Intelligent CISO Issue 90 | Page 58

BUSINESS surveillance

More code doesn’ t mean better code; it means more complexity, more risk and a larger attack surface.
But the risk isn’ t just in flawed code, it’ s also in the tools themselves. CISOs are often unaware of which AI tools development teams are using, many of which operate in the cloud, retain your data and may even train on your code. Shadow AI is a security liability. Without visibility, you can’ t assess exposure. And without robust systems in place for formally assessing the risk posed by each new tool, your IP is never safe.
More code doesn’ t mean better code; it means more complexity, more risk and a larger attack surface. Increasing rates of code generation mean increasing rates of vulnerabilities and like a collapsing house of cards, one flawed function can cascade through your network, triggering failures across services. Therefore, the largest risk faced by CISO lies in how easily that code is accepted without proper scrutiny.
Developers, especially junior ones, tend to trust AI code because it looks clean and complete. But clean is not the same as correct and readability is not security. Developer-written code – with its obvious, messy human errors – tends to be reviewed, tested and audited to a high standard precisely because it doesn’ t look perfect on the surface. With AIgenerated code, teams unconsciously skip checks, bypass controls and deploy code without thorough scrutiny. This is backwards: AI-generated code must be held to the same standard, if not higher. And it’ s not enough to simply direct teams to pay more attention: these risks must be addressed at a systemic level by modernising your CI / CD infrastructure and security workflows to match the realities of AI-assisted development.
How CISOs can rise to the challenge
CISOs must build pipelines that catch risks early, enforce policies that limit exposure, and train teams to work securely with AI.
Modern CI / CD platforms must be implemented to detect issues before they reach production. A strong DevOps foundation will map all existing workflows and set a formalised development process, bringing all code generation and integration into one system. Once this foundation is laid, CISOs should ensure that security testing is conducted specifically
58 WWW. INTELLIGENTCISO. COM