budget battles to revenue-generating activities.  If you would like to find out more, visit: Unit21.ai or read more about Rules vs. Machine Learning: Finding the Best of Both Worlds by Kunal Datta. If you are looking to strengthen how your organisation identifies and manages risk, you can request a personalised demo with Unit21. TakeawaysEvolution of financial crime detection over the last decadeDeterministic vs non-deterministic AI systems in fraud preventionThe role of generative AI and context engineering in complianceAccountability and explainability in AI-driven decision makingRegulatory perspectives on AI and risk management 00:00 Navigating Financial Crime Prevention Challenges 02:54 The Evolution of Fraud Detection Systems 05:55 The Debate: Explainability vs. Performance in AI 08:51 Balancing Accuracy and Regulatory Expectations 12:01 Context Engineering in AI for Financial Crime 15:04 Rethinking Accountability in AI Systems 17:55 AI as a Societal Imperative in Risk and Compliance

    25 min
  2. Can Real-Time Identity Governance Replace Access Reviews for Good?

    6D AGO

    Can Real-Time Identity Governance Replace Access Reviews for Good?

    Podcast: The Security Strategist Guest: Rick Wagner, Senior Director, Product Management at SailPoint Analyst: Jonathan Care, Lead Analyst, KuppingerCole The identity security market is crowded, but a significant change is occurring below the surface. In a recent episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole, sat down with Rick Wagner, Sr. Director Product Management at SailPoint. In this episode, Wagner pointed out a growing gap between how enterprises manage access and how modern systems operate. As AI and machine identities grow rapidly, traditional models no longer work. Static Access Reviews Are Breaking at ScaleFor years, enterprises have depended on periodic access certifications to manage access. However, such a model is proving to be weak. “Periodic access reviews only look at appropriate access at a point in time,” says Wagner, noting that “certification fatigue results in rubber stamping.” The challenge is both scale and accuracy. With machine identities often outnumbering humans, governance processes designed for manual oversight are quickly becoming outdated. “Doing those certifications at agent speed is literally impossible,” he adds, emphasising the need for change. Also Watch: Why AI Agents Demand a New Approach to Identity Security How is Real-Time Authorisation & AI Redefining Identity Security?The way ahead is real-time authorisation, which continuously checks if access is appropriate at the moment it is requested. “It’s not only appropriate— is it appropriate right now?” Wagner explains. This change depends on context, incorporating information such as device health, user behaviour, and risk level. Frameworks like the Shared Signals Framework help enterprises implement this by allowing real-time data sharing across the security ecosystem. This approach leads to more dynamic, policy-driven access that keeps pace with AI systems. How to Tackle Shadow AI?At the same time, CISOs face the rise of shadow AI, an expanding network of agents operating with little oversight. “You can’t manage what you can’t see or what you don’t know about,” says Wagner, highlighting visibility as the first line of defence. The long-term goal is autonomous identity governance, where systems continuously evaluate and adjust access based on risk. “As risk levels start to increase, we might add additional factors up to quarantining that access,” he explains. In this new framework, identity becomes the core of cybersecurity strategy. As Wagner puts it, the ongoing challenge is urgent – determining “who has access to what—and is that access appropriate right now.” Key TakeawaysReal-time identity governance replacing static access reviews AI and machine identities outpace human oversight“Certification fatigue” is weakening traditional access controls, increasing risk through unchecked approvals.Non-human identities (AI agents, bots) are now the fastest-growing and least visible attack surface.Context-aware access decisions—based on risk, behaviour, and environment—are becoming the new standard.Visibility into agents and their permissions is critical: “you can’t manage what you can’t see.”Autonomous, risk-adaptive identity security is emerging as the end-state for modern enterprise cybersecurity. Chapters00:00 Introduction to Identity Security in AI Era 06:54 Managing Privileged Access Risks 13:52 Real-Time Governance and Joiners, Movers, Leavers 20:14 Strategic Moves for CISOs in Agent-Based Operations For more information, please visit em360tech.com and sailpoint.com. To stay updated on B2B Tech front and centre, follow EM360Tech: YouTube: @enterprisemanagement360 LinkedIn: @EM360Tech X: @EM360Tech Follow SailPoint on all its major platforms: YouTube: @SailPointTechnologies LinkedIn: @SailPoint X: @SailPoint #IdentitySecurity #AIAgents #RealTimeGovernance #SailPoint #IAM #ShadowAI #Cybersecurity #EnterpriseTech #TechLeadership #CIOInsights #DigitalTransformation #MachineIdentities

