Do you want smarter insights into your inbox? Register for our weekly newsletters to get only what is important for Enterprise AI, data and security leaders. Subscribe now
Venturebeat recently (almost) sat down with Jerry R. Geisler III, Executive Vice President and Chief Information Security Officer Walmart Inc., to gain insight into the cyber security -challenges, the largest retailer in the world challenges as AI becomes autonomous.
We talked about securing agentic AI systems, modernizing identity management and the critical lessons that were learned by building element AI, the centralized AI platform of Walmart. Geisler gave a refreshing candid view of how the company tackles unprecedented security challenges, from defending against AI-improved cyber threats to the management of security in a huge hybrid multi-cloud infrastructure. Its startup – Mindset approach for the rebuilding of identity and access management systems offers valuable lessons for companies of any size.
Leading security for a company that is active on Walmart’s scale in Google Cloud, Azure and Private Cloud environments, offers Geisler unique insights into the implementation of zero trust architectures and building what he calls ‘speed with governance’, making fast AI innovation possible within a trusted security framework. The architectural decisions made during the development of element AI have formed the entire approach of Walmart to centralize emerging AI technologies.
Below are fragments from our interview:
Ai -scale distribution touches its limits
Power caps, rising token costs and inference inference reform Enterprise AI. Become a member of our exclusive salon to discover how top teams are:
- Change energy into a strategic advantage
- Architecting efficient conclusion for real transit profits
- Unlocking competitive ROI with sustainable AI systems
Secure your place to stay ahead: https://bit.ly/4mwgngo
Venturebeat: As generative and agent AI becoming autonomous, how will your existing governance and safety money rails evolve to tackle emerging threats and unintended model behavior?
Jerry R. Geisler III: The approval of Agentic AI introduces completely new security threats that circumvent traditional controls. These risks include data extration, autonomous abuse of APIs and secret cross-agent collusion, all of which can disrupt business activities or violate legal mandates. Our strategy is to build robust, proactive security controls using Advanced AI Security Posture Management (AI-SPM), which guarantees continuous risk monitoring, data protection, compliance with regulations and operational trust.
Eg: Given the limitations of the traditional RBAC in dynamic AI institutions, how does Walmart refine its identity management and zero trust architectures to offer twisted, context-sensitive data access?
Geisler: An environment of our size requires a customized approach, and interesting enough, a start -up mindset. Our team often takes a step back and asks: “If we were a new company and build from Ground Zero, what would we build?” Identity & Access Management (IAM) has completed many iterations in the last 30+ years, and our most important focus is how we can modernize our IAM pile to simplify it. Although related to even other than zero trust, our principle will not change the least privilege.
We are encouraged by the most important evolution and acceptance of protocols such as MCP and A2A, because they recognize the security challenges with which we are confronted and actively work on implementing grainy, context -sensitive access controls. These protocols make real -time access decisions possible based on identity, data sensitivity and risk, with the help of short -lived, verifiable references. This ensures that every agent, tools and request are continuously evaluated, which embodies the principles of zero trust.
Eg: How specific is Walmart’s extensive hybrid multi-cloud infrastructure (Google, Azure, Private Cloud) your approach for zero-trust network segmentation and micro-segmentation for AI-Deskads?
Geisler: Segmentation is based on identity instead of the network location. Access policy follows consistent work loads in both cloud and on-premises environments. With the promotion of protocols such as MCP and A2A, the enforcement of the ServiceDience is standardized, so that zero confidence principles are applied uniform.
Eg: with AI reduces barriers for advanced threats such as advanced phishing, which AI-driven defenses are Walmart actively uses to proactively detect and reduce these evolving threats?
Geisler: At Walmart we are deeply focused to stay ahead of the threat curve. This is especially the case because AI reforms the landscape of cyber security. Opponents are increasingly using generative AI to make very convincing phishing campaigns, but we use the same class of technology in opponents simulation campaigns to proactively build resilience against that attack vector.
We have integrated advanced machine learning models in our security stack to identify behavioral abnormalities and to detect phishing attempts. In addition to detection, we use proactively generative AI to simulate attack scenarios and test our defenses by extensively integrating AI as part of our red-teams on a scale.
By combining people and technology together in these ways, we help ensure that our employees and customers remain protected as the digital landscape evolves.
Eg: Given the extensive use of Walmart of Open-Source AI models in Element AI, what unique cyber security challenges have you identified and how does your security strategy evolve to tackle it on Enterprise scale?
Geisler: Segmentation is based on identity instead of the network location. Access policy follows consistent work loads in both cloud and on-premises environments. With the promotion of protocols such as MCP and A2A, the enforcement of the ServiceDience is standardized, so that zero confidence principles are applied uniform.
Eg: which advanced automation or fast response measures do you implement, taking into account the scale of Walmart and continuous activities, to manage simultaneous cyber security incidents in your global infrastructure?
Geisler: Working on the Walmart scale means that security must be both fast and friction. To achieve this, we have embedded intelligent automation in layers of our incident response program. With the help of SOAR platforms we orchestrate fast response workflows in geographies. This allows us to contain threats quickly.
We also apply extensive automation to continuously assess the risk and to prioritize response actions based on risk. That lets us concentrate our sources where they are the most important.
By bringing talented employees together with fast automation and context to make fast decisions, we can carry out our dedication to provide security on speed and scale for Walmart.
Ex: what initiatives or strategic changes is that Walmart strives to attract, train and retain cyber security talent that is equipped for the rapidly evolving AI and the threat landscape?
Geisler: Our Live Better U (LBU) program offers low or free education, so that employees can strive for degrees and certifications in cyber security and related IT fields, making it easier to associate from all backgrounds to Upskill. Courses are designed to offer practical, real-world skills that apply directly to Walmart’s information recording needs.
We organize our annual Sparkcon (formerly known as SP4RKCON) that coordinates conversations and Q & AS, such as with renowned professionals for sharing wisdom and proven strategies. This event is also investigating the latest trends, techniques, technologies and threats in cyber security, while those present offer opportunities to connect and build valuable relationships to promote their career.
Ex: Thinking about your experiences with the development of element AI, which critical cyber security or architectural lessons have emerged that will guide your future decisions about when and how extensive to centralize emerging AI technologies?
Geisler: That is a crucial question, because today our architectural choices will determine our risk position for the coming years. Thinking about our experience in developing a centralized AI platform, two important lessons have emerged that now lead our strategy.
Firstly, we learned that centralization is a powerful enabler of ‘speed with governance’. By creating a single paved road for AI development, we drastically reduce the complexity for our data scientists. What is even more important is that it gives us a uniform control surface. We can enclose the security from the start, ensuring consistency in how data is treated, models are examined and the output is checked. With this, innovation can take place quickly, within a framework that we trust.
Secondly, it provides ‘concentrated defense and expertise’. The threat landscape for AI is evolving at an incredible pace. Instead of spreading our limited AI protection talent over dozens of inexpensive projects, a centralized architecture enables us to concentrate our best people and our most robust controls on the most critical point. We can implement and refine advanced access controls such as context -conscious access controls, advanced fast monitoring and data export prevention and have protection, immediately cover our use cases.



