How Can Identity and AI Strengthen Cyber Defense?

I’m thrilled to sit down with Dominic Jainy, an IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain has positioned him as a thought leader in cybersecurity. With a passion for applying cutting-edge technologies across industries, Dominic brings a unique perspective to the evolving challenges of cyber resilience, identity protection, and the role of AI in modern defense strategies. In this conversation, we dive into what it truly means to operate through disruption, the vulnerabilities tied to identity systems, the transformative potential of AI, and practical steps organizations can take to stay ahead of threats.

How do you define true cyber resilience, and how does it differ from the more common focus on recovery after a cyberattack?

True cyber resilience, to me, is about maintaining operations even in the face of disruption. It’s not just about bouncing back after an attack but ensuring that critical functions keep running while systems are being restored. Recovery-focused strategies often leave organizations paralyzed during a crisis—think about a scenario where your Active Directory or Single Sign-On is down, and teams can’t even access their crisis plans. Resilience means building redundancy and adaptability into every layer of the business, from tech to people, so you’re not starting from zero when disaster hits.

Why do you think so many organizations prioritize recovery over continuity during a crisis?

It’s often a matter of mindset and resources. Recovery feels tangible—you can point to backups, restoration timelines, and post-incident reports. Continuity, on the other hand, requires upfront investment in systems and processes that might never be used if a crisis doesn’t strike. It’s harder to justify the cost of redundant communication channels or extra training when budgets are tight. Plus, many leaders underestimate how quickly a breach can escalate, assuming they’ll have time to react. That’s a dangerous assumption when seconds matter.

What are some practical ways businesses can shift their focus from recovery to maintaining operations during a disruption?

First, they need to map out what’s truly critical to keep the business alive—core functions that can’t stop, no matter what. Then, build redundancies around those, like alternative access methods for key systems or manual workarounds for automated processes. Training is just as important; teams should regularly drill on operating under degraded conditions. Finally, leadership needs to champion a culture of preparedness, where continuity isn’t an IT issue but an enterprise-wide priority. It’s about planning to fight through the storm, not just clean up after it.

Why is relying solely on platforms like Teams or Slack for crisis communication a risky move?

These platforms are often tied to identity systems like Single Sign-On, which are prime targets in a cyberattack. If those systems are compromised, your communication lifeline is cut off right when you need it most. You’re left scrambling to coordinate without a secure or reliable way to reach your team. It’s a single point of failure that attackers can easily exploit, turning a bad situation into chaos.

What alternative communication methods do you recommend for teams when identity systems are down?

Out-of-band systems are critical here. Think secure, pre-set chat platforms that don’t rely on corporate identity systems, or even hardened conference lines that are isolated from main networks. In some cases, a simple phone tree—where team members know who to call in a specific order—can work wonders. The key is to have these alternatives set up and tested long before a crisis hits, so switching over is second nature.

Why has identity become such a key target for cybercriminals in recent years?

Identity is the gateway to everything. Once attackers gain access to credentials, they can move laterally through systems, escalate privileges, and cause widespread damage. Human identities are often protected with things like multifactor authentication, but nonhuman identities—think service accounts or bots—frequently lack those safeguards. They’re often over-privileged, don’t expire, and sometimes have no clear owner, making them low-hanging fruit for attackers looking to infiltrate a network.

How is AI, particularly agentic AI, reshaping the landscape of cyber threats and defenses?

Agentic AI, which can reason and act autonomously, is a game-changer on both sides of the fence. For attackers, it can accelerate the speed and sophistication of exploits—think AI-driven phishing that’s hyper-personalized or bots that adapt to defenses in real time. For defenders, it offers the potential to detect anomalies and respond at machine speed, far faster than any human could. But it also introduces new risks, like AI agents acting unpredictably or being weaponized if not properly controlled. It’s collapsing old assumptions about accountability and control in cybersecurity.

What are the biggest security risks when businesses integrate AI agents into their operations?

The main risk is the lack of visibility and control. AI agents can make decisions and take actions without human oversight, and if they’re compromised or misconfigured, the fallout can be massive. There’s also the issue of trust—how do you know an AI’s actions align with your policies? Without proper guardrails, an AI agent with access to sensitive systems could become a backdoor for attackers or accidentally expose data. It’s a new frontier of risk that many organizations aren’t prepared to handle.

How can organizations establish effective controls to manage AI activity at the pace of machines?

You need machine-readable policies that define exactly what an AI agent can and can’t do, enforced in real time. Logging and explainability are also critical—every action an AI takes should be traceable and auditable. Beyond that, deploying monitoring systems that can detect and block anomalous AI behavior instantly is a must. It’s about building a framework where AI can operate safely without constant human intervention, while still having mechanisms to pull the plug if something goes wrong.

What’s your forecast for the role of AI in cyber resilience over the next decade?

I see AI becoming the backbone of both offense and defense in cybersecurity. On the defensive side, it’ll drive predictive capabilities, allowing organizations to anticipate and neutralize threats before they materialize. On the offensive side, attackers will leverage AI to craft more sophisticated, adaptive attacks. The race will be about who can harness AI more effectively—those who build robust, policy-driven AI systems with strong oversight will stay ahead. But if we don’t address the ethical and security challenges now, we risk creating tools that outpace our ability to control them. It’s both an opportunity and a ticking clock.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the