SECURITY BREACH? CALL 888.234.5990 EXT 9999

BLOG ARTICLE

What Every 2025 CISO Must Know About AI and Machine Learning

The job of a CISO is hard. Really hard. From the breadth and depth of risk we cover, to the fact that job gets harder every day as the bad guys get smarter, faster, and richer makes for a very challenging career.  

Enter Artificial Intelligence (AI) and Machine Learning (ML) and the powerful advanced computing capabilities they are bringing to the world of IT and cybersecurity. AI and ML are not just “buzzwords” anymore. These are now tools and weapons, and they ARE reshaping the cybersecurity landscape both to our advantage as well increasing our risks in ways never thought possible. The speed, accuracy, expanse, and adoption of these compute techniques is nothing short of unbelievable. Whether you are a small shop making widgets on a shoestring, or a massive enterprise with a global reach and profits are calculated in dollars per second – you will be touched by them, in many cases significantly touched. 

The bad news is AI and ML are already  presentingalready presenting us with threats and scenarios that move quicker, are more accurate, and are more lethal than anything we have ever seen before. The risk to our organizations gets higher by the moment as the AI/ML systems learn our data, our network flows, and system patterns at blinding speeds – and use generated information to build automated process that can exploit even from the tiniest or obscure vulnerabilities – and steal from us. Additionally, AI/ML processes are designed to fail fast and move on to the next opportunity without prejudice  

The good news is that we, CISOs, are gaining powerful AI/ML tools to counter-combat new threats. Systems can now analyze attack patterns by examining seas of information and quickly build enhanced detections. We also can accurately create and automate processes and build controls to not just counter AI-driven threats, but also give us capabilities to make our organizations more efficient.  

By embracing AI/ML, we can work towards remaining secure in an increasingly complex digital world. However, we must also stay vigilant and continuously adapt to the evolving threat landscape to be “faster than the slowest zebra”, otherwise bad actor AI/ML systems will exploit openings in our processes, shred our attack surfaces, and compromise our systems far faster and more effectively than ever before.  

AI/ML will change our landscape and the way we do our jobs. Period. Full stop. I predict that our CISO landscape will change more rapidly and more comprehensively than ever thought possible. Our everyday tools are already changing and embracing and learning to leverage AI/ML may very well be the difference between being “in the herd” verses being at the back of the pack.  

New AI/ML Capabilities:

Enhanced Threat Detection and Response:

AI and ML can provide enhanced threat detection by continuously monitoring network traffic and user behavior for anomalies at a incredible speeds and scale. Machine Learning models are now accurately establishing baseline behaviors and identifying deviations indicative of potential threats.  

Example, AI-powered systems can detect unusual login patterns or data transfers, hundreds of times faster than current systems enabling quicker responses to potential breaches.  

Automated Repetitive Tasks:

AI and ML can automate routine and repetitive tasks, freeing up CISOs and their teams to focus on more strategic initiatives. Tasks such as vulnerability scanning, patch management, and compliance reporting can be handled by AI, increasing efficiency and reducing human error. This shift will enable security teams to deploy resources more effectively and to address increasingly complex security challenges. 

Combatting AI-Driven Threats:

Malicious actors are leveraging AI to create sophisticated attacks, such as AI-driven phishing and autonomous hacking. These threats require CISOs to adopt advanced AI-based defenses to stay ahead. 

Real-World Examples
  • AI-Powered Botnets: AI can detect and neutralize botnets by analyzing traffic patterns and identifying malicious activities 
  • Generative AI for Phishing Detection: AI models can generate and detect phishing emails, improving the accuracy of email filtering systems 
  • Autonomous Threat Hunting: AI systems can autonomously hunt for vulnerabilities and potential threats within an organization’s network, providing real-time insights and recommendations. 

 New AI/ML New Challenges:

Data Privacy and Security:

AI and ML systems require vast amounts of data to function effectively. This data often includes sensitive information, raising concerns about data privacy and security. Ensuring that data is anonymized and protected from breaches is a critical challenge.  

Example, if an AI system used for threat detection is compromised, it could expose sensitive information and create new attack vectors 

Continuous Training and Adaptation:

Our AI and ML models need continuous training with up-to-date data to remain effective. Cyber threats are constantly evolving, and static models can quickly become obsolete. This requires ongoing efforts to update and retrain our models, which can be resource-intensive and complex. 

Example, a model trained on outdated data may fail to recognize new types of malwares, leaving systems vulnerable. 

Manipulation and Adversarial Attacks:

AI systems can be manipulated through adversarial attacks, where malicious actors input deceptive data to trick the system.  

Example, attackers can use techniques like data poisoning to corrupt business data, leading to incorrect calculations, predictions, and classifications.  

Lack of Transparency and Explainability:

AI and ML models, especially deep learning models, often operate as “black boxes,” making it difficult to understand how they arrive at specific decisions. This lack of transparency can be problematic us in cybersecurity, where understanding the rationale behind threat detection is crucial for effective response 

 Example, if an AI system flags a legitimate user as a threat without a clear explanation, it can lead to unnecessary disruptions and mistrust in the system. 

Ethical and Compliance Issues:

The use of AI in cybersecurity raises ethical and compliance issues. Ensuring that AI systems are used responsibly and comply with regulations is essential.  

Example, AI-driven surveillance tools must balance security needs with privacy rights, avoiding overreach and potential misuse. 

Real-World Attack Examples

AI-Powered Defense Systems
  • AI Washing: Some companies exaggerate their use of AI to attract customers and investors, a practice known as AI washing. This can lead to the adoption of subpar security solutions that do not deliver the promised benefits 
  • Adversarial Attacks: In 2020, researchers demonstrated how adversarial attacks could trick AI models into misclassifying malware as benign software, highlighting the vulnerability of AI systems to manipulation 
  • Data Privacy Breaches: In 2023, a major financial institution faced a data breach when its AI-powered fraud detection system was compromised, exposing sensitive customer data 

Conclusion - To survive, we MUST be "Faster Than the Slowest Zebra"

The adage “you only need to be faster than the slowest zebra” is particularly relevant in cybersecurity. It implies that organizations don’t need to be invulnerable; they just need to be more secure than their peers to avoid being targeted. In the context of AI and ML, this means that as CISOs we must understand and address an entirely new threat landscape while also continuously leveraging these technologies and capabilities to enhance and improve our security posture. By staying ahead of the curve and adopting the latest AI and ML technologies, we at the worst can make themselves a less attractive target for cybercriminals, and at the best – be able to combat new threats and provide new efficiencies. 

SHARE THIS

MEET THE AUTHOR

Rich Lilly

Field CTO, Security

Rich Lilly has been working in the IT Consulting space for 20+ years in various positions and roles, including Architect, Director of Pre-Sales, Cloud Evangelist, and Director of Security for Netrix, LLC. Rich brings extensive hands-on and practical knowledge to not only strategy for Microsoft-centric Security solutions, but also developing and operating Security Programs. In recent years, Rich has championed and built practices around Microsoft-centric security solutions such as Azure AD, Enterprise Mobility + Security, M365 Defender Suite and Microsoft Sentinel.

Let's get problem-solving