    22 min
  3. Non-Human Identities and Agentic AI: The New Frontier in Identity Security

    APR 27

    Non-Human Identities and Agentic AI: The New Frontier in Identity Security

    Over 95 per cent of leaders now say identity security is core to their strategy. A decade ago, this wasn’t even part of the conversation. The awareness is there, but awareness alone isn’t enough. Many organisations feel secure, yet the metrics they track often tell a different story.  In this episode of Security Strategist, EM360Tech’s Trisha Pillay sits down with Craig Ramsay, Senior Field Strategist, and Rod Simmons, VP of Product Strategy at Omada, to unpack the State of Identity Governance 2026 report. Together, they explore why confidence in identity security doesn’t always equal true protection and how AI, non-human identities, and fragmented systems are changing the rules. Bridging the Gap Between Perception and RealityMany organisations focus on operational metrics that are easy to measure: provisioning speed, audit readiness, and compliance. These give a sense of efficiency but not necessarily security. Simmons explains: “We can provision identities faster, but that doesn’t tell us about inherent risks. Orphaned accounts, dormant privileges, unmanaged access—these risks often go unseen.” Ramsay adds, “It’s like home security. You might feel confident, but when was the last time you checked your back door?” The survey revealed a clear disconnect: strategic awareness exists, but organisations are not always measuring the right things. Security leaders should not only track completed tasks, but they must also understand where risk accumulates and how quickly they can respond to incidents. Risk-based metrics, rather than activity-based metrics, are the key to true governance. Zero Trust and the Challenge of IntegrationAlmost every organisation reports adopting Zero Trust principles. The execution often falls short. Policies may exist in pockets, but full implementation requires connected systems that can share signals in real time. Without this integration, Zero Trust becomes a concept rather than a functioning model. Rod highlights the issue: “It’s one thing to want continuous evaluation, but another to have systems that actually support it. Shared signal frameworks are essential for consistent enforcement across the enterprise.” Until Zero Trust principles are fully integrated across all platforms, access control and identity governance will remain reactive rather than proactive. Non-Human Identities, AI, and the New FrontlineIdentity is no longer just about people. Non-human identities, but API keys, service accounts, and AI agents, are multiplying at unprecedented rates. Some organisations see 150 non-human identities for every human. These identities act autonomously, persistently, and at scale. Simmons explains the challenge: “With human identities, we ask what access they have. With non-human identities, we ask what they can do, and what they’ve done.” Ramsay adds a crucial reminder: “Artificial intelligence still needs an accountable individual. Human oversight is essential, even as AI agents scale and operate independently.” These agents create both risk and opportunity. They can automate governance, improve provisioning, and flag anomalies—but without proper visibility and ownership, they become a blind spot. Over 40 per cent of surveyed organisations admitted their AI agents still use static credentials, a simple but serious vulnerability. One thing is for sure: you cannot govern what you cannot see. Visibility is the foundation. Only once organisations know what exists, who owns it, and how it behaves can they secure identities, human and non-human alike, effectively. Identity security is no longer a back-office concern—it’s strategic. Organisations must move from confidence to proof, from operational reporting to risk measurement, and from fragmented controls to integrated governance. AI and non-human identities are not just a challenge; they are an opportunity to rethink how identity security can truly enable business, not just protect it. For more insights on effective identity governance strategies, check out Omada's State of Identity Governance 2026 Report. TakeawaysOver 95 per cent of security leaders now see identity as a core strategy. Identity isn’t optional anymore.Feeling secure doesn’t equal being secure. Many organisations track efficiency, not actual risk.Non-human identities are multiplying fast. Zero Trust adoption is growing, but integration gaps remain. AI in identity governance works, but always keep a human in the loop. Chapters00:00 Introduction to Identity Governance and Security Challenges 02:55 Insights from the State of Identity Governance Report 05:53 The Gap in Security Confidence and Measurement 08:53 Operational Metrics vs. Risk Indicators 11:50 Zero Trust Adoption and Implementation Challenges 14:54 The Role of AI in Identity Governance 17:52 Non-Human Identities and Governance Challenges 21:07 Key Takeaways for Security Leaders

    29 min
  4. How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?

