Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now
VentureBeat recently sat down (virtually) with Jerry R. Geisler III, Executive Vice President and Chief Information Security Officer at Walmart Inc., to gain insights into the cybersecurity challenges the world’s largest retailer faces as AI becomes increasingly autonomous.
We talked about securing agentic AI systems, modernizing identity management and the critical lessons learned from building Element AI, Walmart’s centralized AI platform. Geisler provided a refreshingly candid view of how the company is tackling unprecedented security challenges, from defending against AI-enhanced cyber threats to managing security across a massive hybrid multi-cloud infrastructure. His startup mindset approach to rebuilding identity and access management systems offers valuable lessons for enterprises of all sizes.
Leading security for a company operating at Walmart’s scale across Google Cloud, Azure and private cloud environments, Geisler brings unique insights into implementing Zero Trust architectures and building what he calls “velocity with governance,” enabling rapid AI innovation within a trusted security framework. The architectural decisions made while developing Element AI have shaped Walmart’s entire approach to centralizing emerging AI technologies.
Jerry R. Geisler III, Senior VP and Chief Information Security Officer, Walmart Credit: Walmart
Presented below are excerpts from our interview:
AI Scaling Hits Its Limits Power caps, rising token costs, and inference delays are reshaping enterprise AI. Join our exclusive salon to discover how top teams are: Turning energy into a strategic advantage
Architecting efficient inference for real throughput gains
Unlocking competitive ROI with sustainable AI systems Secure your spot to stay ahead: https://bit.ly/4mwGngO
VentureBeat: As generative and agentic AI become increasingly autonomous, how will your existing governance and security guardrails evolve to address emerging threats and unintended model behaviors?
... continue reading