AI reshapes identity security as enterprises confront new risks
AI reshapes identity security as enterprises confront new risks

AI Reshapes Identity Security Enterprises Confront New Risks
As artificial intelligence (AI) transforms industries, organizations are gr[2D[K
grappling with the implications of AI-driven identities on their cybersecur[10D[K
cybersecurity strategies. In this exclusive interview, Matt Fangman, Field [K
Chief Technology Officer at SailPoint Technologies, shares insights on how [K
AI is expanding the scope of digital identities that must be secured.
The Emergence of New Attack Surfaces
The rapid adoption of AI has introduced new vulnerabilities, particularly a[1D[K
as automation allows cyberattacks to scale faster. It became a new attack [K
vector, Fangman said. We saw new attack surfaces such as password sprays,[7D[K
sprays, where AI can target customers at scale. We were able to detect it q[1D[K
quickly and shut them down, but it shows how AI can be both defensive and o[1D[K
offensive.
Managing Non-Human Identities
A key challenge for enterprises is the rise of non-human identities, includ[6D[K
including bots and AI agents operating across systems. SailPoint has introd[6D[K
introduced new capabilities to address this, including tools designed to tr[2D[K
track and govern AI-driven systems within organizations.
Run an inventory of all agents in an environment
Assign them an enterprise identity
Track ownership
Force unwanted access through additional review
Regulated Sectors Lead Adoption
SailPoint's strongest presence remains in highly regulated industries, incl[4D[K
including financial services, health care, life sciences, and government. [1D[K
These sectors require strict control over identities and access, Fangman [K
said.
Regional and Global Challenges
Despite progress, managing AI across different jurisdictions remains comple[6D[K
complex, particularly in regions like Southeast Asia with diverse regulator[9D[K
regulatory environments. There are going to be specific operating rules fo[2D[K
for agents in different countries, he said. We need to ensure we can gove[4D[K
govern where and how those agents operate and provide evidence of control.[9D[K
control.
The Emergence of Shadow AI
Fangman also cited the emergence of so-called shadow AI – unauthorized or[2D[K
or unregulated use of AI tools within organizations – as a growing concern.[8D[K
concern. Companies want to understand what is running in their environment[11D[K
environment and whether there are policy violations, especially around data[4D[K
data leakage, he said.
Preparing for Future Threats
Looking ahead, Fangman said organizations should begin preparing for potent[6D[K
potential disruptions from quantum computing, which could eventually compro[6D[K
compromise existing encryption systems. There will be a quantum moment, h[1D[K
he said. Organizations should start building an inventory of their encrypt[7D[K
encryption keys and plan how they will respond.
The Biggest Challenge Balancing Speed and Governance
One of the biggest challenges facing enterprises is balancing the rapid ado[3D[K
adoption of AI with the need for governance. There is a strong push from l[1D[K
leadership to deploy AI quickly, Fangman said. But doing so without prope[5D[K
proper governance and security models is risky.
Identity as the New Perimeter
As digital systems become more interconnected, Fangman said identity has ef[2D[K
effectively become the new perimeter in cybersecurity. Controlling humans [K
and agents – and what they have access to – is now one of the highest prior[5D[K
priorities for organizations, he said.
Conclusion The Importance of Governance
In conclusion, AI reshapes identity security as enterprises confront new ri[2D[K
risks. As organizations continue to adopt AI at scale, it is crucial that t[1D[K
they prioritize governance and control over both human and machine-driven i[1D[K
identities. By doing so, they can ensure the trust and confidence of their [K
stakeholders while mitigating potential threats.
Call-to-Action
As you navigate the rapidly evolving landscape of AI-driven identities, rem[3D[K
remember that effective governance is key to maintaining security and trust[5D[K
trust. Take the first step towards securing your organization's digital per[3D[K
perimeter today by prioritizing identity management and control.