    APR 21

    How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?

    Podcast series: The Security Strategist Guest: Amit Megiddo, CEO and Co-Founder, Native Host: Richard Stiennon, Chief Analyst Researcher at IT-Harvest In the recent episode of The Security Strategist Podcast, Amit Megiddo, CEO and Co-Founder, Native, joins host Richard Stiennon, Chief Research Analyst at IT-Harvest, to discuss a growing challenge in enterprise cloud security. Enterprises are investing heavily in cloud providers’ built-in controls, yet risk persists when those controls are not consistently enforced across complex environments. According to Megiddo, the problem isn't a lack of tools, but a failure to make them work effectively. Drawing on his experience launching Amazon GuardDuty at Amazon Web Services, the Native CEO explains that enterprises have hit a tipping point. The challenge is no longer about visibility. It is about executing at scale across complex multi-cloud environments. What is the Execution Gap in Cloud Security?Cloud providers such as Amazon Web Services, Microsoft Azure, Google Cloud, and Oracle Cloud offer a wide range of built-in security features. Yet, as Megiddo points out, most enterprises are only using a small part of what is available. “The easy part is turning controls on,” he says. “The hard part is making sure they consistently deliver security results.” This is where many enterprises struggle. Security teams create policies, but platform teams carry them out. In the process, vital context is lost. The result is a disjointed approach where risks are identified but not effectively managed. Megiddo calls this the “execution gap.” It is a fundamental issue in how enterprises handle cloud security. Even with sophisticated CSPM and CNAP tools, organisations remain mostly reactive. They are relying on detection and fixing problems instead of preventing them. How to Move From Detection to Policy-Driven EnforcementThe podcast spotlights a key shift in enterprise security strategy – moving from detection controls to proactive, policy-driven enforcement. Conventional methods focus on spotting issues—like unencrypted or publicly exposed data—and then starting remediation processes. However, as cloud environments grow, this method becomes untenable. Megiddo suggests embedding security directly into the architecture: Preventing non-compliant resources from being createdDesignating approved regions for workloadsEnforcing network isolation rules for sensitive environments, such as AI training workloads This “secure-by-design” approach turns security from a reactive task into a core operational control. However, implementing this is not easy. Enterprises must translate high-level policy goals into thousands of low-level settings across various cloud providers, each with its own APIs, services, and policy frameworks. “It’s not just about writing the policy,” Megiddo emphasises. “It’s about safely rolling it out, simulating impact, managing exceptions, and ensuring it stays enforced over time.” It creates new operational needs such as simulation tools, drift detection, real-time developer feedback, and automated exception handling. Essentially, cloud security becomes a continuous process rather than a one-time setup. Why is the Unified Control System Critical?The main takeaway for enterprise leaders is that cloud security is no longer just about managing risks; it is becoming an edge in the market. As major providers continue to invest heavily in native security features, the real differentiator will be the ability to coordinate and enforce those tools effectively. Megiddo’s vision is straightforward: a unified control system that lets enterprises define security intent once and apply it consistently across cloud and hybrid environments. In an industry shaped by AI, multi-cloud complexity, and rapid digital changes, this ability could determine how quickly—and securely—enterprises can progress. For CISOs and IT leaders, the message is clear: the future of cloud security lies not in observing more, but in doing more—with precision, consistency, and scale. Key TakeawaysShift from detection to proactive, policy-driven cloud security to reduce risk.Multi-cloud across Amazon Web Services, Microsoft Azure, and Google Cloud requires unified enforcement.CISOs need tools that turn security policy into automated controls.Secure-by-design cloud architecture protects AI and enterprise workloads.Strong cloud security execution drives scalability and resilience. Chapters00:00 The Cloud Security Landscape03:11 Challenges in Implementing Cloud Security08:00 Transitioning to Proactive Security12:26 The Evolving Role of Security Leaders16:42 Future Trends in Cloud Security For more information, please visit em360tech.com and native.security. Follow: @EM360Tech on YouTube, LinkedIn and X Native LinkedIn: https://www.linkedin.com/company/native-security/ #CloudSecurity #PolicyDrivenSecurity #CloudEnforcement #MultiCloudSecurity #SecurityByDesign #ExecutionGap #CISOs #TheSecurityStrategist #NativeSecurity #CSPM #CNAP #EnterpriseSecurity #NativeSecurity #AmitMegiddo

