unauthorised access easier . Organisations will face an escalating risk as attackers exploit these expanding data environments to achieve malicious goals .
Despite the best efforts of companies like OpenAI , Google and Microsoft to implement robust security protocols , cybercriminals now have powerful tools at their disposal , including AI-driven virtual assistants that can streamline and amplify their attacks . As data volumes continue to surge and become more accessible , the appeal and ease of targeting sensitive information will grow .
This convergence of advanced attack tools and abundant data will make it increasingly difficult for organisations to stay ahead of evolving cyber threats .
AI co-pilots drive re-writing of cybersecurity job roles
Palo Alto Networks released its predictions for the cybersecurity industry in EMEA , leading with a call for cyber teams to get a quantum resistant roadmap in place to future-proof their organisations from this growing threat , and opportunity .
Stringent measurement of cyber security efforts become the norm as AI ’ s impact on cyber-attacks deepens . Security professionals should be proactive in establishing for themselves and their teams specific metrics to track against , laddering up to specific key performance indicators , KPIs .
Rise of AI co-pilots forces the re-writing of cybersecurity job descriptions . With the rising popularity and sophistication of AI-enabled security co-pilots , from helpful assistants to fully autonomous teammates ,
Haider Pasha , Chief Security Officer , Palo Alto Networks , EMEA and LATAM the human job description for every cybersecurity role will need to be re-written in the next year .
Cyber professionals shoot for the double wins of reducing cost and carbon footprint . Organisations must adopt greener practices to minimise the environmental impact of their digital infrastructure – from embracing consolidation to optimising AI models for energy efficiency .
Cyber teams pushed to prove impact over intent . With the increase in cybersecurity related regulations organisations will need to go beyond written , approved and implemented policies . A growing trend towards providing real-time evidence and assurance to regulators will become a norm . Quantum computing , quantum risk , and the technology necessary to protect ,
encrypt , and secure it will move into the mainstream technology discussion . While practical quantum attacks on widely used encryption methods are not yet feasible , they are likely to become possible within the next decade , and so the time for organisations to prepare is now . •
Cyber professionals will shoot for the double wins of reducing cost and carbon footprint .
48 www . intelligenttechchannels . com