Go back

What It Really Takes to Unlock AI Adoption: Lessons from the Field

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

Industry Insights
May 21, 2026
4m read
4m read
4m listen
4m watch
4m watch
What It Really Takes to Unlock AI Adoption: Lessons from the FieldWhat It Really Takes to Unlock AI Adoption: Lessons from the Field
speakers
speakers
speakers
authors
Gian Gonzaga
participants
No items found.
share

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

AI adoption has moved fast — faster than most security teams, compliance frameworks, or vendor questionnaires have been able to keep up with. I recently presented a webinar with Ravi Nori, Head of Cybersecurity at Gopuff, and Max Pollard, Co-Founder and CEO of Cotool, to dig into the realities of integrating AI at scale: the productivity wins, the security trade-offs, and the hard-won lessons that don't make it into the press releases.

Here's what stood out.

The Gap Between Policy and Reality

One of the first things Ravi shared was something many security leaders quietly know but rarely admit out loud. His team had officially approved five AI tools, yet discovered over 100 in active use across the organization. He himself was caught using an unapproved tool during an internal scan.

This isn't unique to Gopuff. It's the nature of a fast-moving field where the productivity gains are real and immediate, and the guardrails are still being built. The lesson isn't to lock everything down, because that kills momentum. The lesson is that monitoring has to come before restriction. You can't govern what you don't understand, and you can't understand what you haven't mapped.

Ravi's framework is sequential and practical:

  1. Discover what's in your environment and who's using it
  2. Build alerting around behaviors you want to catch.
  3. Only then move toward prevention. Jumping straight to restriction without that foundation creates friction without security.

Data Privacy Is Harder Than It Looks

Both Max and Ravi emphasized that contractual guarantees around data retention are the beginning — not the end — of a privacy strategy.

Max described how Cotool negotiated zero-day data retention agreements with all major model providers before writing a line of product code. That's the right foundation, but Ravi illustrated exactly why it's insufficient on its own. When his team audited how their customer-facing chatbot was actually handling data, they found that a third-party agent provider's logs contained unredacted credit card numbers and personal information that customers had shared in frustration during order delays. The contract said the right things. The implementation didn't follow through.

The practical implication is trust but verify. Contracts establish intent, but technical audits establish reality. If an AI agent you don't control is processing sensitive customer data, you need to be watching what it actually does with that data, not just what its vendor promises.

Max also raised a point worth sitting with. The explosion of sub-processors and third-party model integrations means that even well-governed organizations now have data flowing through systems they have limited visibility into. Mapping that data lineage is increasingly difficult and increasingly important.

The Shadow AI Problem Is the New Shadow IT

Anyone who lived through the early cloud migration era will recognize this dynamic. Shadow IT was the phenomenon of employees using unapproved tools like Dropbox, Google Drive, or personal email to get work done faster. Security teams spent years playing whack-a-mole trying to contain it.

Shadow AI is the same pattern, accelerated. Employees are using personal accounts with AI tools, pasting code snippets containing secrets into consumer chatbots, and uploading internal documents for analysis because the enterprise-approved tool their company has given them doesn't have the feature they need.

Ravi explained that you can't just invest in more documentation and expect employees to read and internalize every policy. Most won't. The effective answer lies in automated controls that make the risky path harder and the compliant path easier. The goal is not to block everything, but to get enough visibility and implement selective enforcement to catch meaningful data exposure without grinding productivity to a halt.

Human-in-the-Loop Is a Systems Design Decision

Max made a sharp observation when discussing AI agents in security operations. He used the framing of determinism versus non-determinism. The power of modern AI agents is precisely their ability to reason across contexts and take action without being pre-scripted. But that same quality is what makes them dangerous if left fully autonomous.

The example he gave was instructive. A Cotool detection agent identified that a set of endpoints were making unusual API calls, traced them back to devices that had been stolen from a delivery truck, and was prepared to remotely wipe them. That's a legitimate, valuable action. But the same reasoning applied to a miscategorized host could take down a payment processing system and cause major business consequences.

Adding a human checkpoint to every action defeats the purpose. Instead, security teams must be intentional about which actions get a human gate. For most triage and investigation, let the agent run. For irreversible or high-blast-radius actions like network isolation, account termination, and system wipes, build in a mandatory human review. Teams need to think more about good systems design and less about caution for its own sake.

