

Future of Data Security
Qohash
Welcome to Future of Data Security, the podcast where industry leaders come together to share their insights, lessons, and strategies on the forefront of data security. Each episode features in-depth interviews with top CISOs and security experts who discuss real-world solutions, innovations, and the latest technologies that are shaping the future of cybersecurity across various industries. Join us to gain actionable advice and stay ahead in the ever-evolving world of data security.
Episodes
Mentioned books

Dec 19, 2025 • 25min
EP 26 — Handshake's Rupa Parameswaran on Mapping Happy Paths to Catch AI Data Leakage
Rupa Parameswaran, VP of Security & IT at Handshake, tackles AI security by starting with mapping happy paths: document every legitimate route for accessing, adding, moving, and removing your crown jewels, then flag everything outside those paths. When vendors like ChatGPT inadvertently get connected to an entire workspace instead of individual accounts (scope creep that she's witnessed firsthand), these baselines become your detection layer. She suggests building lightweight apps that crawl vendor sites for consent and control changes, addressing the reality that nobody reads those policy update emails.
Rupa also reflects on the data labeling bottlenecks that block AI adoption at scale. Most organizations can't safely connect AI tools to Google Drive or OneDrive because they lack visibility into what sensitive data exists across their corpus. Regulated industries handle this better, not because they're more sophisticated, but because compliance requirements force the discovery work. Her recommendation for organizations hitting this wall is self-hosted solutions contained within a single cloud provider rather than reverting to bare metal infrastructure. The shift treats security as quality engineering, making just-in-time access and audit trails the default path, not an impediment to velocity.
Topics discussed:
Mapping happy paths for accessing, adding, moving, and removing crown jewels to establish baselines for anomaly detection systems
Building lightweight applications that crawl vendor websites to automatically detect consent and control changes in third-party tools
Understanding why data labeling and discovery across unstructured corpus databases blocks AI adoption beyond pilot stage deployments
Implementing just-in-time access controls and audit trails as default engineering paths rather than friction points for development velocity
Evaluating self-hosted AI solutions within single cloud providers versus bare metal infrastructure for containing data exposure risks
Preventing inadvertent workspace-wide AI integrations when individual account connections get accidentally expanded in scope during rollouts
Treating security as a pillar of quality engineering to make secure options easier than insecure alternatives for teams
Addressing authenticity and provenance challenges in AI-curated data where validation of truthfulness becomes nearly impossible currently

Dec 2, 2025 • 22min
EP 25 — Cybersecurity Executive Arvind Raman on Hand-in-Glove CDO-CISO Partnership
Arvind Raman — Board-level Cybersecurity Executive | CISO roles at Blackberry & Mitel, rebuilt cybersecurity from a compliance function into a business differentiator. His approach reveals why organizations focusing solely on tools miss the fundamental issue: without clear data ownership and accountability, no technology stack solves visibility and control problems. He identifies the critical blind spot that too many enterprises overlook in their rush to adopt AI and cloud services without proper governance frameworks, particularly around well-meaning employees who create insider risks through improper data usage rather than malicious intent.
The convergence of cyber risk and resilience is reshaping CISO responsibilities beyond traditional security boundaries. Arvind explains why quantum readiness requires faster encryption agility than most organizations anticipate, and how machine-speed governance will need to operate in real time, embedded directly into tech stacks and business objectives by 2030.
Topics discussed:
How cybersecurity evolved from compliance checkboxes to business enablement and resilience strategies that boards actually care about.
The critical blind spots in enterprise data security, including unclear data ownership, accountability gaps, and insider risks.
How shadow AI creates different risks than shadow IT, requiring governance committees and internal alternatives, not prohibition.
Strategies for balancing security with innovation speed by baking security into development pipelines and business objectives.
Why AI functions as both threat vector and defensive tool, particularly in detection, response, and autonomous SOC capabilities.
The importance of data governance frameworks that define what data can enter AI models, with proper versioning, testing, and monitoring.
How quantum computing readiness requires encryption agility much faster than organizations anticipate.
The emerging convergence of cyber risk and resilience, eliminating silos between IT security and business continuity.
Why optimal CISO reporting structures depend on organizational maturity and industry.
The rise of Chief Data Officers and their partnerships with CISOs for managing data sprawl, ownership, and holistic risk governance.

