• AI Security Architecture: How Data-Centric Models Transform Enterprise Security with Mohit Tiwari
    Aug 13 2025

    AI-Powered Cloud Security: From Research Lab to Enterprise Reality

    In this episode of Cyber Sentries, John Richards talks with Mohit Tiwari, co-founder and CEO of Symmetry Systems and associate professor at UT Austin, about transforming academic research into practical enterprise security solutions. Mohit shares his journey from academic research to founding a company that's revolutionizing how organizations approach data security in the age of AI.

    Bridging Academia and Industry

    Mohit discusses how his research team at UT Austin developed innovative approaches to data security and privacy, working with organizations like NSA, Lockheed, and General Dynamics. Their work led to founding Symmetry Systems in 2020, focusing on operationalizing data flow security across enterprise environments.

    The Evolution of Data Security

    The conversation explores how traditional asset-centric security approaches are giving way to data-centric models. Mohit explains how Symmetry Systems helps organizations protect data flows across multiple applications and platforms, making security more efficient and effective than traditional bespoke solutions.

    Questions We Answer in This Episode:

    • How can organizations move from bespoke security solutions to systematic approaches?
    • What role does AI governance play in modern enterprise security?
    • How can companies effectively manage data security across different AI implementation scenarios?

    Key Takeaways:

    • Data-centric security approaches are becoming crucial as AI adoption increases
    • Organizations need interoperable policy languages for effective AI governance
    • Purpose-built, smaller AI models can be more effective than large, general-purpose ones
    • Security solutions must evolve to handle the massive scale of modern enterprise data

    Looking Ahead: The Future of AI Security

    The episode concludes with insights into emerging challenges in AI security, including the need for better business purpose frameworks and advanced detection capabilities for sophisticated attacks like ransomware.

    Resources

    • Symmetry Systems website
    • Connect with Symmetry Systems on LinkedIn
    • Learn more about Paladin Cloud
    • Learn more about Cyberproof
    • Got a question? Ask us here!
    • (00:04) - Welcome to Cyber Sentries
    • (01:02) - Meet Mohit
    • (03:06) - Application Examples
    • (08:15) - Key Metrics
    • (10:52) - Effects of AI
    • (14:16) - Environments and Interfaces
    • (16:39) - Tying It Together
    • (18:19) - AI in the Process
    • (22:51) - Model Decisions
    • (25:41) - Research to Project
    • (29:13) - Problems
    • (31:25) - Wrap Up
    Show More Show Less
    34 mins
  • Biometric Identity Evolution: AI-Powered Authentication Beyond Passwords with Michael Engle
    Jul 9 2025

    AI-Powered Identity Verification: Beyond Passwords and into the Future

    In this episode of Cyber Sentries, host John Richards sits down with Michael Engle, co-founder and CSO of 1Kosmos, to explore how AI is revolutionizing identity verification and authentication in cybersecurity. Mike brings decades of experience from Wall Street to modern startups, offering unique insights into the evolution of digital identity protection.

    The Identity Crisis in Modern Security

    Identity verification has become the new perimeter in cybersecurity, accounting for 80% of security problems. Mike explains how traditional methods like passwords and basic MFA are failing to meet current security challenges, especially as AI agents become more prevalent in our digital lives. 1Kosmos is tackling this through advanced biometric verification, behavioral analysis, and AI-powered authentication systems.

    Questions We Answer in This Episode:

    • How is AI changing the landscape of identity verification?
    • What makes biometric authentication more secure than traditional methods?
    • How can organizations transition from password-based to identity-based security?
    • What role do digital wallets play in the future of identity verification?

    Key Takeaways:

    • Identity verification has replaced perimeter security as the primary security concern
    • AI enables more sophisticated identity verification through behavioral analysis and pattern recognition
    • Biometric authentication offers a more secure alternative to traditional passwords and MFA
    • Digital wallets are emerging as the future of portable, verified identity

    The Future of Digital Identity

    Looking ahead, Mike discusses 1Kosmos's work on digital wallets and universal identity verification systems. These innovations aim to create reusable, trusted identities that can work across multiple platforms while maintaining security through biometric verification and AI-powered fraud detection.

    Links & Notes

    • Learn more about Cyberproof
    • Learn more about 1Kosmos
    • Got a question? Ask us here!
    • (00:04) - Welcome to Cyber Sentries
    • (01:03) - Meet Michael Engle
    • (03:03) - Identity Threat
    • (04:09) - With AI
    • (05:50) - What 1Kosmos Does
    • (12:48) - Adapting with AI
    • (15:42) - Protecting Credentials
    • (26:36) - Passkey Challenges
    • (28:12) - AI-Driven Development
    • (32:18) - What’s Next for 1Kosmos
    • (34:40) - Learning More
    • (35:42) - Wrap Up
    Show More Show Less
    37 mins
  • AI-Driven SOC Evolution: Transforming Security Maturity with Doron Davidson
    Jun 11 2025

    AI's Evolution in Security Operations: From Support to Collaboration

    Doron Davidson, Managing Director of Security Operations at Cyberproof, joins John Richards to explore how AI is transforming security operations and pushing SOC maturity models into new territory. With extensive experience from telecom security to founding SecBI, Doron brings unique insights into the evolution of managed security services.

