• Industry News
  • CXO Spotlight
  • AI
  • Enterprise Security

 Back to New Tab

How a Senior Telecom Engineer Spots Security Risks Hidden in 'Patchwork' IT

Island News Desk
October 15, 2025
Enterprise Security

Catharina Cerny, Senior Engineer at Verizon Enterprise Solutions, explains why existing security practices may not withstand future AI threats.

Credit: Outlever

Everybody's making a tiny patch here, a tiny patch there. But nobody really has the whole picture. Then, when gaps get overlooked or forgotten, projects fail. All due to a simple lack of communication.

*The views and opinions expressed by Catharina Cerny are her own and do not necessarily represent those of her former or current employers.

Enterprises stuck on AI may be caught in a web of their own making. Having created a patchwork of tiny IT fixes scattered across organizational silos, most face massive blind spots today. Now, some experts say the future of security and business resilience depends on an enterprise architecture that can untangle the complexity of systems and processes for a panoramic view. The challenge is especially acute in telecommunications, where evolving threat profiles are forcing providers to reevaluate their visibility into cybersecurity risk.

For a practitioner's perspective on the problem, we spoke with Catharina Cerny, Senior Engineer in Global Advanced Technology Support at Verizon Enterprise Solutions. With over 20 years of experience in network engineering, cybersecurity, and cloud solutions, Cerny's expertise blends a unique combination of deep engineering knowledge and modern threat analysis.

  • A patchwork anatomy: When businesses operate in silos, they create a 'patchwork' of solutions where no single person or team has a holistic view, Cerny explains. The result is a level of fragmentation she describes as an exponentially growing security nightmare. "Everybody's making a tiny patch here, a tiny patch there. But nobody really has the whole picture. Then, when gaps get overlooked or forgotten, projects fail. All due to a simple lack of communication."

According to the EY 2024 Telco of Tomorrow, senior telecom executives rank 'poor internal collaboration' as the second-biggest barrier to transformation, surpassed only by a lack of budget. But the patchwork approach also creates a dangerous false sense of security, Cerny says. Existing procedures might feel resilient, when, in reality, they're often an inadequate defense against the new generation of AI-driven threats. The vulnerability is especially critical in Cerny's industry, where 57% of telecom companies are concerned about the impact of security attacks.

  • The 20% that kills: Most systems can handle most incidents right now, Cerny continues. But soon, the exceptions will be catastrophic. "Most big companies aren't very flexible. They have their procedures, and in 80% of all cases, they get the job done. But in the future, they'll be lost. That 20% is what will kill them."

  • A trust barrier: Process is part of the problem, but the core issue remains a human one. More specifically, Cerny identifies the lack of communication as a symptom of a much deeper cultural deficit preventing critical information sharing across teams. The real problem is a trust issue, she says.

As one solution, Cerny proposes creating a task force to foster the very trust and communication that's missing. As AI-driven systems dissolve traditional organizational boundaries, enterprises must design new structures to eliminate the blind spots, she explains.

  • The seeds of change: Start by creating a dedicated, cross-functional team with members from all major departments (IT, security, HR, marketing, etc.), Cerny says. "Include people from every silo to exchange knowledge based on their different perspectives, backgrounds, and histories. Then, split their time 50/50 between the task force and their original teams to plant the seeds of change."

However, even the best task force is doomed without empowered leadership, Cerny cautions. Too often, CISOs are handed immense responsibility only to be sidelined in guidance-only roles. Without the direct authority to enact real change, most tech leaders face an impossible task, she explains.

  • A security checkbox: The power vacuum leads to performative 'checkbox security,' according to Cerny. But, in many cases, the illusion of safety is precisely what leaves the organization exposed. As an example, she describes disengaged security training. "It's not enough to check a box and say, 'Okay, everybody has security training, so we're fine.' No, that's by far not enough."

Already, the financial consequences are becoming more tangible. For example, Cerny explains how the threat of insurance agencies refusing to cover breaches due to negligence can be a powerful motivator for management to respond with more urgency. Nevertheless, a top-down approach will be essential for transformation, she concludes.

To help build the bridges currently missing, Cerny offers a final piece of advice for leaders: real change can start small. "Begin by appointing one person who is open, communicative, and can see other perspectives on each siloed team. Working together, they can lay the groundwork from the bottom up for cultural change on a larger scale."

Related content

Agentic AI Browsers Shift the Security Focus to Cultural Vulnerabilities

Joseph Sack, CEO of Smart Tech Solution LLC, explains why the primary security risk for agentic AI browsers is human behavior and how defensive AI tools can help.

Agentic AI Browsers Are Rewriting the Rules of Information Discovery and Trust

Firas Jarboui, Head of Machine Learning at Gorgias, explains how to secure Agentic AI browsers by gating actions and segregating context from workflows.

AI Browsers Need Real Oversight to Earn Enterprise Trust

Mikhail Vasilyev, a Principal Software Development Engineer at Workday, explains why AI browsers need strict visibility, containment, and auditability before enterprise use.

You might also like

See all →
AI Browsers Need Real Oversight to Earn Enterprise Trust
Island's Solutions Engineering Director on Overcoming Resistance to Public Sector Modernization
AI and the Evolving Face of Social Engineering: A Call for Smarter, Connected Defense
Powered by Island.
© ISLAND, 2025. All rights reserved