Can AI agents be trusted when 80% of today's breaches start with compromised identities?

Carey Frey, Chief Security Officer at TELUS, joins Threat Vector host David Moulton to tackle the most overlooked security challenge in the AI revolution: identity. With 20+ years protecting everything from Canada's Communication Security Establishment to one of North America's largest telecommunications companies, Carey brings hard-won wisdom about why identity isn't just important—it's the foundation that determines whether agentic AI becomes a force multiplier or an attack surface disaster.

You'll learn:


  
Why 95% of organizations haven't thought about AI agent identity (and what happens when they deploy anyway)



  
The single data layer CISOs need to build before AI agents can operate safely at scale



  
How threat actors have already abandoned malware for something far simpler—and why AI makes it exponentially worse



  
What "delegated authority" means for AI agents and why Gmail's EA permissions model points the way forward



  
The maturity model that tells you if your identity foundation will crumble under agentic AI




Carey leads security programs protecting TELUS's global assets while delivering managed cybersecurity services to 450+ customers across Canada. As a member of the Security Innovation Network (SINet), he co-authored practitioner guidance defining what "AI-native identity fabric" actually means—and why solving identity before deploying agents isn't optional. His insights bridge 20 years of government intelligence work with real-world enterprise security at telecommunications scale.

Read Carey's work on identity and AI:


  
The AI Revolution: Identity Will Unleash Its Full Power



  
SINet Identity Working Group Strategic Guide 




This episode is essential listening if you're: evaluating AI agent platforms, struggling with fragmented IAM systems across cloud and on-prem, implementing Zero Trust for non-human identities, or trying to understand why identity suddenly became the CISO's #1 priority after being the "third rail" for decades.

Related Episodes:


  
Transform Your SOC And Get Ahead Of The Threats



  
Securing AI in the Enterprise



  
How to Scale Responsible AI in the Enterprise




Join the conversation on our social media channels:


  
Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Threat Research:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Twitter:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.

Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

The Kill Switch for AI Agents

JAN 22, 202637 MIN
Threat Vector by Palo Alto Networks

The Kill Switch for AI Agents

JAN 22, 202637 MIN

Description

Can AI agents be trusted when 80% of today's breaches start with compromised identities? Carey Frey, Chief Security Officer at TELUS, joins Threat Vector host David Moulton to tackle the most overlooked security challenge in the AI revolution: identity. With 20+ years protecting everything from Canada's Communication Security Establishment to one of North America's largest telecommunications companies, Carey brings hard-won wisdom about why identity isn't just important—it's the foundation that determines whether agentic AI becomes a force multiplier or an attack surface disaster. You'll learn: Why 95% of organizations haven't thought about AI agent identity (and what happens when they deploy anyway) The single data layer CISOs need to build before AI agents can operate safely at scale How threat actors have already abandoned malware for something far simpler—and why AI makes it exponentially worse What "delegated authority" means for AI agents and why Gmail's EA permissions model points the way forward The maturity model that tells you if your identity foundation will crumble under agentic AI Carey leads security programs protecting TELUS's global assets while delivering managed cybersecurity services to 450+ customers across Canada. As a member of the Security Innovation Network (SINet), he co-authored practitioner guidance defining what "AI-native identity fabric" actually means—and why solving identity before deploying agents isn't optional. His insights bridge 20 years of government intelligence work with real-world enterprise security at telecommunications scale. Read Carey's work on identity and AI: The AI Revolution: Identity Will Unleash Its Full Power SINet Identity Working Group Strategic Guide This episode is essential listening if you're: evaluating AI agent platforms, struggling with fragmented IAM systems across cloud and on-prem, implementing Zero Trust for non-human identities, or trying to understand why identity suddenly became the CISO's #1 priority after being the "third rail" for decades. Related Episodes: Transform Your SOC And Get Ahead Of The Threats Securing AI in the Enterprise How to Scale Responsible AI in the Enterprise Join the conversation on our social media channels: Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Threat Research:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.