    22 min
  5. FedRAMP 20x: The Future of Compliance, Trends, and Best Practices

    APR 16

    FedRAMP 20x: The Future of Compliance, Trends, and Best Practices

    If you've ever tried to navigate the FedRAMP authorization process, you already know it's slow, expensive, and tedious when it comes to the documentation. For cloud service providers (CSPs) hoping to sell to the federal government, it has long been one of the biggest barriers to entry. That’s now changing. FedRAMP 20x is the most significant modernization of the Federal Risk and Authorization Management Program in its history and is reshaping how CSPs can achieve compliance. In this episode of the Security Strategist podcast, Kenny Scott, founder and CEO of Paramify, joins host Richard Stiennon, Chief Research Analyst at IT-Harvest, to unpack what’s changing, why it matters, and how it could redefine the path to federal authorization. FedRAMP 20x is set to help CSPs approach compliance by cutting costs, reducing timelines, and shifting the focus from paperwork to verifiable security evidence. What Is FedRAMP And Why Did It Need to Change? FedRAMP, the Federal Risk and Authorization Management Program, provides a standardised framework for the security assessment, authorisation, and continuous monitoring of cloud products and services used by U.S. federal agencies. In theory, it's a smart idea: one unified security standard that any agency can rely on. In practice, the traditional process became a bottleneck. Scott puts it bluntly: "FedRAMP's original design had a fatal flaw; it prioritized documentation over deterministic security evidence." The result? CSPs were spending months, sometimes years, and hundreds of thousands of dollars compiling documentation packages that didn't necessarily make their systems more secure. Agencies weren't getting the real-time, verifiable security assurance they needed. And smaller, innovative CSPs were priced out entirely. Problems with Traditional FedRAMPLengthy approval times as authorisation could take 12–18+ months, delaying market entry for cloud providers.High compliance costs with smaller CSPs often couldn't afford the financial burden of full FedRAMP authorization.Documentation overload with extensive paperwork, distracted from actual security practices and outcomes. FedRAMP 20xFedRAMP 20x goes beyond a version update; it signals a fundamental shift in how compliance is defined in modern cloud environments. Announced by the General Services Administration, the initiative is designed to make authorizations faster, cheaper, and more meaningful. Changes in FedRAMP 20x:Streamlined authorization processes, which means faster pathways to approval, reducing time-to-market for CSPs.Automation-first compliance that replaces manual documentation with automated, machine-readable security evidence.Risk-based flexibility that tailors requirements to the actual risk profile of a service, rather than a one-size-fits-all model. As Scott explains, the shift is from compliance as a paper exercise to compliance as a continuous, evidence-based practice. Agencies want real, deterministic security evidence, and FedRAMP 20x is built to deliver exactly that. What FedRAMP 20x Means for Cloud Service ProvidersFor CSPs, the modernization is a double-edged opportunity; those who adapt quickly will gain a significant competitive advantage; those who don't may find themselves falling behind as the compliance landscape evolves. On the opportunity side, the most immediate impact is a faster time to market. With streamlined approval processes, CSPs can move through authorisation more efficiently and reach federal customers sooner than before. This acceleration is paired with lower compliance costs, as reduced documentation and administrative burden free up resources that can instead be directed toward innovation and strengthening security capabilities. Perhaps most significantly, the changes help level the playing field, enabling smaller CSPs with strong security practices to compete more effectively against larger, established incumbents. At the same time, these benefits come with new demands. CSPs will need to stay closely aligned with an evolving framework, continuously tracking updates and guidance as FedRAMP 20x matures. In addition, fully realising the advantages of the new model will require investment in automation. Organizations that adopt compliance and security automation tooling will be better positioned to keep pace, reduce manual effort, and maintain consistent alignment with the updated requirements. If you would like to find out about this visit paramify.com and connect with Scott on LinkedIn. Chapters00:00 — Introduction to FedRAMP 20x13:42 — The Need for Change in FedRAMP20:20 — FedRAMP 20x: A New Approach28:27 — Success Stories with FedRAMP 20x TakeawaysFedRAMP 20x modernizes federal cloud security compliance by replacing documentation-heavy processes with automation and evidence-based security.The traditional FedRAMP process was slow, costly, and document-intensive — a barrier that limited innovation and market access for CSPs.CSPs that invest in automation and stay ahead of evolving requirements will gain a clear competitive edge in the federal marketplace.Kenny Scott and Paramify are at the forefront of helping organizations navigate this shift intelligently and efficiently.