Oct 30, 2025 • 20min
EP 24 — Apiiro's Karen Cohen on Emerging Risk Types in AI-Generated Code
AI coding assistants are generating pull requests with 3x more commits than human developers, creating a code review bottleneck that manual processes can't handle. Karen Cohen, VP of Product Management of Apiiro, warns how AI-generated code introduces different risk patterns, particularly around privilege management, that are harder to detect than traditional syntax errors. Her research shows the shift from surface-level bugs to deeper architectural vulnerabilities that slip through code reviews, making automation not just helpful but essential for security teams.
Karen’s framework for contextual risk assessment evaluates whether vulnerabilities are actually exploitable by checking if they're deployed, internet-exposed, and tied to sensitive data, moving beyond generic vulnerability scores to application-specific threat modeling. She argues developers overwhelmingly want to ship quality code, but security becomes another checkbox when leadership doesn't prioritize it alongside feature delivery.
Topics discussed:
AI coding assistants generating 3x more commits per pull request, overwhelming manual code review processes and security gates.
Shift from syntax-based vulnerabilities to privilege management risks in AI-generated code that are harder to identify during reviews.
Implementing top-down and bottom-up security strategies to secure executive buy-in while building grassroots developer credibility and engagement.
Contextual risk assessment framework evaluating deployment status, internet exposure, and secret validity to prioritize app-specific vulnerabilities beyond CVSS scores.
Transitioning from siloed AppSec scanners to unified application risk graphs that connect vulnerabilities, APIs, PII, and AI agents.
Developer overwhelm driving security deprioritization when leadership doesn't communicate how vulnerabilities impact real end users and business outcomes.
Future of code security involving agentic systems that continuously scan using architecture context and real-time threat intelligence feeds.
Balancing career growth by choosing scary positions with psychological safety and gaining experience as both independent contributor and team player.

Oct 14, 2025 • 32min
EP 23 — IBM's Nic Chavez on Why Data Comes Before AI
Nic Chavez, CISO of Data & AI at IBM and former DataStax leader, dives into the challenges of enterprise AI. He discusses how Project Catalyst democratized AI development, showing anyone can innovate with coding assistants. Nic highlights that over 99% of AI projects stall due to data security risks, especially accidental leaks into free LLMs. He argues for creating appealing internal tools over banning external ones. Also, he predicts AGI could emerge by 2029, emphasizing the need for robust security talent development.

12 snips
Sep 18, 2025 • 32min
EP 22 — Databricks' Omar Khawaja on Why Inertia Is Security's Greatest Enemy
Omar Khawaja, CISO at Databricks and expert in enterprise security and AI risk, shares insights on overcoming organizational inertia in security. He introduces the T-junction methodology, which forces explicit decision-making and turns employees into security champions. Omar reveals a comprehensive approach to AI risks, cataloging 62 specific threats across various subsystems. He emphasizes practical AI use cases that enhance efficiency while warning against the pitfalls of shiny-object syndrome in technology.

Aug 28, 2025 • 21min
EP 21 — Sendbird's Yashvier Kosaraju on Creating Shared Responsibility Models for AI Data Security
Sendbird had AI agents take backend actions on behalf of customers while processing sensitive support data across multiple LLM providers. This required building contractual frameworks that prevent customer data from training generic models while maintaining the feedback loops needed for enterprise-grade AI performance.
CISO Yashvier Kosaraju walks Jean through their approach to securing agentic AI platforms that serve enterprise customers. Instead of treating AI security as a compliance checkbox, they've built verification pipelines that let customers see exactly what decisions the AI is making and adjust configurations in real-time.
But the biggest operational win isn't replacing security analysts: it's eliminating query languages entirely. Natural language processing now lets incident responders ask direct questions like "show me when Yash logged into his laptop over the last 90 days" instead of learning vendor-specific syntax. This cuts incident response time while making it easier to onboard new team members and switch between security tools without retraining.
Topics discussed:
Reframing zero trust as explicit and continuously verified trust rather than eliminating trust entirely from security architectures.
Building contractual frameworks with LLM providers to prevent customer data from training generic models in enterprise AI deployments.
Implementing verification pipelines and feedback loops that allow customers to review AI decisions and adjust agentic configurations.
Using natural language processing to eliminate vendor-specific query languages during incident response and security investigations.
Managing security culture across multicultural organizations through physical presence and collaborative problem-solving approaches rather than enforcement.
Addressing shadow AI adoption by understanding underlying problems employees solve instead of punishing policy violations.
Implementing shared responsibility models for AI data security across LLM providers, platform vendors, and enterprise customers.
Prioritizing internal employee authentication and enterprise security basics in startup scaling patterns from zero to hundred employees.

