/
© 2026 RiffOn. All rights reserved.

Get your free personalized podcast brief

We scan new podcasts and send you the top 5 insights daily.

  1. Product Growth Podcast
  2. The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch
The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast · Sep 22, 2025

Okta's Jack Hirsch on AI cyber threats: Identity is the new perimeter. Learn to secure your company, build secure AI products, and protect yourself.

Adopt an "Assume Breach" Mindset; Billions of Credentials Are Already Stolen

The modern security paradigm must shift from solely protecting the "front door." With billions of credentials already compromised, companies must operate as if identities are breached. The focus should be on maintaining session security over time, not just authenticating at the point of access.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

Prototyping is Tempting, But Writing Specs Remains Crucial for Clarifying Thought

In an age of rapid AI prototyping, it's easy to jump to solutions without deeply understanding the problem. The act of writing a spec forces product managers to clarify their thinking and structure context. Writing is how PMs "refactor their thoughts" and avoid overfitting to a partially-baked solution.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

North Korean Operatives Are Using AI to Infiltrate Companies as Remote Employees

A sophisticated threat involves state-sponsored actors from the DPRK using AI interview tools and virtual backgrounds to pass hiring processes. They get hired, receive company laptops, and then operate as insider threats, creating a significant and often undetected security risk for organizations.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

Evernote Failed Because Its Single-Player Architecture Prevented a Multiplayer Pivot

Beyond a limited market and raising too much capital, a core reason for Evernote's decline was its foundational architecture. Built as a private, single-player tool, it was technically and conceptually unable to pivot to the collaborative, multiplayer experience that competitors like Notion later capitalized on.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

Use AI for Acceleration, Not Abdication, to Avoid Costly Product Errors

Product managers should leverage AI to get 80% of the way on tasks like competitive analysis, but must apply their own intellect for the final 20%. Fully abdicating responsibility to AI can lead to factual errors and hallucinations that, if used to build a product, result in costly rework and strategic missteps.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

Lock Your Credit Reports to Protect Your Physical Identity from Fraud

Your physical identity (Social Security number, etc.) is trivial to breach. The single most effective defense is to lock your credit reports with the major bureaus. This prevents fraudulent accounts from being opened in your name, as it blocks most verification checks, effectively freezing out attackers.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

The Real AI Security Threat is Companies Failing at Basics, Not Novel Attacks

While sophisticated AI attacks are emerging, the vast majority of breaches will continue to exploit poor security fundamentals. Companies that haven't mastered basics like rotating static credentials are far more vulnerable. Focusing on core identity hygiene is the best way to future-proof against any attack, AI-driven or not.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

AI Can Analyze an Entire API Surface to Exploit Vulnerabilities Across Siloed Teams

Unlike human attackers, AI can ingest a company's entire API surface to find and exploit combinations of access patterns that individual, siloed development teams would never notice. This makes it a powerful tool for discovering hidden security holes that arise from a lack of cross-team coordination.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago

Okta's "T-Shaped Identity" Strategy Goes Beyond Simple Sign-On

A robust identity strategy is "T-shaped." The horizontal bar represents the entire user lifecycle (pre-auth access, phishing-resistant auth, post-auth session security). The vertical bar represents deep integrations beyond SSO, including lifecycle management, risk signal sharing, and system-wide session termination.

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch thumbnail

The AI PM's Guide to Security - with Okta's VP of PM & AI, Jack Hirsch

Product Growth Podcast·6 months ago