Skip navigation
Video
28 minutes
Apr 22, 2025

Video


BBA

Agentic AI: The Emerging Challenge in Cybersecurity

In this video, Wendi Whitmore, Cybersecurity Executive at Palo Alto Networks, joins David Levy, Advisory Technology Engineer at IBM Client Engineering, to explore how agentic AI is rapidly expanding the cybersecurity attack surface and emphasizes the urgent need for advanced defensive strategies.

Agentic AI Attack Surface Cybersecurity Shadow AI Deepfake

Takeaways

  • Agentic AI shifts cybersecurity from static defense to dynamic, real-time detection and response, forcing organizations to prioritize speed over perimeter security.
  • Attackers now utilize AI to automate and coordinate entire cyberattack workflows, making small teams more formidable and amplifying the scalability of threats.
  • Defensive AI must be deeply integrated across an organization’s infrastructure to counter the pace and sophistication of agentic AI-driven threats.
  • Cybersecurity is no longer a technical silo but a shared cultural responsibility that must be embedded across every business unit and leadership layer.
  • Centralized visibility and control over data movement are crucial, especially as employees unknowingly introduce risk via unauthorized AI tools.

Summary

In this video, Wendi Whitmore, Chief Security Intelligence Officer and former Senior Vice President of Unit 42 at Palo Alto Networks, outlines how agentic artificial intelligence is transforming the cyberthreat landscape. She draws on her experience as an Air Force special agent investigating computer crimes two decades ago to explain how today’s attack surface has proliferated beyond a hardened perimeter to encompass mobile devices, cloud infrastructure and interconnected applications.

Whitmore introduces the concept of agentic artificial intelligence—autonomous systems endowed with “arms and legs” to execute tasks—and frames cybersecurity as an arms race driven by speed. Whereas defenders once intercepted nearly all malicious activity and relied on a small team to investigate anomalies, today’s adversaries can use generative models to coordinate malware creation, social engineering and negotiation in seconds. She highlights specific threats such as prompt injection, shadow artificial intelligence deployments by insiders, voice replication attacks on help-desk systems and synthetic video deepfakes.

To counter these risks, Whitmore argues that organizations must deploy artificial intelligence defensively, centralize data visibility and automate initial detection so human experts can focus on the most complex alerts. She emphasizes the importance of a zero-trust mindset, verifying every connection and transaction, and of establishing approved and disapproved AI workflows to prevent data exfiltration. On the home-lab scale, she recommends mirroring enterprise best practices by securing authentication, monitoring internal traffic and practicing breach response scenarios.

Beyond agentic artificial intelligence, Whitmore notes that threat actors of all kinds—nation states and cybercriminal rings—are sharing tools and tactics, exploiting supply-chain vulnerabilities and scaling their operations globally. She concludes that strong cybersecurity, supported by culture, technology and processes, has become a true competitive advantage, turning a potential $5 million average breach cost into an opportunity to demonstrate resilience and trustworthiness.

Job Profiles

IT Manager Information Security Analyst Chief Information Officer (CIO) Chief Information Security Officer (CISO) Cloud Security Engineer

Actions

Watch full video Export
Source
IBM (YouTube) 

BBA
Content rating = B
  • Shows hints of original thinking
  • Covers topic broadly
  • Adequate structure
  • Generally reliable
Author rating = B
  • Has professional experience in the subject matter area
Source rating = A
  • Features expert contributions