AI Is No Substitute For Cyber Experts

Technology has evolved significantly over the past two years, notably due to breakthroughs in Artificial Intelligence (AI). Around 51 percent of businesses now use it for cyber security and fraud management that is because it can catch a potential breach before it causes trouble. Furthermore, AI is now embedded in nearly everything we do as AI systems increasingly control our environment through IoT devices. 

The question of whether AI can replace human expertise in cyber security is complex and multifaceted. While AI brings significant advances in processing speed, pattern recognition, and automation, human intuition, experience, and ethical judgement remain crucial. While it’s true that AI has revolutionised the cyber security landscape, the notion of it completely replacing cyber security jobs is improbable. 

Instead of replacing these roles, AI is a powerful tool that complements and enhances the capabilities of cyber security professionals. Indeed, the current consensus in the cyber security sector is that AI is not a replacement for human expertise, but rather a powerful tool that enhances human capabilities.

AI Connections

IoT devices connect our physical environments to the digital world, and more than 15 billion such devices are now connected worldwide, and that number will probably double by 2030. We are also interacting ever more naturally with AI through chatbots.

As with any emerging technology, it started small: summarising emails and writing limited responses, arguing with customer service chatbots for service changes and refunds, and asking bots for travel recommendations. However, soon AI will extend to every aspect of our work and homes. As the technology advances, its ability to predict and protect against new cyber threats will be vital for safeguarding and maintaining trust in our interconnected world.

AI also promises to improve communication and training within the cyber industry, simplifying complex technical concepts and making them more accessible to a wider audience.

Risk Factors

AI systems will inevitably become targets for malicious actors. This is especially relevant to the next generation of systems, which have been shown to act in unexpected ways, such as exposing private and sensitive data and information. AI-driven security solutions also risk producing many false alarms, leading to unnecessary alerts that burden information security personnel or overlook genuine threats.

As AI evolves, it can potentially eliminate human technical expertise in cybersecurity. Yet balancing AI-driven automation and human oversight is crucial, an essential part of any robust cyber operation.

The next significant boost in the AI revolution will happen when these systems, which are relatively isolated, group together in a larger intelligence: a vast network of power generation and consumption with each building just a node, like an ant colony or a human army.

Future industrial-control systems will include traditional factory robots and AI systems to schedule their operation. They will automatically order supplies and coordinate final product shipping. They will call on humans to repair individual subsystems or do things that are too specialised for robots when needed.

But our newest robots will be very different from previous models. Their sensors and actuators will be distributed in the environment, and their processing will be dispersed. They’ll be a network that become robots only in the aggregate.This has the potential to overturn conventional cyber security wisdom  If massive, decentralised AIs run everything, then who controls those AIs matters a lot.

It’s as if all the executive assistants or lawyers in an industry worked for the same agency; an AI that is both trusted and trustworthy will become a critical requirement.

This future requires us to see ourselves less as individuals and more as parts of larger systems. It’s AI as nature, as Gaia—everything is one system. It’s a future more aligned with the Buddhist philosophy of interconnectedness than Western ideas of individuality. (It also aligns with science-fiction dystopias, like Skynet from the Terminator movies.)

It will require rethinking many of our assumptions about governance and the economy. That won’t happen soon, but in 2024, we will likely see the first steps along that path. That’s why the European Union’s passing of the Artificial Intelligence Act in March of this year couldn’t have come at a better time. This legislation bans high-risk AI applications, such as certain biometric and facial recognition systems, social scoring mechanisms, and AI designed for manipulation or exploitation. It imposes strict rules on high-risk AI systems in critical domains, such as infrastructure, education, and employment, requiring risk assessment, transparency, and human oversight.

Despite criticism from the industry for potentially hampering innovation and competitiveness, the phased implementation aims to balance regulation with practicality. As innovation continues to propel the evolution of AI, many countries will remain significant contributors. But this evolution must be informed by policymakers and lawmakers who truly understand the potential benefits, but also the very considerable risks.

Conclusion

AI will not replace cyber security experts but will instead transform the industry by automating certain tasks and enhancing the capabilities of human professionals.Cyber security will always require a human touch, particularly for tasks involving complex problem-solving, ethical considerations, and strategic decision-making.

The role of cyber security experts will evolve, focusing more on overseeing AI systems, interpreting their findings, and addressing the more nuanced aspects of security.

The Star     |     Mega     |     LinkedIn     |     Global Cyber Security Network     |     CCS Learning Academy     |     Tech Radar

Image: Planet Volumes

You Might Also Read: 

GenAI & Cybersecurity: The New Frontier Of Digital Risk:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« There Are Ways You Can Detect A Deepfake
Truth & Lies About US Hacked Voter Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.