Threat Vector by Palo Alto Networks

Who Holds Power When AI Compresses Decision Time?


Listen Later

What if the choices we make about AI security today determine who holds power tomorrow?

Erica L. Shoemate brings over a decade of experience from the FBI and U.S. Intelligence Community, followed by senior leadership roles at Twitter, Amazon, and Meta shaping AI policy, cyber strategy, and regulatory readiness. As founder of The EN Strategy Group, she operates at the intersection where national security, emerging technology, and human-centered design collide.

In this episode, David Moulton and Erica explore how AI is fundamentally reshaping the security landscape, from compressed decision-making timelines and asymmetric threat capabilities to the erosion of trust that creates strategic vulnerabilities.

You'll learn:

- Why AI governance can't be an afterthought—and how building policy alongside innovation creates competitive advantage, not friction

- How the "new security order" is lowering disruption costs while amplifying ambiguity, enabling smaller actors to generate outsized impact

- Why human-centered design isn't about empathy as a value—it's about operational clarity that prevents cognitive overload from becoming a security risk

- The framework for balancing innovation and restraint: treating policy as guardrails, not brakes, while red-teaming AI systems before deployment

- How trust functions as a national security asset—and why overconfidence is the fastest way to lose it

Erica brings rare perspective from both classified intelligence operations and private sector AI deployment at scale. She challenges the assumption that speed and security are trade-offs, arguing instead that ethical AI systems are more durable, more resilient, and ultimately more profitable than those built without accountability.

With AI compressing the timeline from detection to decision to response, the margin for error has never been smaller. This conversation reveals why the choices security leaders make right now—about governance, diversity, transparency, and human oversight—will define who is protected, who is exposed, and who maintains strategic advantage in an AI-driven future.

This episode is essential listening if you're:

- A CISO or security leader deploying AI-enabled systems who needs to balance innovation velocity with governance rigor

- A policy professional struggling to keep pace with AI deployment timelines and seeking frameworks that enable rather than block

- Anyone responsible for building trust in AI systems—whether with users, regulators, or boards—who recognizes transparency as competitive advantage

Related Episodes:

- Securing AI in the Enterprise with Tanya Shastri - Deep dive into AI governance frameworks and platformization strategies

- How to Scale Responsible AI in the Enterprise with Noelle Russell - Building AI systems with fairness, accuracy, and security as foundational design choices

- From Policy to Cyber Interference with Tom Bossert - Bridging national security policy and operational cybersecurity

#AISecurity #CyberGovernance


About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠

...more
View all episodesView all episodes
Download on the App Store

Threat Vector by Palo Alto NetworksBy Palo Alto Networks and N2K Networks

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

38 ratings


More shows like Threat Vector by Palo Alto Networks

View all
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

652 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,027 Listeners

NerdWallet's Smart Money Podcast by NerdWallet Personal Finance

NerdWallet's Smart Money Podcast

885 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

195 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Becker Private Equity & Business Podcast by Scott Becker

Becker Private Equity & Business Podcast

79 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

Do This, NOT That: Marketing Tips with Jay Schwedelson by GURU Media Hub

Do This, NOT That: Marketing Tips with Jay Schwedelson

1,003 Listeners

Unfiltered Soccer with Landon Donovan and Tim Howard by Landon Donovan, Tim Howard

Unfiltered Soccer with Landon Donovan and Tim Howard

394 Listeners

Smart Travel: Upgrade Your Getaways by NerdWallet Travel

Smart Travel: Upgrade Your Getaways

214 Listeners

The Find Out Podcast by Find Out Media & Studio71

The Find Out Podcast

1,907 Listeners

Post Moves with Candace Parker & Aliyah Boston by Candace Parker & Aliyah Boston

Post Moves with Candace Parker & Aliyah Boston

430 Listeners