Security leaders often feel like they have to choose between managing a sprawling tool ecosystems or risking gaps in coverage. With AI added to the equation, this challenge potentially multiplies exponentially. Cisco’s SVP of Security reveals how platform thinking and purpose-built AI defenses address both challenges simultaneously.
In this Techzine TV interview from Cisco Live EMEA in Amsterdam, Peter Bailey talks with us about why CISOs are drowning in operational complexity, and what Cisco intends to do about it. The conversation goes into emerging technologies, including agent security and MCP protocol monitoring.
If you’re trying to understand how AI changes enterprise security or wondering whether platform consolidation actually works, this interview delivers practical insights from the frontlines.
What you’ll discover in this interview
Tool sprawl is real, and a problem. We discuss some numbers behind tool proliferation in large organizations and why the best-of-breed approach created unsustainable operational debt. But more importantly, you’ll understand the specific mechanisms that make platform consolidation work, or fail.
The AI security discussion goes far beyond generic concerns about model safety. Bailey reveals how attackers are already weaponizing AI through sophisticated jailbreaking techniques, and explains the technical approach Cisco uses to intercept and analyze prompts in real-time. The details about semantic inspection and inline guardrails provide concrete understanding of how AI security actually functions at the implementation level.
Key topics explored in depth
- Why organizations struggle with 60-80+ security tools and the path to 3-4 strategic vendors
- How data normalization and shared data planes enable threat detection impossible with point solutions
- The technical architecture behind AI Defense and how it prevents model jailbreaking and prompt injection
- Emerging threats from agentic AI and the security gaps in MCP communication protocols
- Integration strategies connecting AI security with infrastructure protection through Hypershield and EBPF
- Why security-by-design remains aspirational and what organizations must do in the meantime