AI Is No Substitute For Cyber Experts

Technology has evolved significantly over the past two years, notably due to breakthroughs in Artificial Intelligence (AI). Around 51 percent of businesses now use it for cyber security and fraud management that is because it can catch a potential breach before it causes trouble. Furthermore, AI is now embedded in nearly everything we do as AI systems increasingly control our environment through IoT devices. 

The question of whether AI can replace human expertise in cyber security is complex and multifaceted. While AI brings significant advances in processing speed, pattern recognition, and automation, human intuition, experience, and ethical judgement remain crucial. While it’s true that AI has revolutionised the cyber security landscape, the notion of it completely replacing cyber security jobs is improbable. 

Instead of replacing these roles, AI is a powerful tool that complements and enhances the capabilities of cyber security professionals. Indeed, the current consensus in the cyber security sector is that AI is not a replacement for human expertise, but rather a powerful tool that enhances human capabilities.

AI Connections

IoT devices connect our physical environments to the digital world, and more than 15 billion such devices are now connected worldwide, and that number will probably double by 2030. We are also interacting ever more naturally with AI through chatbots.

As with any emerging technology, it started small: summarising emails and writing limited responses, arguing with customer service chatbots for service changes and refunds, and asking bots for travel recommendations. However, soon AI will extend to every aspect of our work and homes. As the technology advances, its ability to predict and protect against new cyber threats will be vital for safeguarding and maintaining trust in our interconnected world.

AI also promises to improve communication and training within the cyber industry, simplifying complex technical concepts and making them more accessible to a wider audience.

Risk Factors

AI systems will inevitably become targets for malicious actors. This is especially relevant to the next generation of systems, which have been shown to act in unexpected ways, such as exposing private and sensitive data and information. AI-driven security solutions also risk producing many false alarms, leading to unnecessary alerts that burden information security personnel or overlook genuine threats.

As AI evolves, it can potentially eliminate human technical expertise in cybersecurity. Yet balancing AI-driven automation and human oversight is crucial, an essential part of any robust cyber operation.

The next significant boost in the AI revolution will happen when these systems, which are relatively isolated, group together in a larger intelligence: a vast network of power generation and consumption with each building just a node, like an ant colony or a human army.

Future industrial-control systems will include traditional factory robots and AI systems to schedule their operation. They will automatically order supplies and coordinate final product shipping. They will call on humans to repair individual subsystems or do things that are too specialised for robots when needed.

But our newest robots will be very different from previous models. Their sensors and actuators will be distributed in the environment, and their processing will be dispersed. They’ll be a network that become robots only in the aggregate.This has the potential to overturn conventional cyber security wisdom  If massive, decentralised AIs run everything, then who controls those AIs matters a lot.

It’s as if all the executive assistants or lawyers in an industry worked for the same agency; an AI that is both trusted and trustworthy will become a critical requirement.

This future requires us to see ourselves less as individuals and more as parts of larger systems. It’s AI as nature, as Gaia—everything is one system. It’s a future more aligned with the Buddhist philosophy of interconnectedness than Western ideas of individuality. (It also aligns with science-fiction dystopias, like Skynet from the Terminator movies.)

It will require rethinking many of our assumptions about governance and the economy. That won’t happen soon, but in 2024, we will likely see the first steps along that path. That’s why the European Union’s passing of the Artificial Intelligence Act in March of this year couldn’t have come at a better time. This legislation bans high-risk AI applications, such as certain biometric and facial recognition systems, social scoring mechanisms, and AI designed for manipulation or exploitation. It imposes strict rules on high-risk AI systems in critical domains, such as infrastructure, education, and employment, requiring risk assessment, transparency, and human oversight.

Despite criticism from the industry for potentially hampering innovation and competitiveness, the phased implementation aims to balance regulation with practicality. As innovation continues to propel the evolution of AI, many countries will remain significant contributors. But this evolution must be informed by policymakers and lawmakers who truly understand the potential benefits, but also the very considerable risks.

Conclusion

AI will not replace cyber security experts but will instead transform the industry by automating certain tasks and enhancing the capabilities of human professionals.Cyber security will always require a human touch, particularly for tasks involving complex problem-solving, ethical considerations, and strategic decision-making.

The role of cyber security experts will evolve, focusing more on overseeing AI systems, interpreting their findings, and addressing the more nuanced aspects of security.

The Star     |     Mega     |     LinkedIn     |     Global Cyber Security Network     |     CCS Learning Academy     |     Tech Radar

Image: Planet Volumes

You Might Also Read: 

GenAI & Cybersecurity: The New Frontier Of Digital Risk:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« There Are Ways You Can Detect A Deepfake
Truth & Lies About US Hacked Voter Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.