    Rethinking Security Maturity Models

    Doron outlines Cyberproof's innovative approach to service maturity, moving beyond traditional frameworks to incorporate AI capabilities. He describes how they've developed a 1-5 scale measuring people, processes, and technology—with quantifiable 20% year-over-year improvement targets.

    Questions We Answer:

    • How are security operations teams evolving with AI integration?
    • What does SOC maturity look like in an AI-enabled world?
    • How can organizations measure and verify AI's security impact?
    • What role will agentic AI play in future security operations?

    Key Takeaways:

    • AI is enabling better collaboration between security services
    • Automated investigation has significantly reduced L1 analyst workload
    • Well-defined processes and KPIs are crucial for successful AI implementation
    • New maturity levels (6-8) are emerging focused on agentic AI capabilities

    The Future of Security Operations

    The conversation explores how Cyberproof is moving beyond traditional AI integration toward agentic models where multiple AI agents collaborate across security functions. This shift enables enhanced threat intelligence sharing, automated investigations, and improved visualization of security metrics for stakeholders.

    Practical Applications and Impact

    From automating email attack investigations to improving cross-team collaboration, Doron shares concrete examples of how AI is reducing human error while expanding security capabilities. He emphasizes the importance of maintaining human oversight while leveraging AI's strengths.

    Resources

    • Learn more about Cyberproof
    • Learn more about Paladin Cloud
    • Got a question? Ask us here!
    • (00:04) - Welcome to Cyber Sentries
    • (00:33) - Today’s Guest: Doron Davidson
    • (01:32) - Doron’s Background
    • (03:27) - Latest Challenges
    • (05:57) - Honesty Mindset
    • (09:16) - Current AI Strategy
    • (12:23) - Focus Areas
    • (19:43) - Shifting Models
    • (25:04) - What He’s Excited About
    • (26:40) - Maturity Model
    • (28:49) - Wrap Up
    Show More Show Less
    32 mins
  • Beyond the AI Hype: Real Security Solutions with Sherman Williams
    May 14 2025

    AI, Investment, and Security: A Venture Capitalist's Perspective

    Sherman Williams, managing partner at AI and Ventures, joins John Richards to explore the intersection of artificial intelligence, cloud security, and venture capital. As a Naval Academy graduate turned investor, Sherman brings unique insights from both military and commercial technology perspectives. His firm focuses on dual-use technologies - innovations that serve both government and commercial applications - making him particularly well-positioned to discuss AI's evolving role in security.

    The conversation delves deep into how organizations should approach AI implementation, viewing it as a powerful tool rather than a solution in itself. Sherman shares valuable perspectives on the distinction between AI DevTools and application layer AI, and how entrepreneurs should focus on solving specific problems rather than getting caught up in AI hype. The discussion explores critical considerations around open-source versus closed-source models, particularly in sensitive sectors like government, healthcare, and insurance.

    Questions we answer in this episode:

    • How should organizations approach AI implementation in their security strategy?
    • What's the difference between AI DevTools and application layer AI?
    • How are security concerns shaping the development of AI solutions?

    Key Takeaways:

    • AI should be viewed as a tool for efficiency and productivity, not a standalone solution
    • The best AI implementations focus on solving specific, acute problems
    • Security considerations are driving innovation in both AI development and deployment

    This episode offers essential insights for anyone interested in the future of AI in security and technology development. Sherman's unique perspective, combining military experience with venture capital expertise, provides valuable context for understanding how AI is reshaping the security landscape while highlighting both opportunities and challenges ahead.

    Links & Notes

    • AIN Ventures
    • Follow Sherman on LinkedIn
    • The 2017 Google Article Mentioned
    • Security Company Mentioned
    • Learn more about Paladin Cloud
    • Got a question? Ask us here!
    • (00:04) - Welcome to Cyber Sentries
    • (00:34) - Sherman Williams
    • (01:02) - Sherman’s Background
    • (05:26) - AI from the Investment Space
    • (08:23) - Dev Tools or Application Layer AI
    • (12:24) - Security
    • (22:46) - Promising Work in Security
    • (33:59) - Wrap Up
    Show More Show Less
    37 mins
  • AI's Data Fabric Revolution: Transforming Exposure Management with Daniel Deeney
    Apr 9 2025

    Transforming Cloud Security Through AI and Data Fabric

    Daniel Deeney, CEO and co-founder of Paladin Cloud, joins John Richards to explore how artificial intelligence is revolutionizing cloud security. With extensive experience as an enterprise software CEO and venture capitalist, Deeney brings unique insights from his successful track record of building and scaling cybersecurity companies. After his previous company's acquisition by VMware in 2019, he launched Paladin Cloud to address the growing challenges of managing security across multiple cloud environments.

