Zero Trust Readiness and Two RSAC 2026 Interviews from Fenix24 and Absolute Security - John Bruggeman, Christy Wyatt, John Anthony Smith - BSW #442
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头,直接写描述。首先,我需要仔细阅读文章,找出主要观点。 文章主要讨论了自主AI代理对企业安全的影响,特别是当这些代理被用于客户服务、数据分析和事件响应等任务时。安全团队需要考虑这些AI带来的新攻击面。然后提到零信任策略如何应对这些风险,专家John Bruggeman建议从几个方面入手:清点AI代理、数据安全控制、身份控制以及基础设施安全。 接下来,文章还探讨了为什么技术投资没有带来预期的安全效果,指出问题在于配置不当、集成不佳和执行差距,而不是缺乏工具。最后提到了停机时间成为新的经济威胁,企业需要策略来加速恢复。 现在我需要把这些要点浓缩到100字以内。重点放在自主AI带来的风险、零信任策略的调整以及技术投资效果不佳的原因。可能还要提到停机时间的影响。 总结一下:自主AI在企业中广泛应用带来新安全挑战,需整合到零信任框架中;现有技术配置和执行问题导致持续风险;停机时间对企业造成重大损失。 这样应该能涵盖主要内容,并且符合用户的要求。 </think> 自主AI代理在企业中广泛应用,带来新的安全挑战。专家建议将Agentic AI纳入Zero Trust框架,并加强身份、数据和基础设施安全控制。尽管技术投入增加,复杂性和执行差距仍使组织易受攻击。同时,停机时间成为新的经济威胁,企业需提升恢复能力以应对 cyber disruptions. 2026-4-8 09:0:0 Author: sites.libsyn.com(查看原文) 阅读量:10 收藏

Apr 8, 2026

Autonomous AI agents are creating a new attack surface for enterprise security teams, particularly as organizations deploy agents for operational tasks such as customer support automation, data analysis, and incident response. How can we align our Zero Trust initiatives to also address the emerging Agentic AI risks?

John Bruggeman, Consulting CISO at CBTS, joins Business Security Weekly to discuss how your Zero Trust readiness can also prepare you for Agentic AI deployments. Organizations are granting agents access to sensitive systems without the security controls typically required for other Zero Trust initiatives. John will help educate CISOs on what they should be doing now to get ahead of the risk, including:

  • Agent inventory
  • Data security controls, including data model poisoning
  • Agent identity controls, including authorization and access levels
  • Infrastructure security controls, including MCP servers

Why More Technology Hasn’t Made Us More Secure Despite massive investment in cybersecurity tools, organizations remain vulnerable because their existing technologies are often misconfigured, poorly integrated, and disconnected from real operational risk. This keynote argues that complexity, human decision‑making, and gaps in execution—not a lack of products—are what truly empower attackers, especially as modern environments like cloud and SaaS expand the attack surface. Real security comes from simplifying, aligning, and expertly orchestrating what organizations already own, shifting the focus from buying tools to achieving disciplined, resilient outcomes grounded in breach reality.

This segment is sponsored by Fenix24. Visit https://securityweekly.com/fenix24rsac to learn more about them!

Downtime: The New Economic Threat Downtime is costing global enterprises hundreds of billions of dollars in losses annually. Caused by cyber incidents and software failures, enterprise CISOs are searching for strategies and solutions that will accelerate recovery and restoration of business operations after cyber disruptions render systems inoperable.

This segment is sponsored by Absolute Security. Visit https://securityweekly.com/absolutersac to join The Resilient CISO Inner Circle!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Show Notes: https://securityweekly.com/bsw-442


文章来源: http://sites.libsyn.com/18678/zero-trust-readiness-and-two-rsac-2026-interviews-from-fenix24-and-absolute-security-john-bruggeman-christy-wyatt-john-anthony-smith-bsw-442
如有侵权请联系:admin#unsafe.sh