Aug 14, 2025 • 23min
EP 20 — MoonPay's Doug Innocenti on The Gut Instinct Gap in AI Security Operations
What happens when you scale a crypto company across 160+ countries while maintaining the same security standards as Wells Fargo? At MoonPay, it meant rethinking how traditional banking security translates to high-velocity fintech environments. Doug Innocenti, CISO, breaks down how his team achieved PCI, SOC 2 Type 2, and regulatory licenses like BitLicense and MiCA without slowing product development. The secret is the ability to test multiple security tools in parallel and pivot quickly when something isn't working.
But velocity alone isn't enough, he cautions Jean. Doug's approach to AI in security reveals a critical insight: although AI-powered tools can dramatically reduce SOC response times and automate incident analysis, the "gut instinct gap" remains. His team uses AI to enable faster decisions, not replace human judgment — especially when patterns don't match what the algorithms expect to see.
Topics discussed:
Maintaining bank-level security posture while enabling startup velocity through security-first architecture and platform design principles.
Scaling compliance across 160+ countries using pre-built infrastructure that accommodates PCI, SOC 2, BitLicense, and MiCA requirements.
Implementing parallel security tool testing to accelerate vendor evaluation and avoid bureaucratic delays in enterprise environments.
Adopting next-generation DLP solutions like DoControl that use AI-powered business intelligence for dynamic data boundary creation.
Balancing insider threat monitoring with external threat defense through compensated controls and rapid reaction capabilities.
Managing AI adoption risks while embracing acceleration benefits through defensive technology investment and vendor selection criteria.
Using AI-enhanced SOC and SIEM operations to reduce incident response times while preserving human judgment for pattern recognition.
Building transparent security culture where all employees become security professionals rather than maintaining background security operations.

Jul 31, 2025 • 29min
EP 19 — Cribl's Myke Lyons on Data Hierarchies That Cut Security Costs
Myke Lyons brings an unconventional background to cybersecurity leadership, having trained as a chef before discovering his passion for breaking and rebuilding IT systems. As CISO at Cribl, he applies culinary principles like mise en place to security operations while solving the fundamental economics problem facing every security team.
The math is unforgiving, he tells Jean: data volumes grow at 28% annually while security budgets remain flat. Myke's solution involves intelligent data hierarchies that route critical authentication logs to expensive SIEM systems while automatically sending regulatory compliance data to cheaper cold storage, reducing costs by 70-80% through format optimization.
Topics discussed:
The fundamental economics challenge of increasing annual data growth versus flat security budgets and how intelligent data hierarchies solve this by routing critical logs to expensive systems while storing compliance data in cheaper cold storage.
Smart data pipeline architecture that eliminates vendor lock-in by enabling simultaneous testing of multiple security technologies on identical datasets while maintaining complete data ownership across any storage platform.
Building security culture through partnership rather than punishment, including automated nudges for personal account security and micro-bonus rewards for completing security training.
AI agent implementation for automated phishing response that performs tier-two-level analysis, hunts across email environments, and provides cohesive incident summaries with risk ratings for security analysts.
The evolution from manual security operations to AI-powered automation, with predictions that full tier one analyst capabilities will be available within months for organizations with comprehensive security telemetry.
Data format optimization strategies that reduce log storage costs by 70-80% through UNIX timestamp conversion and elimination of redundant vendor-specific wrapper formats that create unnecessary data bloat.
Mise en place principles from professional kitchens applied to security incident response, treating procedures like recipes with clear preparation steps and proper tooling to reduce response time and improve consistency.
The importance of establishing data architecture early in security programs to avoid complicated remediation of poor data decisions that become exponentially more expensive to fix over time.
LLM integration for security operations including query writing assistance, pipeline creation, sensitive data redaction, and context-aware threat intelligence that reduces analyst toil and improves detection capabilities.

Jul 17, 2025 • 3min
Ask Jean – Why Doesn't 100% Data Coverage Equal 100% Protection?
Welcome to a special edition of Future of Data Security, where our host Jean Le Bouthillier answers the top questions our listeners have asked us. In today's episode, Jean addresses why 100% data coverage doesn’t equal 100% protection.
Would you like to have Jean answer one of your questions in a future episode? Email podcast@qohash.com with your question and a short summary of why you're looking for an answer!

Jun 27, 2025 • 2min
Ask Jean – How Does Data Visibility Transform Crisis into Calm?
Welcome to a special edition of Future of Data Security, where our host Jean Le Bouthillier answers the top questions our listeners have asked us. In today's episode, Jean addresses how data visibility can turn crisis into calm.
Would you like to have Jean answer one of your questions in a future episode? Email podcast@qohash.com with your question and a short summary of why you're looking for an answer!


