Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
History
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/1c/ab/2c/1cab2c59-a0cd-4305-2bf5-e3396c9e98fa/mza_6399775579318533652.jpg/600x600bb.jpg
Future of Data Security
Qohash
30 episodes
2 weeks ago
Show more...
Technology
RSS
All content for Future of Data Security is the property of Qohash and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog19369388/_Omar_Khawaja_2_8xduw.png
EP 22 — Databricks' Omar Khawaja on Why Inertia Is Security's Greatest Enemy
Future of Data Security
31 minutes
3 months ago
EP 22 — Databricks' Omar Khawaja on Why Inertia Is Security's Greatest Enemy
What if inertia — not attackers — is security’s greatest enemy? At Databricks, CISO Omar Khawaja transformed this insight into a systematic approach that flips traditional security thinking on its head and treats employees as assets rather than threats. Omar offers his T-junction methodology for breaking organizational inertia: instead of letting teams default to existing behaviors, he creates explicit decision points where continuing the status quo becomes impossible. This approach drove thousands of employees to voluntarily take optional security training in a single year. There’s also Databricks’ systematic response to AI security chaos. Rather than succumb to ”top five AI risks” thinking, Omar’s team catalogued 62 specific AI risks across four subsystems: data operations, model operations, serving layer, and unified governance. Their public Databricks AI Security Framework (DASF) provides enterprise-ready controls for each risk, moving beyond generic guidance to actionable frameworks that work regardless of whether you’re a Databricks customer. Topics discussed: - The T-Junction Framework to systematically break organizational inertia by eliminating default paths and forcing explicit decision-making - Human risk management strategy of moving to behavior-driven programs that convert employees from liabilities to champions 62-Risk AI security classifications of data layer, model operations, serving layer, and governance risks with specific controls for each - Methods for understanding true organizational risk appetite across business units, including the ”double-check your math” approach - Four-component agent definition and specific risks emerging from chain-of-thought reasoning and multi-system connectivity - Why ”AI strategy” creates shiny object syndrome and how to instead use AI to accelerate existing business strategy
Future of Data Security