Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Agentic AI & Enterprise Data Security Challenges

Cyera
05/19/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Agentic AI represents a fundamental shift from human-in-the-loop systems to autonomous agents that compress decision execution and create a new enterprise control plane, offering competitive advantage but exposing legacy security problems around permissions and data visibility.
  • Most agentic AI deployments are halted before production due to challenges in understanding data at scale and controlling identity behavior, with 95% of secure AI enablement issues nested in the data and identity layer rather than requiring entirely new security paradigms.
  • The future security model centers on unified posture management with DSPM at its core, moving controls closer to runtime through context-aware DLP, dynamic access control, and data lineage tracking to wrap security around the atomic units of AI: data, identity, and behavior.
  • Organizations face both operational and adversarial risk—entire business processes could break if agents can't access correct data or use appropriate permissions, making adaptive governance crucial for enabling autonomous orchestration at scale.
  • Cyera is positioning data-centric security with automated context engineering as the foundation for the agentic future, addressing the fragmented enterprise architecture where the business edge now exists within data and autonomous agents rather than traditional network perimeters.

The Shift to Autonomous AI Agents

The enterprise is undergoing a fundamental architectural transformation as organizations move from generative AI to agentic AI—autonomous agents that can act non-deterministically and make decisions without human intervention. This represents one of the six or seven keystone moments in business history where production and operational models fundamentally change. Unlike previous technology deployments that relied heavily on human-in-the-loop interaction, agentic AI compresses decision execution by seeding decision-making authority directly into agents. These agents access data across the entire estate, use expanded permissions, and create what Hunt describes as a new 'agentic control plane' emerging within businesses. While this offers tremendous opportunity for competitive advantage and rapid go-to-market execution, it also exposes long-held security problems around orphaned identities, latent permissions, and data visibility that were previously ring-fenced when only humans were involved.

Deployment Challenges and Market Readiness

Organizations across the spectrum—from risk-tolerant startups to established enterprises in banking and energy—are experimenting with agentic AI use cases, driven by attractive ROI and competitive pressure. However, most deployments are being halted before reaching production due to fundamental challenges in understanding data at scale and controlling identity behavior. The common denominator across failed deployments is the inability to ensure data integrity, availability, and contextualized understanding for agents operating autonomously. Hunt emphasizes that 95% of secure AI enablement challenges are nested within the data and identity layer, suggesting that organizations don't need entirely new security paradigms but rather need to address legacy problems that have existed for two decades. The risk profile extends beyond adversarial threats to include operational breakage—entire business processes could fail if agents can't access the correct data or use appropriate permissions.

Data-Centric Security for the Agentic Future

The security model is shifting toward unified security posture management with Data Security Posture Management (DSPM) at its core, enabling organizations to rapidly understand all data in a contextualized manner regardless of location or form. This requires moving security controls as close to runtime as possible, implementing context-aware DLP, and dynamically controlling access behavior as data moves through its lifecycle. Cyera's approach includes new capabilities like browser extensions for inline control and data lineage tracking to provide full lifecycle visibility—something historically lacking in security programs. Hunt frames the new security model as wrapping around the 'atomic units of AI': data, identity, and the behavior fabric between them. This represents a renaissance for previously orphaned security programs, leveraging AI itself to transform how organizations treat data, manage identity, and control access behavior in what is now an extremely fragmented enterprise architecture where the business edge is nested within data and autonomous agents.

Chapters

0:00 - Introduction
0:24 - Generative to Agentic AI Transition
2:27 - Enterprise Readiness Assessment
4:27 - AI Risk Beyond Theory
6:23 - Permissions and Identity Challenges
8:53 - Tools for Data Visibility
11:19 - Rethinking Data Security Strategy
13:09 - Closing

Key Quotes

1:44 "... decision execution is compressing. So previously in businesses where you have huge layers of hierarchy with making decisions, that's now being seeded into agents. And we're actually seeing a kind of new agentic control plane emerge in the business."
3:21 "... most of those deployments are getting halted before they reach production, and that's largely because of a difficulty to really understand data at scale and to be able to control the behavior of identities using that data."
5:28 "At the largest end of that scale of loss exposure of risk, there is real potential for entire enterprise business processes to break upon the back of agentic orchestration if it doesn't get the data right and if it doesn't get the access right."
7:15 "... we're deploying, again, autonomous agents that are now almost acting like a hive mind. We've seen examples where these agents are already working together to increase permissions in order to execute their tasks."
8:40 "... 95% of what we're dealing with when it comes to secure AI enablement is nestled within the data and the identity layer, and so I think that's where we should be putting our focus ..."
10:19 "... the edge of our businesses now really is nestled within that data. It's nestled within these agents and identities that are acting across the enterprise."

Categories:
  • » Cybersecurity » Data Security
  • » Webinar Library » Cyera
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • AI & Machine Learning
  • Data Protection
  • Identity & Access
  • Technical Deep Dive
  • Executive Briefing
  • Agentic AI
  • Data Security Posture Management
  • DSPM
  • Identity and Access Management
  • Enterprise AI Risk
  • Autonomous Agents
  • Data Lineage
  • Context-Aware DLP
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Agentic AI & Enterprise Data Security Challenges

              Upcoming Webinar Calendar

              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout the Deployment Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-the-deployment-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/risk-in-real-time-demo-series-the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What Needs Fixing First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-needs-fixing-first/
              • 06/25/2026
                05:00 AM
                06/25/2026
                Transition from Shadow AI to Regulated AI Access
                https://www.truthinit.com/index.php/channel/1975/transitioning-from-shadow-ai-to-regulated-ai-access-strategies/

              Upcoming Events

              • May
                20

                Establishing a Robust AI Governance Framework for GenAI Throughout the Deployment Lifecycle

                05/20/202608:00 AM ET
                • May
                  20

                  Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                  05/20/202610:00 PM ET
                  • May
                    21

                    Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise

                    05/21/202611:00 AM ET
                    • May
                      27

                      Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security

                      05/27/202604:00 AM ET
                      • May
                        27

                        Adopting AI: From Illusion to Intentional Control

                        05/27/202610:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version