About this episode
Adopt a Zero Trust approach that lets you verify every access request—human, machine, or AI—before it reaches your most critical resources. As AI agents, semantic search, and automation accelerate how work gets done, you can reduce risk by explicitly validating identity, enforcing least-privilege access, and assuming breach across every step of your environment. Apply layered, continuous protection across identities, endpoints, networks, data, AI resources, applications, and infrastructure so attackers can't exploit any weak links. Michael Madrigal, Security Product Manager, shares how you can protect productivity and keep pace with an evolving threat landscape, by continuously assessing risk, securing resources at runtime, and adapting policies as conditions change. ? QUICK LINKS: 00:00 - Zero Trust for AI 01:41 - Overview of Zero Trust 02:43 - Identities 04:38 - Endpoints 04:50 - How Zero Trust applies to your network 06:51 - How Zero Trust applies to your data 07:31 - How Zero Trust applies to AI resources 08:24 - App Layer