Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Cyera: Enterprise AI Security and Data Protection Strategies

Cyera
03/20/2026
18
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • AI Guardian extends Cyera's data intelligence platform to provide comprehensive AI security posture management and runtime protection for enterprise environments.
  • Data and identity have been historically unsolved 'orphan security programs' that AI adoption now forces organizations to address at scale.
  • Effective AI security requires understanding your data first, then mapping how identities—human, machine, and agentic—access and use that data.
  • Organizations must gain visibility into all AI across their environment, including shadow AI and agentic orchestration, to implement proper security controls.

AI Guardian and the Data-First Security Approach

Cyera's newly launched AI Guardian represents the company's evolution from data intelligence to comprehensive AI security. The product addresses a fundamental challenge that Ash Hunt identifies from his experience as a Global CISO: organizations have historically struggled to solve for data and identity security, which he describes as 'orphan security programs.' With AI now consuming both data and identity at unprecedented scale, AI Guardian provides posture management to help organizations understand what AI exists across their environment—including shadow AI engaged by end users—and how data flows through models and agents. The platform monitors data usage and identity access in real time, addressing risks from data leakage to malicious prompts.

Combining Posture Management with Runtime Protection

Hunt emphasizes that effective AI security requires both posture management and runtime protection working in tandem. Using the analogy of tuning a piano blind, he explains that organizations often have only approximate knowledge of where their data resides, its classification, encryption status, and access controls. Cyera's approach uses AI to solve these discovery challenges, revealing what Hunt calls 'the unknown unknown'—exposures that organizations didn't realize existed. This foundational posture understanding then enables meaningful runtime protection, tracking how identities access data, how models manipulate it, and how outputs are used across the organization. The company applies advanced LLMs to achieve both speed and precision across data estates without sacrificing fidelity.

Chapters

0:00 - Introduction and AI Guardian Launch
2:14 - Identity and Data as Security Foundations
3:25 - AI-SPM and Runtime Protection
5:41 - Fighting Fire with Fire
7:16 - Security Teams and Agentic AI Readiness
9:12 - Guidance for Organizations

Key Quotes

2:52 "The two things that we've never really actually solved for were data and identity, data and access. I think of them kind of as the orphan security programs."
4:43 "When you actually start using AI to solve for some of these challenges, you get a whole new world opening up about actually how many problems you probably have in the organization."
6:58 "We're able to rapidly get across their data estates, but without sacrificing precision. That's a really important point—we're not losing any of the fidelity, but we're able to operate at pace and scale."

Categories:
  • » Webinar Library » Cyera
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • AI & Machine Learning
  • Data Protection
  • Identity & Access
  • Security Operations
  • Interview
  • AI security posture management
  • data-centric security
  • identity and access management
  • agentic AI security
  • runtime protection
  • shadow AI discovery
  • enterprise AI governance
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cyera: Enterprise AI Security and Data Protection Strategies

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version