AI reshapes identity security as enterprises confront new risks

AI reshapes identity security as enterprises confront new risks

AI reshapes identity security as enterprises confront new risks

2026-04-19 15:51:46



AI Reshapes Identity Security Enterprises Confront New Risks

As artificial intelligence (AI) transforms industries, organizations are gr
grappling with the implications of AI-driven identities on their cybersecur
cybersecurity strategies. In this exclusive interview, Matt Fangman, Field 
Chief Technology Officer at SailPoint Technologies, shares insights on how 
AI is expanding the scope of digital identities that must be secured.

The Emergence of New Attack Surfaces

The rapid adoption of AI has introduced new vulnerabilities, particularly a
as automation allows cyberattacks to scale faster. It became a new attack 
vector, Fangman said. We saw new attack surfaces such as password sprays,
sprays, where AI can target customers at scale. We were able to detect it q
quickly and shut them down, but it shows how AI can be both defensive and o
offensive.

Managing Non-Human Identities

A key challenge for enterprises is the rise of non-human identities, includ
including bots and AI agents operating across systems. SailPoint has introd
introduced new capabilities to address this, including tools designed to tr
track and govern AI-driven systems within organizations.

Run an inventory of all agents in an environment
Assign them an enterprise identity
Track ownership
Force unwanted access through additional review

Regulated Sectors Lead Adoption

SailPoint's strongest presence remains in highly regulated industries, incl
including financial services, health care, life sciences, and government. 
These sectors require strict control over identities and access, Fangman 
said.

Regional and Global Challenges

Despite progress, managing AI across different jurisdictions remains comple
complex, particularly in regions like Southeast Asia with diverse regulator
regulatory environments. There are going to be specific operating rules fo
for agents in different countries, he said. We need to ensure we can gove
govern where and how those agents operate and provide evidence of control.
control.

The Emergence of Shadow AI

Fangman also cited the emergence of so-called shadow AI – unauthorized or
or unregulated use of AI tools within organizations – as a growing concern.
concern. Companies want to understand what is running in their environment
environment and whether there are policy violations, especially around data
data leakage, he said.

Preparing for Future Threats

Looking ahead, Fangman said organizations should begin preparing for potent
potential disruptions from quantum computing, which could eventually compro
compromise existing encryption systems. There will be a quantum moment, h
he said. Organizations should start building an inventory of their encrypt
encryption keys and plan how they will respond.

The Biggest Challenge Balancing Speed and Governance

One of the biggest challenges facing enterprises is balancing the rapid ado
adoption of AI with the need for governance. There is a strong push from l
leadership to deploy AI quickly, Fangman said. But doing so without prope
proper governance and security models is risky.

Identity as the New Perimeter

As digital systems become more interconnected, Fangman said identity has ef
effectively become the new perimeter in cybersecurity. Controlling humans 
and agents – and what they have access to – is now one of the highest prior
priorities for organizations, he said.

Conclusion The Importance of Governance

In conclusion, AI reshapes identity security as enterprises confront new ri
risks. As organizations continue to adopt AI at scale, it is crucial that t
they prioritize governance and control over both human and machine-driven i
identities. By doing so, they can ensure the trust and confidence of their 
stakeholders while mitigating potential threats.

Call-to-Action

As you navigate the rapidly evolving landscape of AI-driven identities, rem
remember that effective governance is key to maintaining security and trust
trust. Take the first step towards securing your organization's digital per
perimeter today by prioritizing identity management and control.


Avatar

Edward Lance Arellano Lorilla

CEO / Co-Founder

Enjoy the little things in life. For one day, you may look back and realize they were the big things. Many of life's failures are people who did not realize how close they were to success when they gave up.

Cookie
We care about your data and would love to use cookies to improve your experience.