Shadows Within Shadows: How AI is Challenging IT Teams
Adopting Zero Trust20 Maalis 2025

Shadows Within Shadows: How AI is Challenging IT Teams

In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already existing problems tied to shadow IT. The conversation explores how modern enterprises handle the growing complexities of unregulated software use, the role of enterprise browsers in mitigating risks, and the dynamic between user experience and cybersecurity.

01:16 Shadows within shadows

04:15 AI in Approved Solutions

09:14 Enterprise Browser and Security

14:25 Transition to Browser-Based Applications

16:23 Enterprise Browser Capabilities

18:45 Data Protection and Shadow IT

24:39 Shepherding Data in the Enterprise Browser

25:17 Policy Perspectives on AI and Data Flow

28:16 Exploring SBOM and AI Integration

35:39 Browser Security and Application Boundaries

41:40 BYOD and Privacy Concerns

44:48 Third-Party Scenarios and Onboarding

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

The key to growing a cybersecurity career are soft skills

The key to growing a cybersecurity career are soft skills

In this episode of 'Adopting Zero Trust (AZT)', host Neal Dennis and producer Elliot Volkman delve into the often-overlooked realm of soft or 'non-tech' skills in cybersecurity.This week, we chat with...

19 Joulu 202450min

Behind the scenes of cybersecurity media and reporting

Behind the scenes of cybersecurity media and reporting

Season 3, Episode 15: We gather a panel of journalists, communications, and a researcher to discuss how cybersecurity news and incidents are reported.You can read the show notes here.In the world of c...

21 Marras 20241h 4min

GRC tool or spreadsheets, that is the question | GRC Uncensored Preview

GRC tool or spreadsheets, that is the question | GRC Uncensored Preview

In our final preview episode of GRC Uncensored, we explore a particularly bipolar debate: do you need a GRC tool to manage compliance, or will spreadsheets suffice?After this, we will be back to our r...

24 Loka 202443min

Podcast Preview: GRC Uncensored and the commoditization of compliance

Podcast Preview: GRC Uncensored and the commoditization of compliance

We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored.This pilot season will elevate conversations about GRC that are often buried un...

10 Loka 202441min

How to prepare your operations team for Zero Trust

How to prepare your operations team for Zero Trust

Welcome back to Adopting Zero Trust! In this episode, hosts Elliot Volkman and Neal Dennis are joined by Rob Allen, Chief Product Officer of ThreatLocker, to dive deep into the operationalization of Z...

26 Syys 202446min

Log4j Continues to act as Organizational Vulnerability

Log4j Continues to act as Organizational Vulnerability

Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries.Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes h...

5 Syys 202447min

Overturning of Chevron Deference’s Impact on Cybersecurity Regulation

Overturning of Chevron Deference’s Impact on Cybersecurity Regulation

Season 3, Episode 12: Could the overturning of Chevron Deference impact cybersecurity and privacy regulations?Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here...

20 Elo 202451min

Applying Vulnerability Management to Zero Trust

Applying Vulnerability Management to Zero Trust

Season 3, Episode 11: Vulnerability management is critical to any Zero Trust strategy, but you probably already know that. Fortra’s Tyler Reguly breaks down severity vs. risk.Catch this episode on You...

1 Elo 202445min