    31 min
  6. Why Patch Management Remains the Most Annoying Problem in IT Security

    APR 10

    Why Patch Management Remains the Most Annoying Problem in IT Security

    Keeping your organisation’s systems secure can feel like an endless battle. Patch management and vulnerability mitigation are often seen as tedious tasks, but they form the backbone of effective cybersecurity. In this episode of the Security Strategist podcast, host Richard Stiennon and Mike Walters, co-founder of Action1, break down why patching remains challenging and share practical strategies to make the process simpler, smarter, and more effective. Patch Management Remains a ChallengePatch management has been a concern since the earliest days of computing, dating back to mainframes and early PCs. Despite technological advances, it remains a "busy work" task that many IT teams find overwhelming.  So what makes patching so hard today? One of the main reasons patching is still so difficult is the constant evolution of IT ecosystems. As Walters explains, "The biggest challenge is the ever-evolving nature of software with different applications, sources, and methodologies."  Operating systems, third-party apps, and custom configurations all require tailored approaches for updates and patches, making uniform processes impossible. Large organisations often have hundreds or thousands of devices, each running different software versions requiring specific patches and testing before deployment. The COVID-19 pandemic has dramatically shifted traditional patching strategies. Pre-pandemic, enterprises could rely on corporate networks and distribution points for patches. Now, a dispersed workforce, VPNs, and hybrid cloud architectures have made remote patching more complex. As Walters notes, "Remote endpoints become a big challenge. You need network-agnostic solutions that work regardless of whether a device is connected to the corporate network or a coffee shop." Connection issues, bandwidth limitations, and endpoint diversity all impact security teams' ability to apply patches swiftly. Innovative Solutions for Streamlining Patch ManagementTo address these challenges, organisations are moving towards more intelligent and automated patching strategies. As Walters puts it, the starting point is simple: automation. By removing repetitive manual tasks, teams reduce the risk of human error and create space to focus on higher-value security work. Done properly, automation allows for scheduled updates, controlled testing, and the ability to roll back quickly if something goes wrong. At the same time, how patches are delivered matters just as much as when. Large updates can put significant strain on networks if pushed out all at once, which is why approaches like peer-to-peer distribution are gaining traction. By allowing endpoints to share updates locally, organisations can reduce bandwidth pressure and avoid bottlenecks. Flexible “catch-up” windows also ensure that devices which miss an update cycle can still be brought into compliance without disrupting operations. Modern environments are also driving a shift towards cloud-native, agent-based architectures. Instead of relying on a fixed network or VPN, these agents connect directly to cloud services, allowing patches to be deployed consistently across remote, mobile, and distributed devices. This approach reflects the reality of how people work today, where endpoints are no longer confined to a single network. Finally, effective patching is as much about control as it is about speed. Progressive rollouts—testing updates on a small group before expanding—help organisations avoid widespread disruption. By identifying issues early and isolating them quickly, teams can maintain stability while still ensuring that critical vulnerabilities are addressed without delay. Action1’s Unique ApproachAction1’s innovative model offers 200 free endpoints forever with no feature limitations, facilitating all sizes and types of organisations to implement effective patching solutions. By removing entry barriers, Action1 enables organisations to test, scale, and secure their patches more affordably.  As Walters shares, "Offering free endpoints helps small IT teams get started, and as they grow, they stay with the platform."This approach promotes widespread adoption, accelerates security improvements, and creates a community of organisations committed to better vulnerability management. As cybersecurity environments become more complex and distributed, patching will remain a critical task—if not the critical task—of your security strategy. If you would like to find out more, visit: https://www.action1.com/ TakeawaysThe history and persistent nature of patch management issuesHow remote and hybrid work models impact patching strategiesThe importance of network-agnostic, agent-based patching solutionsHow to leverage automation and orchestration to reduce IT workloadPeer-to-peer distribution to optimise bandwidth during large-scale updatesDeveloping a phased, ring-based approach to patch deploymentReal-world challenges of patching high-availability systems and remote endpointsAction1’s unique offer of 200 free endpoints without feature limitationsThe significance of thinking like an attacker to anticipate vulnerabilities Chapters:00:40 - Mike Walters’ background and company journey 02:00 - Why patching remains a complex, evolving task 04:35 - The need for specialisation and solving patching for good 05:11 - Why patch management feels like busy work and its inherent difficulties 06:44 - Lessons from early vulnerability management experiences 09:38 - Handling patching challenges for remote and mobile users 10:15 - The implementation of agent deployment and catch-up windows 12:22 - Innovative bandwidth management using peer-to-peer distribution 14:55 - The value of automation and trust in large-scale environments 16:50 - Utilising update rings for safer, staged patch deployment 17:45 - Prioritising patching for zero-day vulnerabilities and rapid response 18:43 - Action1’s free tier for small IT environments supporting smaller organisations 21:35 - Practical insights for IT leaders: automation, application patching, and attacker mindset 24:53 - Closing thoughts: automation and proactive attack thinking

