Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Cyera: Enterprise AI Security and Data Protection Strategies

Cyera
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • AI Guardian extends Cyera's data intelligence platform to provide comprehensive AI security posture management and runtime protection for enterprise environments.
  • Data and identity have been historically unsolved 'orphan security programs' that AI adoption now forces organizations to address at scale.
  • Effective AI security requires understanding your data first, then mapping how identities—human, machine, and agentic—access and use that data.
  • Organizations must gain visibility into all AI across their environment, including shadow AI and agentic orchestration, to implement proper security controls.

AI Guardian and the Data-First Security Approach

Cyera's newly launched AI Guardian represents the company's evolution from data intelligence to comprehensive AI security. The product addresses a fundamental challenge that Ash Hunt identifies from his experience as a Global CISO: organizations have historically struggled to solve for data and identity security, which he describes as 'orphan security programs.' With AI now consuming both data and identity at unprecedented scale, AI Guardian provides posture management to help organizations understand what AI exists across their environment—including shadow AI engaged by end users—and how data flows through models and agents. The platform monitors data usage and identity access in real time, addressing risks from data leakage to malicious prompts.

Combining Posture Management with Runtime Protection

Hunt emphasizes that effective AI security requires both posture management and runtime protection working in tandem. Using the analogy of tuning a piano blind, he explains that organizations often have only approximate knowledge of where their data resides, its classification, encryption status, and access controls. Cyera's approach uses AI to solve these discovery challenges, revealing what Hunt calls 'the unknown unknown'—exposures that organizations didn't realize existed. This foundational posture understanding then enables meaningful runtime protection, tracking how identities access data, how models manipulate it, and how outputs are used across the organization. The company applies advanced LLMs to achieve both speed and precision across data estates without sacrificing fidelity.

Chapters

0:00 - Introduction and AI Guardian Launch
2:14 - Identity and Data as Security Foundations
3:25 - AI-SPM and Runtime Protection
5:41 - Fighting Fire with Fire
7:16 - Security Teams and Agentic AI Readiness
9:12 - Guidance for Organizations

Key Quotes

2:52 "The two things that we've never really actually solved for were data and identity, data and access. I think of them kind of as the orphan security programs."
4:43 "When you actually start using AI to solve for some of these challenges, you get a whole new world opening up about actually how many problems you probably have in the organization."
6:58 "We're able to rapidly get across their data estates, but without sacrificing precision. That's a really important point—we're not losing any of the fidelity, but we're able to operate at pace and scale."

Categories:
  • » Webinar Library » Cyera
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • AI & Machine Learning
  • Data Protection
  • Identity & Access
  • Security Operations
  • Interview
  • AI security posture management
  • data-centric security
  • identity and access management
  • agentic AI security
  • runtime protection
  • shadow AI discovery
  • enterprise AI governance
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cyera: Enterprise AI Security and Data Protection Strategies

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version