Transparency Is What Makes AI Decisions Acceptable

A theme that came up repeatedly was transparency as a practical tool for building internal and external trust, not just a compliance checkbox.

At Material, we've found that customers are far more willing to accept an AI-driven decision, even a wrong one, if they can see the reasoning behind it. A phishing email flagged incorrectly is frustrating. A phishing email flagged incorrectly with no explanation is infuriating. When we can show a customer that the system flagged a message because of a newly registered domain, a novel sender, and urgency language — even if we got it wrong — the conversation becomes constructive rather than adversarial.

Max described building this out for Cotool. They started with full agent trace logs (complete but overwhelming), then invested heavily in structured summaries that distill the key findings while keeping the full trace accessible for deeper investigation. Neither extreme worked alone. The right answer was layered explainability, providing a quick summary for everyday use plus a detailed audit trail for when something goes wrong.

The Risks People Overestimate (and Underestimate)

We unpacked a pointed question: what AI security risk do organizations overestimate, and what are they actually underestimating?

On overestimation, Max pushed back on the degree of anxiety around internal employees feeding sensitive data to public AI models. His argument was that if a major model provider wanted proprietary data, they have far more sophisticated ways of obtaining it than waiting for an employee to paste something into a chat window. The energy spent on enterprise-wide DLP for AI inputs might, in many cases, be better deployed elsewhere.

On underestimation, he pointed to prompt injection, and particularly the "lethal trifecta" of customer-facing agents that have access to private data, are exposed to untrusted internet content, and have the ability to exfiltrate information. When all three conditions are present simultaneously, it is, in his words, logically impossible to guarantee that injection attacks can't succeed. Ravi confirmed his team was already seeing sophisticated prompt injection attempts against Gopuff's customer chatbot at meaningful scale.

Ravi's point on the underestimation side was about institutional knowledge gaps. Many security teams are using AI every day without deeply understanding how it works. That gap makes it hard to ask the right questions, protect the right things, or evaluate vendor claims accurately. The recommendation was straightforward — security leaders need to invest in their own AI literacy, not delegate understanding to vendors.

The Upside Is Real, and It's Getting Bigger

After an hour of security risks and governance challenges, we made sure to end where the story actually begins, with the value.

Ravi described AI as a genuine game-changer for his security work. AI is enabling faster analyses, better triage of alerts, sanity-checking vendor remediation recommendations, and handling reporting tasks that used to consume hours. Max talked about operations that once took 20-30 minutes now taking seconds, with human review required only on a small fraction of outputs. Across both companies, the cumulative time savings translate to meaningful capacity in hours per week, per person, that’s now redirected toward higher-judgment work.

There's also a defensive imperative here that neither of them shied away from. As the cost of conducting attacks with AI approaches zero, the cost of defending without AI becomes existential. The organizations that build genuine AI fluency now — using it, understanding its failure modes, and designing workflows around its strengths — will have a meaningful advantage in the years ahead.

The risks are real. The governance work is hard. But sitting on the sidelines while competitors and adversaries move forward isn't a neutral choice.

‍

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

What It Really Takes to Unlock AI Adoption: Lessons from the Field

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

Gian Gonzaga
4
m read
Read post
Podcast

What It Really Takes to Unlock AI Adoption: Lessons from the Field

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

4
m listen
Listen to episode
Video

What It Really Takes to Unlock AI Adoption: Lessons from the Field

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

4
m watch
Watch video
Downloads

What It Really Takes to Unlock AI Adoption: Lessons from the Field

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

4
m listen
Watch video
Webinar

What It Really Takes to Unlock AI Adoption: Lessons from the Field

Security leaders from Material Security, Gopuff, and Cotool share hard-won lessons on AI adoption, data privacy, and building trust at scale.

4
m listen
Listen episode
blog post

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

Material Team
5
m read
Read post
Podcast

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Listen to episode
Video

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m watch
Watch video
Downloads

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Watch video
Webinar

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Listen episode
blog post

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

James Juran
7
m read
Read post
Podcast

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen to episode
Video

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m watch
Watch video
Downloads

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Watch video
Webinar

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen episode
blog post

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

Abhishek Agrawal
7
m read
Read post
Podcast

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen to episode
Video

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m watch
Watch video
Downloads

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Watch video
Webinar

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New