It was a Tuesday afternoon when one of our business analysts dropped a file into the shared drive with a note attached: “Used Claude to summarize all the customer complaint data — saved me three hours!” She was thrilled. I was not. Not because she had done something wrong. She hadn’t — not intentionally. But sitting inside that AI summary was a condensed version of thousands of customer records, support tickets, and PII that had just been sent to an external large language model through a free consumer account. No data processing agreement. No approved vendor. No logging. No way to know what had been retained on the other side. That moment was my first real encounter with Shadow AI at scale. And if you’re a new CISO, I can almost guarantee you’ve already got it happening in your organization right now — you just might not know it yet. Shadow AI Is the New Shadow IT, and It Moves Faster We’ve been talking about Shadow IT for two decades. Employees spinning up personal Dropbox...
InfoSec Made Easy OT Security Leadership | NCSC Guidance Series Why logging and monitoring is your last line of defense in OT — and what effective OT visibility actually requires All security controls, however well-designed, carry the possibility of failure. Boundaries can be breached. Segmentation controls can be circumvented. Authentication mechanisms can be defeated. Protocols can be exploited. There is no configuration of preventive controls that provides absolute certainty that an OT environment will never be compromised. This is not a counsel of despair — it is a statement of operational reality that serious security programs accept and design around. Principle 7 of the NCSC's Secure Connectivity Principles for Operational Technology is the control that remains effective even when every other control has been bypassed: comprehensive logging and monitoring. When an attacker defeats your boundary, navigates your segmentation, and reaches a critical OT ass...