Four major business security lessons in Walmart AI: Agent Risks, Identity Restart, Speed with Governance and Defense of AI against AI

Do you want smarter information in your reception box? Sign up for our weekly newsletters to obtain only what matters for business managers, data and security managers. Subscribe now
VentureBeat recently sat (practically) with Jerry R. Geisler III, Executive Vice-President and Information Security Director at Walmart Inc., to obtain an overview of the challenges of cybersecurity to which the largest retailers in the world are increasingly autonomous.
We have spoken to secure agencies systems, modernization of identity management and critical lessons drawn from the construction of the IA element, the centralized Walmart IA platform. Geisler gave a refreshing and frank vision of the way the company takes unprecedented security challenges, defense against IA improved cyber-menices to manage security in a massive multi-cloud hybrid infrastructure. His approach to start -up to rebuild identity and access management systems offers valuable lessons for companies of all sizes.
Directoral for a company operating at Walmart scale on Google Cloud, Azure and private cloud environments, Geisler provides unique information on the implementation of zero trust architectures and the creation of what he calls “speed with governance”, allowing a rapid innovation of AI in a security framework of confidence. The architectural decisions made during the development of the IA element shaped the entire Walmart approach to centralize the emerging technologies of AI.

You will find below extracts from our interview:
The AI scale reached its limits
Electricity ceilings, increase in token costs and inference delays restart the AI company. Join our exclusive fair to discover how best the teams are:
- Transform energy into a strategic advantage
- Effective inference architecting for real debit gains
- Unlock a competitive return on investment with sustainable AI systems
Secure your place to stay in advance::
VentureBeat: While the generator and agentic AI will become more and more autonomous, how will your existing governance and security railing evolve to fight against emerging threats and unforeseen model behaviors?
Jerry R. Geisler III: The adoption of agentic AI introduces entirely new security threats that bypass traditional controls. These risks cover the exfiltration of data, the autonomous improper use of APIs and the secret collusion of cross agent, which could all disturb business operations or violate regulatory mandates. Our strategy is to create robust and proactive security checks using the advanced management of the IA security posture (AI-SPM), guaranteeing continuous risk monitoring, data protection, regulatory compliance and operational trust.
VB: Given the limits of traditional RBAC in dynamic AI parameters, how Walmart refines its identity management and zero confidence architectures to provide granular access and sensitive to context?
Geisler: An environment of our size requires a tailor -made approach, and it is interesting to note a start -up state of mind. Our team often takes a step back and asks: “If we were a new business and build from Ground Zero, what could we build?” Identity and access management (IAM) has undergone many iterations in the past 30 years, and our main objective is how to modernize our IAM battery to simplify it. Although linked to zero confidence still different, our principle of the least privilege will not change.
We are encouraged by the major evolution and the adoption of protocols such as MCP and A2A, because they recognize the security challenges that we face and actively work on the implementation of granular access controls and sensitive to the context. These protocols allow real -time access decisions according to identity, data sensitivity and risk, using short -term and verifiable identification information. This guarantees that each agent, tool and request is evaluated continuously, embodying the principles of zero confidence.
VB: To what extent does the vast multi-cloud hybrid infrastructure by Walmart (Google, Azure, Private Cloud) shape your approach to segmentation of the zero network and micro-segmentation for IA workloads?
Geisler: The segmentation is based on identity rather than on the location of the network. Access policies follow the workloads consistently in cloud and on -site environments. With the advancement of protocols like MCP and A2A, the application of the law on service edges becomes standardized, ensuring that the principles of zero confidence are applied uniformly.
VB: With a drop in obstacles to advanced threats such as sophisticated phishing, what defenses focused on A-Walmart are actively deploying to detect and mitigate these evolving threats in a proactive manner?
Geisler: At Walmart, we are deeply concentrated on maintenance in advance on the threat curve. This is particularly true because the AI reshapes the landscape of cybersecurity. The opponents are increasingly using the generator to develop very convincing phishing campaigns, but we take advantage of the same class of technology in opposing simulation campaigns to strengthen resilience against this attack.
We have integrated advanced automatic learning models into our safety battery to identify behavioral anomalies and to detect phishing attempts. Beyond the detection, we proactively use the generating AI to simulate attack scenarios and the pressure test our defenses by largely integrating AI within the framework of our large-scale red team.
By associating people and technology together in this way, we help to make sure that our partners and customers remain protected as the digital landscape is evolving.
VB: Given the in-depth use of Walmart of Open Source models in the IA element, what unique cybersecurity challenges did you identify and how does your safety strategy evolve to meet them on a business scale?
Geisler: The segmentation is based on identity rather than on the location of the network. Access policies follow the workloads consistently in cloud and on -site environments. With the advancement of protocols like MCP and A2A, the application of the law on service edges becomes standardized, ensuring that the principles of zero confidence are applied uniformly.
VB: Given the Walmart scale and continuous operations, what advanced automation or quick response measures are implementing to manage simultaneous cybersecurity incidents in your global infrastructure?
Geisler: Operating on the Walmart scale means that security must be both fast and without friction. To achieve this, we have joined intelligent automation in the diapers of our incident response program. Using Soar platforms, we orchestrate rapid response workflows through geographies. This allows us to quickly contain threats.
We also apply in -depth automation to continuously assess the risk and prioritize response actions according to risk. This allows us to concentrate our resources where they count the most.
By bringing together talented associates with fast automation and context to help make rapid decisions, we are able to execute our commitment to ensuring safety at the speed and at the Walmart scale.
VB: What strategic initiatives or changes that Walmart continues to attract, train and keep the talents of cybersecurity equipped for the AI landscape and rapidly evolving threat?
Geisler: Our Live Better U (LBU) program offers low or non -costly education so that partners can pursue diplomas and cybersecurity certifications and related computer fields, which facilitates partners from all walks of life in Upskill. The courses are designed to offer practical and real skills that are directly applicable to the infoscuriating needs of Walmart.
We host our annual Sparkcon (formerly known as SP4RKCON) which coordinates talks and questions and answers with renowned professionals to share the wisdom and proven strategies. This event also explores the latest trends, techniques, technologies and cybersecurity threats while offering participants opportunities to connect and build valuable relationships to continue their careers.
VB: reflecting on your experiences in development of the IA element, what critical cybersecurity or architectural lessons emerged which will guide your future decisions at the moment and to what extent the centralization of emerging AI technologies?
Geisler: This is an essential question, because our architectural choices will today define our risk posture for the years to come. By reflecting on our experience in the development of a centralized AI platform, two major lessons have emerged which now guides our strategy.
First, we have learned that centralization is a powerful catalyst for “speed with governance”. By creating a single paved road for the development of AI, we considerably reduce the complexity of our data scientists. More importantly, from the point of view of security, it gives us a unified control plan. We can integrate security from the start, ensure the consistency of how the data is managed, the models are verified and the outputs are monitored. It allows innovation to occur quickly, in a setting in which we trust.
Second, it allows a concentrated “defense and expertise”. The AI threat landscape is evolving at an incredible pace. Instead of disseminating our limited AI security talents through dozens of disparate projects, centralized architecture allows us to concentrate our best people and our most robust controls at the most critical point. We can implement and refine sophisticated defenses such as context access controls, advanced surveillance and prevention of data exfiltration, and that this protection instantly covers our use cases.
https://venturebeat.com/wp-content/uploads/2025/08/hero-image-for-walmart-CISO-interview.jpg?w=693?w=1200&strip=all