How Can Identity and AI Strengthen Cyber Defense?

I’m thrilled to sit down with Dominic Jainy, an IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain has positioned him as a thought leader in cybersecurity. With a passion for applying cutting-edge technologies across industries, Dominic brings a unique perspective to the evolving challenges of cyber resilience, identity protection, and the role of AI in modern defense strategies. In this conversation, we dive into what it truly means to operate through disruption, the vulnerabilities tied to identity systems, the transformative potential of AI, and practical steps organizations can take to stay ahead of threats.

How do you define true cyber resilience, and how does it differ from the more common focus on recovery after a cyberattack?

True cyber resilience, to me, is about maintaining operations even in the face of disruption. It’s not just about bouncing back after an attack but ensuring that critical functions keep running while systems are being restored. Recovery-focused strategies often leave organizations paralyzed during a crisis—think about a scenario where your Active Directory or Single Sign-On is down, and teams can’t even access their crisis plans. Resilience means building redundancy and adaptability into every layer of the business, from tech to people, so you’re not starting from zero when disaster hits.

Why do you think so many organizations prioritize recovery over continuity during a crisis?

It’s often a matter of mindset and resources. Recovery feels tangible—you can point to backups, restoration timelines, and post-incident reports. Continuity, on the other hand, requires upfront investment in systems and processes that might never be used if a crisis doesn’t strike. It’s harder to justify the cost of redundant communication channels or extra training when budgets are tight. Plus, many leaders underestimate how quickly a breach can escalate, assuming they’ll have time to react. That’s a dangerous assumption when seconds matter.

What are some practical ways businesses can shift their focus from recovery to maintaining operations during a disruption?

First, they need to map out what’s truly critical to keep the business alive—core functions that can’t stop, no matter what. Then, build redundancies around those, like alternative access methods for key systems or manual workarounds for automated processes. Training is just as important; teams should regularly drill on operating under degraded conditions. Finally, leadership needs to champion a culture of preparedness, where continuity isn’t an IT issue but an enterprise-wide priority. It’s about planning to fight through the storm, not just clean up after it.

Why is relying solely on platforms like Teams or Slack for crisis communication a risky move?

These platforms are often tied to identity systems like Single Sign-On, which are prime targets in a cyberattack. If those systems are compromised, your communication lifeline is cut off right when you need it most. You’re left scrambling to coordinate without a secure or reliable way to reach your team. It’s a single point of failure that attackers can easily exploit, turning a bad situation into chaos.

What alternative communication methods do you recommend for teams when identity systems are down?

Out-of-band systems are critical here. Think secure, pre-set chat platforms that don’t rely on corporate identity systems, or even hardened conference lines that are isolated from main networks. In some cases, a simple phone tree—where team members know who to call in a specific order—can work wonders. The key is to have these alternatives set up and tested long before a crisis hits, so switching over is second nature.

Why has identity become such a key target for cybercriminals in recent years?

Identity is the gateway to everything. Once attackers gain access to credentials, they can move laterally through systems, escalate privileges, and cause widespread damage. Human identities are often protected with things like multifactor authentication, but nonhuman identities—think service accounts or bots—frequently lack those safeguards. They’re often over-privileged, don’t expire, and sometimes have no clear owner, making them low-hanging fruit for attackers looking to infiltrate a network.

How is AI, particularly agentic AI, reshaping the landscape of cyber threats and defenses?

Agentic AI, which can reason and act autonomously, is a game-changer on both sides of the fence. For attackers, it can accelerate the speed and sophistication of exploits—think AI-driven phishing that’s hyper-personalized or bots that adapt to defenses in real time. For defenders, it offers the potential to detect anomalies and respond at machine speed, far faster than any human could. But it also introduces new risks, like AI agents acting unpredictably or being weaponized if not properly controlled. It’s collapsing old assumptions about accountability and control in cybersecurity.

What are the biggest security risks when businesses integrate AI agents into their operations?

The main risk is the lack of visibility and control. AI agents can make decisions and take actions without human oversight, and if they’re compromised or misconfigured, the fallout can be massive. There’s also the issue of trust—how do you know an AI’s actions align with your policies? Without proper guardrails, an AI agent with access to sensitive systems could become a backdoor for attackers or accidentally expose data. It’s a new frontier of risk that many organizations aren’t prepared to handle.

How can organizations establish effective controls to manage AI activity at the pace of machines?

You need machine-readable policies that define exactly what an AI agent can and can’t do, enforced in real time. Logging and explainability are also critical—every action an AI takes should be traceable and auditable. Beyond that, deploying monitoring systems that can detect and block anomalous AI behavior instantly is a must. It’s about building a framework where AI can operate safely without constant human intervention, while still having mechanisms to pull the plug if something goes wrong.

What’s your forecast for the role of AI in cyber resilience over the next decade?

I see AI becoming the backbone of both offense and defense in cybersecurity. On the defensive side, it’ll drive predictive capabilities, allowing organizations to anticipate and neutralize threats before they materialize. On the offensive side, attackers will leverage AI to craft more sophisticated, adaptive attacks. The race will be about who can harness AI more effectively—those who build robust, policy-driven AI systems with strong oversight will stay ahead. But if we don’t address the ethical and security challenges now, we risk creating tools that outpace our ability to control them. It’s both an opportunity and a ticking clock.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the