AI Will Soon Replace Cyber Security Staff

Artificial Intelligence (AI) is becoming normal in today's electronically connected world. Combining the latest powerful software with top-of-the-range hardware, AI tools are being used to transform many areas of everyday life, from healthcare to traffic problems.  Running on huge amounts of data and  detailed algorithms, AI systems can perform mammoth computing tasks faster and more efficiently than humans, helping making big strides in research and development.  Now, a survey has revealed the widespread conviction that  cyber security jobs will eventually be entirely automated, operating without human intervention. 

Based on  interviews with 500 UK IT decision-makers, the leading security firm Trend Micro has found that more than third  (41%) believe that AI will replace their role by 2030.

AI's effect on many types of work will prove to be disruptive, projecting a future vision in which robots take jobs from human workers. Alternatively, there is a vision that automation can  create more jobs than it eliminates by providing new tools to exploit as yet unimagined business opportunities.

  • 32% of respondents said that they believed that technology would eventually automate all cyber security jobs.
  •  Only 9% of the survey respondents said they were confident that AI would “definitely” not replace their jobs within the next ten years.
  •  45% of IT bosses were planning to invest in cyber security  training and education - a crucial development  if individuals that are negatively impacted by AI can be re-deployed in other roles.

There are a range of concerns about the impact of  AI, from making many forms of employment for certain professions  obsolete, to the existential  threat that a super intelligent, self-learning machine could pose to humanity.  However, AI can be designed to empower people to share their skills and knowledge and the scope of human intelligence will always exceed even the most powerful AI.

For this reason, it’s important to remain focused on using this powerful technology to support humans, not replace them. While certain industries will need to adapt to AI being used for many tasks, this will remain under the direction of humans.

The risk in coming years is that businesses will attempt to use AI negatively, instead of reinforcing human knowledge and skills. If businesses use AI to undermine their staff and make them feel vulnerable, like using it solely to monitor employee performance, then trust will evaporate. When planning how to best deploy and develop AI decision makers should remember that it’s much harder to regain after it’s been lost than it is to build and maintain it. 

Trend Micro:    TechRadar:        Synet Solutions:      Techradar:      Wired

You Might Also Read: 

E-Businesses That Don’t Require Employees:

 

« Take Your Network Security One Step Further
The Cyber Security Top Ten Power List »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

HexaTrust

HexaTrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.