Which of these technologies do you consider the most crucial for consolidating your org’s cybersecurity tech stack?
SASE18%
IAM/IGA43%
XDR28%
DSPs (data security platforms)6%
CNAPP2%
Something else (share in the comments)1%
120 PARTICIPANTS
1.3k views
Content you might like
New NSA, CISA, and FBI guidance reveals 3 critical threats that can compromise AI systems:
1. Data Supply Chain Vulnerabilities – tampering or poisoning for as little as $60–$1,000
2. Maliciously Modified Data – adversarial poisoning and model inversion
3. Data Drift – natural evolution creates security blind spots
Where does your organization sit on the AI security maturity curve? Are you enhancing existing tools or implementing AI-specific platforms?
Read the full guidance: https://media.defense.gov/2025/May/22/2003720601/-1/-1/0/CSI_AI_DATA_SECURITY.PDF
Disesdi Susanna Cox outlines 3 critical threats:
1. Non-deterministic decisions – same prompt, different actions (e.g., unintended transfers).
2. Cascading failures – multi-step tasks = more attack surface.
3. Emergent behavior – guardrails can’t cover infinite edge cases; focus on blast radius and recovery.
3 Controls to Implement Now:
• Map agent workflows to attack tactics (MITRE ATLAS)
• Weekly prompt-injection tests (OWASP + CSA)
• Least-privilege, expiring agent tokens (NIST AI RMF + CSA MAESTRO)
Which control or framework gives you the biggest headache, and how are you tackling it?
Full analysis: https://disesdi.substack.com/p/openai-just-dropped-their-agentic
Does your contract lifecycle management tool deliver on their AI/ML promises?
Yes66%
No33%
Between 6-12 months13%
Between 3-6 months30%
Between 2-3 months19%
Between 1-2 months15%
Between 2 weeks to 1 month12%
Between 1-2 weeks4%
Between 0-1 week5%