    23 min
  7. The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools

    APR 9

    The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools

    The way organizations access and use enterprise data has fundamentally changed. Knowledge workers now operate in browser-based environments, relying heavily on SaaS applications and increasingly experimenting with AI-powered tools to boost productivity. In the Security Strategist podcast, Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA), spoke with Michael Leland, Field Chief Technology Officer at Island, about the growing cybersecurity challenges associated with browsers, SaaS platforms and AI tools and how organizations can adapt their enterprise security strategies. While this shift has accelerated innovation, it has also introduced new cybersecurity risks. Sensitive information now flows through consumer browsers, AI assistants, browser extensions and cloud platforms; often outside the visibility of traditional security controls. As a result, enterprise security teams must rethink how they approach data protection, governance and access control in a browser-driven workplace. Why Browser-Based Workflows Are Creating New Enterprise Security RisksEnterprise security models were historically built around network perimeters, firewalls and on-premise infrastructure. Today, however, most work happens inside web browsers, where employees interact with SaaS platforms, cloud storage systems and AI tools. According to Leland, this shift has significantly expanded the attack surface. “The majority of knowledge workers are accessing business applications primarily via the web, whether it’s a SaaS application or a web front end to a legacy application. But they’ve been doing so in a consumer browser,” he explains.  Consumer-grade browsers were designed for convenience and personal use, not enterprise security. As a result, they often introduce vulnerabilities that can expose sensitive corporate data. Traditional enterprise controls such as VPNs, secure web gateways and zero trust architectures attempt to mitigate these risks. However, these tools frequently operate outside the browser itself, leaving gaps in visibility and control. The challenge becomes even more complex when browser extensions are added to the mix. Many extensions request extensive permissions and can access sensitive information inside SaaS applications. “In the last 18 months, almost 40 per cent of browser extensions published have something to do with AI. Some offer real productivity gains, but the provenance of many of these tools is questionable,” Leland notes.  This growing ecosystem of extensions and cloud tools has created a new security frontier where enterprise data protection must operate directly at the user interaction layer. How AI Sprawl Is Complicating Data GovernanceAlongside browser-driven workflows, organizations are also dealing with a rapid surge in AI adoption. From tools like ChatGPT and Copilot to embedded AI features inside SaaS platforms, AI is becoming a standard part of the modern workplace. However, this rapid adoption is also creating a phenomenon known as AI sprawl. Knowledge workers increasingly select their own AI tools based on preference or convenience, leading to a patchwork of unsanctioned platforms operating across the enterprise. “Each knowledge worker may have their own AI tool of choice. So the whole BYO AI—bring your own AI—trend is becoming very real,” says Leland.  While these tools can deliver productivity gains, they also create serious data governance risks. Many AI platforms process prompts and inputs in external cloud environments, meaning that sensitive information could be inadvertently shared or stored outside company-controlled systems. Even seemingly harmless productivity tools may capture user data. Why Visibility and Data Boundaries Are Critical for Protecting Enterprise DataWith browser usage and AI adoption accelerating, many cybersecurity teams are shifting their focus toward controlling data at the point of interaction rather than relying solely on network-based controls. One emerging concept is the use of data boundaries—defined environments where organizations can control how sensitive information moves between applications. A data boundary acts as a secure enclave that determines which applications are trusted and what data can flow between them. “If you trust application A and application B, you might allow data to move freely between them,” Leland explains. “But you still enforce guardrails that prevent data from leaving that boundary.” This approach allows organizations to balance security and productivity, an increasingly important consideration as knowledge workers rely on multiple SaaS platforms and AI assistants to complete daily tasks. Another critical component of modern enterprise security is visibility. Security leaders cannot govern AI tools or protect sensitive data if they do not understand how employees are using them. As enterprises continue to embrace cloud applications and AI tools, protecting sensitive data will require a shift in cybersecurity thinking. If you would like to find out more, visit island.io Takeaways:Establish a secure data boundary to control data flow between trusted applications.Utilize AI to automate data protection and enhance real-time monitoring.Foster a culture of security awareness among employees to strengthen your organization’s security posture. Chapters00:00 Introduction to Cybersecurity and AI 03:07 The Evolution of Browsers for Knowledge Workers 06:03 Challenges in Enterprise Security 09:04 Balancing Data Protection and Productivity 11:48 Navigating AI Risks in the Workplace 14:59 Understanding AI Sprawl and Governance 17:50 The Role of Presentation Layer in Data Protection 21:10 Real-World Applications in Financial Services 23:57 Final Thoughts on Securing Knowledge Workers

