RSAC 2024: AI and Its Impact on Identity & Security Policies

David Bradbury, chief security officer for Okta, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss how identity has come to shape security policy, especially with AI’s momentum and how it’s reshaped the threat landscape.

11 Min View

David Bradbury, chief security officer for Okta, joins Dark Reading's Terry Sweeney at News Desk during the RSA Conference to discuss how identity has come to shape security policy, especially with AI’s momentum and how it’s reshaped the threat landscape. He shares lessons learned from Okta’s own data breach that exposed its own customers’ identities. Bradbury defines what Okta calls “post-authentication,” and what that means for identity management. And he talks about how customers can better protect themselves in the face of new, dangerous threats.

David Bradbury is Chief Security Officer at Okta. As CSO, he leads overall security execution for the organization and his team is responsible for navigating the evolving threat landscape to best protect employees and customers. In addition, he is instrumental in helping Okta’s customers continue to adopt and accelerate Zero Trust security strategies.

Prior to joining Okta, Bradbury was Senior Vice President and Chief Security Officer at Symantec where he led and had global oversight of all cyber security and physical security programs.

Bradbury has built an international reputation for leading and delivering cybersecurity at scale. He has worked across his native Australia, as well as in the United Kingdom and the United States, leading highly-regarded security teams at some of the world’s largest banks, including ABN AMRO, Barclays, Morgan Stanley and the Commonwealth Bank of Australia. He holds a B.S. in Computer Science from the University of Sydney.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights