AI Is a Tsunami: Why Teams Are Playing Catch-Up - Ben Rothke - Guardians of the Data - Episode #40

Are security teams already behind on AI? And what does it take to catch up?

In this episode of Guardians of the Data, Ben Rothke joins the show to break down the biggest data security challenges facing organizations today and why many of them are harder to solve than ever before.

With over 30 years in cybersecurity, Ben shares a grounded perspective on how the landscape has evolved from simpler perimeter-based models to today’s world of data sprawl, AI-driven threats, and overwhelming complexity. He explains why AI isn’t just another trend, but a “tsunami” that’s fundamentally changing how both attackers and defenders operate.

The conversation dives into why so many organizations are playing catch-up, how shadow IT and poor foundations create long-term risk, and why the most dangerous security problems can’t be solved with a single tool or quick fix. Ben also offers practical guidance on how teams can approach AI more responsibly, starting with clear use cases, strong guardrails, and embedding security from the very beginning.
 
Takeaways:
  • Get Security Involved From the Start: Before deploying any new technology, especially AI, loop in information security from day one. Don't retrofit security after the fact; it's far more costly and risky.
  • Define Your Use Case Before Buying Tools: Ask "What is my problem, and how will this tool solve it?" Don't buy enterprise AI or security tools because they're on the Gartner Hype Cycle. Start with a clearly defined use case.
  • Create AI Policies and Guardrails Now: If your organization hasn't done it yet, immediately establish policies and processes governing how AI tools can be used: what data can be entered, by whom, and under what conditions.
  • Document Before You Deploy: Create detailed design documents for any AI or IT system before rollout, covering use cases, security controls, privacy controls, and support plans. Undocumented "shadow IT" becomes tomorrow's critical vulnerability.
  • Address Data Sprawl Proactively: Inventory where your data lives across servers, cloud, mobile, and third-party vendors. You can't protect what you don't know you have.
  • Take Third-Party Supply Chain Risk Seriously: Even a single weak vendor can expose massive amounts of data. Vet your software supply chain rigorously.
Quote of the Show:
  • “In the last year and change, the challenge of AI has just been a tsunami.” - Ben Rothke
Links:
Ways to Tune In:
AI Is a Tsunami: Why Teams Are Playing Catch-Up - Ben Rothke - Guardians of the Data - Episode #40
Broadcast by