    24 min
  8. Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy

    APR 7

    Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy

    Podcast Series: The Security Strategist Host: Richard Stiennon, Chief Research Analyst at IT-Harvest Guest: Dr Chris Pierson, Founder and CEO of BlackCloak There has always been a boundary in the enterprise technology corporate network. However, that boundary has been fading for a while, and now it may have completely vanished. In the recent conversation on The Security Strategist podcast, cybersecurity expert Dr Chris Pierson, also the Founder and CEO of BlackCloak, joined host Richard Stiennon, Chief Research Analyst at IT-Harvest. The BlackCloak CEO presented a reality that many CISOs are only now facing. The most critical vulnerabilities in an enterprise may lie far beyond corporate control, embedded in the personal lives of its leadership. Why Attackers are After Soft Targets?Pierson explains that attackers are no longer focused on directly breaching secure enterprise systems. Instead, they are targeting individuals with the highest levels of access in a more effective way. Executives and board members have always been appealing targets, but the strategies have changed. Personal email accounts, home Wi-Fi networks, and even family members are now part of the attack surface. These environments generally lack the layered defences of corporate infrastructure, making them easier to exploit. The stakes are high. A compromised home network or personal device can quickly provide access to enterprise systems. Even simple attacks, such as text messages pretending to be from a CEO, can work when aimed at those outside formal security measures. What makes this trend especially dangerous is its subtlety. These attacks rarely look like the major breaches that make the news. Instead, they happen quietly, taking advantage of everyday behaviours in settings that were never meant to withstand sophisticated threats. Also Watch: How Do Attackers Exploit Executives’ Personal Lives to Breach Companies? Why Privacy Measures Aren’t EnoughIn response, many enterprises have implemented privacy-focused solutions to reduce the digital footprint of executives by removing personal data from broker sites. This is a logical first step, but as Pierson points out, it only offers partial protection. Today, personal data isn’t limited to a single source. It is constantly collected, sold, leaked, and reshuffled across many channels. Even when successfully removed from one platform, it often reappears elsewhere—sometimes accidentally, through everyday activities like online shopping or registration for accounts. More importantly, cutting down visibility does little to tackle active threats. An attacker doesn’t need complete information to succeed; they just need enough. This creates a misleading sense of progress for security leaders. Privacy efforts may reduce the attack surface, but they don’t eliminate the underlying risks. Without additional layers of protection, executives remain vulnerable in environments where attackers increasingly target them. Also Read: Deepfakes, Data