Legitimate Cybersecurity Podcasts

AI Is Already in Your Tools. No One Wrote the Rules


Listen Later

AI is being forced into the tools you use every day before most companies have written real rules.

That matters because one careless prompt can become a privacy, compliance, or job-risk problem fast.


In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Walter Haydock to break down what happens when AI shows up in Word, email, HR systems, search, and business workflows before organizations are actually ready for it.


They unpack where companies get AI adoption wrong, why “just use it” is dangerous guidance, what accountability should look like, and how frameworks like ISO 42001 and the NIST AI RMF help organizations build rules before the damage is done. They also dig into AI hiring risks, shadow AI, risky models, and why some AI features feel more like forced adoption than useful innovation.


If you’ve ever wondered whether AI is helping your company or quietly creating legal, privacy, and security risk, this episode is for you.


Media/interview: [email protected]


Audio: https://legitimatecybersecurity.podbean.com/


Subscribe for more conversations with Frank Downs and Dustin Brewer as they translate the hidden systems shaping everyday technology.


Chapters:


00:00 AI is suddenly in your tools

01:14 Meet Walter Haydock

02:41 Every company needs AI rules

04:42 Why gray areas become risk

05:38 Advice for less technical businesses

09:44 ISO 42001 vs. NIST AI RMF

12:44 Who should own AI accountability?

14:24 AI in hiring and HR

20:50 Why bias never fully disappears

27:29 Will the U.S. regulate AI?

30:27 Where AI is being overused

38:27 Shadow AI and risky models

43:10 What StackAware does

44:23 Walter’s best advice


#artificialintelligence #aigovernance #cybersecurity #privacy #compliance #shadowai #iso42001 #nist #techrisks #legitimatecybersecurity

...more
View all episodesView all episodes
Download on the App Store

Legitimate Cybersecurity PodcastsBy LegitimateCybersecurity