How Can Identity and AI Strengthen Cyber Defense?

I’m thrilled to sit down with Dominic Jainy, an IT professional whose deep expertise in artificial intelligence, machine learning, and blockchain has positioned him as a thought leader in cybersecurity. With a passion for applying cutting-edge technologies across industries, Dominic brings a unique perspective to the evolving challenges of cyber resilience, identity protection, and the role of AI in modern defense strategies. In this conversation, we dive into what it truly means to operate through disruption, the vulnerabilities tied to identity systems, the transformative potential of AI, and practical steps organizations can take to stay ahead of threats.

How do you define true cyber resilience, and how does it differ from the more common focus on recovery after a cyberattack?

True cyber resilience, to me, is about maintaining operations even in the face of disruption. It’s not just about bouncing back after an attack but ensuring that critical functions keep running while systems are being restored. Recovery-focused strategies often leave organizations paralyzed during a crisis—think about a scenario where your Active Directory or Single Sign-On is down, and teams can’t even access their crisis plans. Resilience means building redundancy and adaptability into every layer of the business, from tech to people, so you’re not starting from zero when disaster hits.

Why do you think so many organizations prioritize recovery over continuity during a crisis?

It’s often a matter of mindset and resources. Recovery feels tangible—you can point to backups, restoration timelines, and post-incident reports. Continuity, on the other hand, requires upfront investment in systems and processes that might never be used if a crisis doesn’t strike. It’s harder to justify the cost of redundant communication channels or extra training when budgets are tight. Plus, many leaders underestimate how quickly a breach can escalate, assuming they’ll have time to react. That’s a dangerous assumption when seconds matter.

What are some practical ways businesses can shift their focus from recovery to maintaining operations during a disruption?

First, they need to map out what’s truly critical to keep the business alive—core functions that can’t stop, no matter what. Then, build redundancies around those, like alternative access methods for key systems or manual workarounds for automated processes. Training is just as important; teams should regularly drill on operating under degraded conditions. Finally, leadership needs to champion a culture of preparedness, where continuity isn’t an IT issue but an enterprise-wide priority. It’s about planning to fight through the storm, not just clean up after it.

Why is relying solely on platforms like Teams or Slack for crisis communication a risky move?

These platforms are often tied to identity systems like Single Sign-On, which are prime targets in a cyberattack. If those systems are compromised, your communication lifeline is cut off right when you need it most. You’re left scrambling to coordinate without a secure or reliable way to reach your team. It’s a single point of failure that attackers can easily exploit, turning a bad situation into chaos.

What alternative communication methods do you recommend for teams when identity systems are down?

Out-of-band systems are critical here. Think secure, pre-set chat platforms that don’t rely on corporate identity systems, or even hardened conference lines that are isolated from main networks. In some cases, a simple phone tree—where team members know who to call in a specific order—can work wonders. The key is to have these alternatives set up and tested long before a crisis hits, so switching over is second nature.

Why has identity become such a key target for cybercriminals in recent years?

Identity is the gateway to everything. Once attackers gain access to credentials, they can move laterally through systems, escalate privileges, and cause widespread damage. Human identities are often protected with things like multifactor authentication, but nonhuman identities—think service accounts or bots—frequently lack those safeguards. They’re often over-privileged, don’t expire, and sometimes have no clear owner, making them low-hanging fruit for attackers looking to infiltrate a network.

How is AI, particularly agentic AI, reshaping the landscape of cyber threats and defenses?

Agentic AI, which can reason and act autonomously, is a game-changer on both sides of the fence. For attackers, it can accelerate the speed and sophistication of exploits—think AI-driven phishing that’s hyper-personalized or bots that adapt to defenses in real time. For defenders, it offers the potential to detect anomalies and respond at machine speed, far faster than any human could. But it also introduces new risks, like AI agents acting unpredictably or being weaponized if not properly controlled. It’s collapsing old assumptions about accountability and control in cybersecurity.

What are the biggest security risks when businesses integrate AI agents into their operations?

The main risk is the lack of visibility and control. AI agents can make decisions and take actions without human oversight, and if they’re compromised or misconfigured, the fallout can be massive. There’s also the issue of trust—how do you know an AI’s actions align with your policies? Without proper guardrails, an AI agent with access to sensitive systems could become a backdoor for attackers or accidentally expose data. It’s a new frontier of risk that many organizations aren’t prepared to handle.

How can organizations establish effective controls to manage AI activity at the pace of machines?

You need machine-readable policies that define exactly what an AI agent can and can’t do, enforced in real time. Logging and explainability are also critical—every action an AI takes should be traceable and auditable. Beyond that, deploying monitoring systems that can detect and block anomalous AI behavior instantly is a must. It’s about building a framework where AI can operate safely without constant human intervention, while still having mechanisms to pull the plug if something goes wrong.

What’s your forecast for the role of AI in cyber resilience over the next decade?

I see AI becoming the backbone of both offense and defense in cybersecurity. On the defensive side, it’ll drive predictive capabilities, allowing organizations to anticipate and neutralize threats before they materialize. On the offensive side, attackers will leverage AI to craft more sophisticated, adaptive attacks. The race will be about who can harness AI more effectively—those who build robust, policy-driven AI systems with strong oversight will stay ahead. But if we don’t address the ethical and security challenges now, we risk creating tools that outpace our ability to control them. It’s both an opportunity and a ticking clock.

Explore more

Effective Email Automation Strategies Drive Business Growth

The digital landscape is currently witnessing a silent revolution where the most successful marketing teams have stopped competing for attention through volume and started winning through surgical precision. While many organizations continue to struggle with the exhausting cycle of manual campaign creation, a sophisticated subset of the market has mastered the art of “set it and forget it” revenue generation.

How Can Modern Email Marketing Drive Exceptional ROI?

Every second, millions of digital messages flood into global inboxes, yet only a tiny fraction of these communications actually manage to convert a passive reader into a loyal, high-value customer. While the average marketer often points to a return of thirty-six dollars for every dollar spent as a benchmark of success, this figure represents a mere starting point for organizations

Modern Tactics Drive High-Performance Email Marketing

The sheer volume of digital correspondence flooding the modern consumer’s primary inbox has reached a point where generic messaging is no longer merely ignored but actively penalized by sophisticated filtering algorithms. As the global email ecosystem navigates a staggering daily volume of nearly 400 billion messages, the traditional “spray and pray” methodology has transformed from a sub-optimal tactic into a

How Will AI-Native 6G Networks Change Global Connectivity?

Global telecommunications are currently undergoing a profound metamorphosis that transcends simple speed upgrades, aiming instead to weave an intelligent fabric directly into the world’s physical reality. While the transition from 4G to 5G was defined by raw speed and reduced latency, the move toward 6G represents a fundamental departure from traditional telecommunications. The industry is moving toward a reality where

How Is AI Redefining the Future of 6G and Telecom Security?

The sheer velocity of data surging through modern global telecommunications has already pushed traditional human-centric management systems toward a breaking point that demands a complete architectural overhaul. While the industry previously celebrated the arrival of high-speed mobile broadband, the current shift represents a fundamental departure from hardware-heavy engineering toward a software-defined, intelligent ecosystem. This evolution marks a pivotal moment where