Brokers, and Home Networks: The Executive Threat Landscape CISOs Can’t Ignore in 2026 What is the New Layer of Enterprise Security?What is developing is not merely an extension of existing cybersecurity practices but a new discipline. It’s an approach that treats executives as a critical, high-risk perimeter on their own. The CEO of BlackCloak describes this as a more comprehensive protection model that covers all aspects of an executive’s digital life. It goes beyond corporate endpoints to include personal devices, home networks, and the wider ecosystem where executives and their families live. Enterprise security can no longer focus solely on corporate assets. The home network, personal devices, and even the family environment are now part of the overall risk landscape. At the same time, the line between cyber and physical threats continues to blur, increasing the stakes further. For IT leaders in enterprise technology, the question is no longer whether these risks exist but how they are being managed. As attackers continue to adapt, the path into the enterprise is not through the front door but through the people who have the keys and everything that surrounds them. Key TakeawaysExecutives are the new cybersecurity perimeter and top attack targets.Personal devices and home networks increase enterprise cyber risk.Data broker removal alone cannot protect executive privacy.Digital executive protection requires multi-layered security solutions.Cybersecurity strategies must address physical and cyber threat convergence. Chapters00:00 Introduction to Cybersecurity Challenges for Executives01:02 Understanding Executive Risk and Attack Surfaces06:31 The Role of Data Brokers in Cybersecurity10:13 Home Networks as New Battlegrounds13:00 Comprehensive Digital Executive Protection Strategies18:40 The Importance of Outsourcing Executive Protection For more information, please visit em360tech.com and blackcloak.io. EM360Tech YouTube: @enterprisemanagement360 EM360Tech LinkedIn: @EM360Tech EM360Tech X: @EM360Tech Follow: @EM360Tech on YouTube, LinkedIn and X BlackCloak YT: @blackcloakcyber LinkedIn: @BLACKCLOAK BlackCloak X: @BlackCloakCyber #ExecutiveCybersecurity #DigitalExecutiveProtection #CyberRisk #BlackCloak #CISO #HomeNetworkSecurity #Cybersecurity #ExecutiveRisk #CorporateBreaches #CyberStrategy #CEORisk #HomeNetwork #PersonalLives #AttackSurface #DataBrokers #CyberThreats #PhysicalThreats #TheSecurityStrategist #DrChrisPierson #RichardStiennon #EM360Tech #SecurityStrategy #CorporateSecurity #AccountTakeover #SoftTargets #HomeWiFiBreach

    22 min

About

With cyber attacks more common than ever before and each attack becoming increasingly sophisticated, security teams need to be one step ahead of cybercrime at all times. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We dissect the latest trends and threats in cybersecurity, providing insights and expect-backed solutions to protect your organisation effectively. Tune into this cybersecurity podcast as we dissect major threats, explore emerging trends, and share proven prevention strategies to fortify your defences.

You Might Also Like