    The episode delves deep into the concept of data fabric and its crucial role in modern cybersecurity. Richards and Deeney discuss how organizations struggle with tool proliferation and data overload in cloud security. They explore how Paladin Cloud's innovative approach uses data fabric to unify risk assessment across various security tools while leveraging generative AI for enhanced threat intelligence. The conversation highlights practical solutions for teams dealing with overwhelming security alerts and the challenge of prioritizing threats effectively.

    Questions we answer in this episode:

    • How can organizations handle the overwhelming amount of security data from multiple tools?
    • What role does generative AI play in modern cloud security?
    • How can teams better prioritize security risks across different environments?

    Key Takeaways:

    • Data fabric technology enables unified risk assessment across multiple security tools
    • AI-powered risk scoring helps teams prioritize threats more effectively
    • Security teams need both technological solutions and services support to manage modern threats

    This episode offers invaluable insights for security professionals, DevOps teams, and technology leaders grappling with cloud security challenges. Whether you're dealing with alert fatigue, struggling to prioritize security risks, or looking to understand how AI can enhance your security operations, this discussion provides practical guidance and strategic perspectives on navigating the complex landscape of modern cloud security.

    Links & Notes

    • Learn more about Paladin Cloud
    • Got a question? Ask us here!
    • (00:00) - Welcome to Cyber Sentries
    • (01:05) - Meet Daniel Deeney
    • (01:25) - Starting Paladin Cloud
    • (02:53) - The Approach
    • (04:54) - Data Fabric Layer
    • (09:39) - Addressing Pain Points
    • (15:54) - Bringing Data Together and Normalizing
    • (18:52) - Users
    • (20:37) - Other Models
    • (26:02) - Prioritization
    • (29:19) - Customer Service
    • (31:16) - Wrap Up
    Show More Show Less
    34 mins
  • On-Prem AI Uprising: Navigating the Future of Cloud Security
    Feb 12 2025

    Diving into the Rise of On-Prem AI and Cloud Security

    In this episode of Cyber Sentries, host John Richards is joined by Doron Caspin, a Senior Manager of Product Management at Red Hat, and Christopher Nuland, a Technical Marketing Manager at Red Hat. They explore the growing trend of on-premise open source models for running AI and the unique benefits and challenges that come with it. The conversation also touches on how DeepSeek has challenged the big players and validated the value of smaller agentic models.

    John, Doron, and Christopher dive into the shifting landscape of AI and cloud security. They discuss the trends Red Hat is seeing in the industry, such as the move towards smaller, domain-specific language models and the importance of securing AI workloads in hybrid cloud environments. The guests share insights on the key considerations organizations face when deciding to run AI models on-premises, including compliance requirements and the need to treat AI models with the same level of security as databases.

    Questions we answer in this episode:

    • What are the benefits and challenges of running AI on-premises?
    • How can organizations secure their AI workloads in hybrid cloud environments?
    • What impact has DeepSeek had on the AI industry?

    Key Takeaways:

    • On-prem AI offers unique advantages for industries with strict compliance requirements
    • Treating AI models like databases is crucial for ensuring robust security
    • The future of AI is likely to be open source, with smaller, domain-specific models gaining traction

    This episode is a must-listen for anyone interested in the intersection of AI and cloud security. John, Doron, and Christopher provide valuable insights and practical advice for organizations navigating this rapidly evolving landscape. Whether you're a security professional, data engineer, or business leader, you'll come away with a deeper understanding of the trends shaping the future of AI and the steps you can take to secure your AI workloads.

    Links & Notes

    • Try Red Hat Advanced Cluster Security Cloud Service
    • Red Hat Advanced Cluster Security for Kubernetes
    • Training an AI to Conquer Double Dragon: Reinforcement Learning Demo
    • Learn more about Paladin Cloud
    • Got a question? Ask us here!
    • (00:00) - Welcome to Cyber Sentries
    • (00:31) - Red Hat
    • (01:04) - Meet Christopher and Doron
    • (05:26) - Past to Present
    • (07:54) - Trends in the Approach
    • (12:24) - The Security Side
    • (16:15) - Key Considerations
    • (19:26) - Training and Models
    • (22:33) - Iterations and Shifts
    • (25:36) - Importance of Security Foundations
    • (28:35) - Security in Agent Space
    • (30:00) - Wrap Up
    Show More Show Less
    33 mins
  • Play, Grow, Land: The Strategic Path to Enterprise AI with Jim Wilt
    Jan 8 2025

    Navigating AI Adoption: From Exploration to Implementation

    In this illuminating episode of Cyber Sentries, John Richards sits down with Jim Wilt, distinguished chief architect at Weave and veteran security practitioner. With decades of experience in emerging technologies since the mainframe era, Jim brings unique insights into how organizations can successfully integrate AI while maintaining robust security practices.

