AI Will Soon Replace Cyber Security Staff

Artificial Intelligence (AI) is becoming normal in today's electronically connected world. Combining the latest powerful software with top-of-the-range hardware, AI tools are being used to transform many areas of everyday life, from healthcare to traffic problems.  Running on huge amounts of data and  detailed algorithms, AI systems can perform mammoth computing tasks faster and more efficiently than humans, helping making big strides in research and development.  Now, a survey has revealed the widespread conviction that  cyber security jobs will eventually be entirely automated, operating without human intervention. 

Based on  interviews with 500 UK IT decision-makers, the leading security firm Trend Micro has found that more than third  (41%) believe that AI will replace their role by 2030.

AI's effect on many types of work will prove to be disruptive, projecting a future vision in which robots take jobs from human workers. Alternatively, there is a vision that automation can  create more jobs than it eliminates by providing new tools to exploit as yet unimagined business opportunities.

  • 32% of respondents said that they believed that technology would eventually automate all cyber security jobs.
  •  Only 9% of the survey respondents said they were confident that AI would “definitely” not replace their jobs within the next ten years.
  •  45% of IT bosses were planning to invest in cyber security  training and education - a crucial development  if individuals that are negatively impacted by AI can be re-deployed in other roles.

There are a range of concerns about the impact of  AI, from making many forms of employment for certain professions  obsolete, to the existential  threat that a super intelligent, self-learning machine could pose to humanity.  However, AI can be designed to empower people to share their skills and knowledge and the scope of human intelligence will always exceed even the most powerful AI.

For this reason, it’s important to remain focused on using this powerful technology to support humans, not replace them. While certain industries will need to adapt to AI being used for many tasks, this will remain under the direction of humans.

The risk in coming years is that businesses will attempt to use AI negatively, instead of reinforcing human knowledge and skills. If businesses use AI to undermine their staff and make them feel vulnerable, like using it solely to monitor employee performance, then trust will evaporate. When planning how to best deploy and develop AI decision makers should remember that it’s much harder to regain after it’s been lost than it is to build and maintain it. 

Trend Micro:    TechRadar:        Synet Solutions:      Techradar:      Wired

You Might Also Read: 

E-Businesses That Don’t Require Employees:

 

« Take Your Network Security One Step Further
The Cyber Security Top Ten Power List »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.