When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=AN4nZolnYJM



Duration: 0:00
4 views
0


At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine’s Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.


AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.


One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.


This is not just a security problem; it’s a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.


Akamai’s response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.


Chokshi’s call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.


Learn more about Akamai: https://itspm.ag/akamailbwc


Note: This story contains promotional content. Learn more (https://www.itspmagazine.com/their-infosec-story) .


Guests:


Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/


Hosts:


Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/


Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/


______________________


Resources


Learn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamai


Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs


Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/


Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up


Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story




Other Videos By ITSPmagazine


2025-08-13Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cyber...
2025-08-13Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Eliminates Alert Fatigue in Cybersecurity
2025-08-12The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Br...
2025-08-11Simplifying CyberSecurity Without Sacrificing Control | A ThreatLocker Event Coverage of Black Ha...
2025-08-11Stellar Cyber Improves SOC Operations with Human-Augmented Autonomous Cybersecurity | BlackHat 2025
2025-08-11From Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing Without Proof | A Black ...
2025-08-11Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platfor...
2025-08-11The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management
2025-08-11Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platfor...
2025-08-11The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Br...
2025-08-10When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai...
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...