    The conversation delves deep into a three-phase approach for AI adoption: learning, growing, and landing. Jim emphasizes the importance of experimentation before commitment, challenging the common rush to define use cases before understanding the technology's capabilities. He shares practical examples of how organizations can progress from internal testing to external deployment, while maintaining security at each stage. The discussion explores how AI isn't about replacement but enhancement - whether for individual roles or organizational processes - and why adaptability in implementation is crucial for success.

    Questions we answer in this episode:

    • How should organizations approach their initial AI adoption?
    • What's the optimal timeline for moving from experimentation to implementation?
    • When and how should security measures be integrated into AI initiatives?

    Key Takeaways:

    • "Replaceable architecture" is becoming more critical than "reusable architecture" in the AI era
    • Organizations need 9-18 months of internal testing before external AI deployment
    • Security measures should scale up gradually, from minimal during learning to comprehensive in production

    This episode provides invaluable guidance for any organization navigating AI adoption. Jim's practical, experience-based insights cut through the hype, offering a clear roadmap for sustainable AI integration while maintaining security integrity. Whether you're just starting your AI journey or looking to refine your existing approach, this discussion offers actionable strategies for success.

    Links & Notes

    • ‘What Air Canada Lost In ‘Remarkable’ Lying AI Chatbot Case’
    • CIO.com: From risk to reward: Mastering the art of adopting emerging technologies
    • Generative AI (GenAI) – A Primer
    • GenAI and the Human Experience
    • Replaceable is the New Reusable
    • Applied AI
    • Connect with Jim on LinkedIn
    • Learn more about Paladin Cloud
    • Got a question? Ask us here!
    • (00:04) - Welcome to Cyber Sentries
    • (00:55) - Meet Jim Wilt
    • (01:46) - Jim’s Background
    • (03:59) - Where to Start
    • (13:28) - Public vs. Private Models
    • (17:52) - Time in Growth Period
    • (18:48) - Use Cases
    • (21:57) - Transitioning to External Use
    • (29:06) - Scaling from Personal to Organizational
    • (31:52) - Safeguarding
    • (37:21) - Flexibility
    • (38:34) - Wrap Up
    Show More Show Less
    42 mins
  • AI's Identity Revolution: Securing Disconnected Apps and Eliminating Human Error with Bel Lepe
    Dec 11 2024

    Bel Lepe Reveals How AI Reduces Security Risks By Removing the Human Element

    In this episode of Cyber Sentries, host John Richards is joined by Bel Lepe, Co-founder and CEO of Cerby, to explore how removing the human factor through automation can dramatically decrease an organization's attack surface. John and Bel dive into the transformative potential of AI in identity and access management, especially for applications that don't support modern security protocols.

    Bel shares his insights on the current state of identity security and how Cerby is tackling the challenge of securing disconnected apps at scale. He explains how generative AI enables Cerby to build and maintain integrations for thousands of apps without relying on standards. The discussion also touches on emerging trends in identity, including the fragmentation of identity across multiple platforms and the growing threat of AI-powered impersonation attacks.

    Questions we answer in this episode:

    • How can AI reduce security risks by removing the human element?
    • What are the key challenges in securing apps that don't support modern identity protocols?
    • How will the rise of AI shape the future of identity security?

    Key Takeaways:

    • The majority of security incidents are caused by human error
    • AI allows custom integrations to be built at scale without relying on standards
    • Multi-factor authentication is crucial for protecting against emerging threats

    Whether you're a security professional looking to stay ahead of the curve or a business leader seeking to understand the impact of AI on your organization's security posture, this episode is packed with valuable insights. Tune in to learn how AI is revolutionizing identity and access management and what you can do to safeguard your organization in the face of evolving threats.

    Links & Notes

    • Learn more about Cerby
    • Learn more about Paladin Cloud
    • Got a question? Ask us here!
    • (00:00) - Welcome to Cyber Sentries
    • (01:03) - Meet Bel Lepe
    • (02:42) - Validating the Problem
    • (04:07) - The Problem
    • (06:32) - Their Approach
    • (08:24) - Scaling
    • (10:38) - Looking to the Future
    • (15:32) - The Future of Identity
    • (22:25) - Building Better Awareness
    • (23:46) - Wrap Up
    Show More Show Less
    26 mins