I’m thrilled to sit down with Dominic Jainy, an IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain has positioned him as a thought leader in cybersecurity. With a passion for applying cutting-edge technologies across industries, Dominic brings a unique perspective to the evolving challenges of cyber resilience, identity protection, and the role of AI in modern defense strategies. In this conversation, we dive into what it truly means to operate through disruption, the vulnerabilities tied to identity systems, the transformative potential of AI, and practical steps organizations can take to stay ahead of threats.
How do you define true cyber resilience, and how does it differ from the more common focus on recovery after a cyberattack?
True cyber resilience, to me, is about maintaining operations even in the face of disruption. It’s not just about bouncing back after an attack but ensuring that critical functions keep running while systems are being restored. Recovery-focused strategies often leave organizations paralyzed during a crisis—think about a scenario where your Active Directory or Single Sign-On is down, and teams can’t even access their crisis plans. Resilience means building redundancy and adaptability into every layer of the business, from tech to people, so you’re not starting from zero when disaster hits.
Why do you think so many organizations prioritize recovery over continuity during a crisis?
It’s often a matter of mindset and resources. Recovery feels tangible—you can point to backups, restoration timelines, and post-incident reports. Continuity, on the other hand, requires upfront investment in systems and processes that might never be used if a crisis doesn’t strike. It’s harder to justify the cost of redundant communication channels or extra training when budgets are tight. Plus, many leaders underestimate how quickly a breach can escalate, assuming they’ll have time to react. That’s a dangerous assumption when seconds matter.
What are some practical ways businesses can shift their focus from recovery to maintaining operations during a disruption?
First, they need to map out what’s truly critical to keep the business alive—core functions that can’t stop, no matter what. Then, build redundancies around those, like alternative access methods for key systems or manual workarounds for automated processes. Training is just as important; teams should regularly drill on operating under degraded conditions. Finally, leadership needs to champion a culture of preparedness, where continuity isn’t an IT issue but an enterprise-wide priority. It’s about planning to fight through the storm, not just clean up after it.
Why is relying solely on platforms like Teams or Slack for crisis communication a risky move?
These platforms are often tied to identity systems like Single Sign-On, which are prime targets in a cyberattack. If those systems are compromised, your communication lifeline is cut off right when you need it most. You’re left scrambling to coordinate without a secure or reliable way to reach your team. It’s a single point of failure that attackers can easily exploit, turning a bad situation into chaos.
What alternative communication methods do you recommend for teams when identity systems are down?
Out-of-band systems are critical here. Think secure, pre-set chat platforms that don’t rely on corporate identity systems, or even hardened conference lines that are isolated from main networks. In some cases, a simple phone tree—where team members know who to call in a specific order—can work wonders. The key is to have these alternatives set up and tested long before a crisis hits, so switching over is second nature.
Why has identity become such a key target for cybercriminals in recent years?
Identity is the gateway to everything. Once attackers gain access to credentials, they can move laterally through systems, escalate privileges, and cause widespread damage. Human identities are often protected with things like multifactor authentication, but nonhuman identities—think service accounts or bots—frequently lack those safeguards. They’re often over-privileged, don’t expire, and sometimes have no clear owner, making them low-hanging fruit for attackers looking to infiltrate a network.
How is AI, particularly agentic AI, reshaping the landscape of cyber threats and defenses?
Agentic AI, which can reason and act autonomously, is a game-changer on both sides of the fence. For attackers, it can accelerate the speed and sophistication of exploits—think AI-driven phishing that’s hyper-personalized or bots that adapt to defenses in real time. For defenders, it offers the potential to detect anomalies and respond at machine speed, far faster than any human could. But it also introduces new risks, like AI agents acting unpredictably or being weaponized if not properly controlled. It’s collapsing old assumptions about accountability and control in cybersecurity.
What are the biggest security risks when businesses integrate AI agents into their operations?
The main risk is the lack of visibility and control. AI agents can make decisions and take actions without human oversight, and if they’re compromised or misconfigured, the fallout can be massive. There’s also the issue of trust—how do you know an AI’s actions align with your policies? Without proper guardrails, an AI agent with access to sensitive systems could become a backdoor for attackers or accidentally expose data. It’s a new frontier of risk that many organizations aren’t prepared to handle.
How can organizations establish effective controls to manage AI activity at the pace of machines?
You need machine-readable policies that define exactly what an AI agent can and can’t do, enforced in real time. Logging and explainability are also critical—every action an AI takes should be traceable and auditable. Beyond that, deploying monitoring systems that can detect and block anomalous AI behavior instantly is a must. It’s about building a framework where AI can operate safely without constant human intervention, while still having mechanisms to pull the plug if something goes wrong.
What’s your forecast for the role of AI in cyber resilience over the next decade?
I see AI becoming the backbone of both offense and defense in cybersecurity. On the defensive side, it’ll drive predictive capabilities, allowing organizations to anticipate and neutralize threats before they materialize. On the offensive side, attackers will leverage AI to craft more sophisticated, adaptive attacks. The race will be about who can harness AI more effectively—those who build robust, policy-driven AI systems with strong oversight will stay ahead. But if we don’t address the ethical and security challenges now, we risk creating tools that outpace our ability to control them. It’s both an opportunity and a ticking clock.