Intelligent CISO Issue 95 | Page 16

COVER story

Security is now integral to business operations and customer trust, not just a back office IT issue.
Examples include Mirai-like botnets augmented with Generative AI for operational security. Adversarial Machine Learning will target defensive models by injecting poisoned data to create blind spots in anomaly detection. Gartner predicts that by 2026, 30 % of enterprises will face AI-specific attacks, up from single digits today.
Defenders will mature AI from augmentation to orchestration. This involves integrating generative AI co-pilots into Security Orchestration, Automation, and Response platforms for real-time hypothesis testing. User and Entity Behaviour Analytics enhanced with explainable AI will reduce false positives. Tools like automated purple-teaming under the MITRE ENGAGE framework will simulate adversary AI tactics.
Challenges include model drift and ethical risks. Mitigations require robust governance per NIST AI Risk Management Framework 1.0, including red-teaming and bias audits. Mid-sized firms lag. Verizon DBIR 2025 notes only about 35 % leverage advanced Machine Learning for threat hunting. This gap presents a strategic opportunity. Ultimately, AI defence must emphasise resilience over parity through continuous validation, human-AI hybrid loops, and adversarial robustness testing to counter the asymmetric advantage attackers gain from lowbarrier AI tools.
Do you think deepfakes and AIgenerated content will become one of the biggest cybersecurity challenges in 2026?
Oh, 100 %. Deepfakes and synthetic media represent a profound escalation in 2026. They erode trust in digital evidence and enable hyper-targeted social engineering. Multimodal models support real-time voice cloning combined with video synthesis. These capabilities will facilitate executive impersonation at scale and evolve business email compromise into‘ CEO video calls’ demanding urgent transfers.
Notable precedents include the 2024 Hong Kong deepfake videoconference scam that caused a US $ 25 million loss and rising incidents tracked by the FBI’ s IC3, with over 300 % increase in synthetic media complaints from 2023 to 2025. By 2026, ENISA forecasts deepfakes will feature in 20 % of fraud attempts.
Technical challenges stem from diffusion model advancements that lower creation barriers. Mitigations demand layered controls. These include content authenticity standards like C2PA from the Coalition for Content Provenance and
Authenticity, biometric liveness detection per ISO / IEC 30107-3, out-of-band verification protocols, and AI-based detectors trained on adversarial examples. Organisations should enforce zero-trust communications policies. Never act on material requests via audio or video alone. Integrate provenance checking into endpoint detection tools. Without these measures, deepfakes risk amplifying disinformation and extortion, particularly in regulated sectors.
How can organisations prepare for the growing sophistication of phishing, ransomware and identitybased attacks?
For business leaders, especially in financial services, 2026 brings new urgency to treat cyber and fraud risk as a core business issue. Security is now integral to business operations and customer trust, not just a back office IT issue. With threats mounting and regulators raising the bar, companies must double down on defences across the board. That means embracing strategies like‘ Zero Trust’ identity security, deploying AI driven threat detection, tightening incident response plans and nurturing a vigilant security culture.
What cybersecurity strategies or frameworks do you believe will be most critical for financial institutions in 2026?
Business leaders face the challenge of protecting their organisations and customers amid evolving threats. Cybersecurity and fraud risk management are not just IT issues, but strategic business imperatives.‘ Zero Trust’ identity security is a critical strategy that prevents attackers from accessing sensitive information even if they manage to steal credentials or penetrate the network. It centres around doubling down on Identity and Access Management and enforcing strong authentication for all users.
Embracing AI as a defence strategy is also critical in keeping up with the rate at which threat actors evolve. Implementing an incident response plan and practising it regularly will ensure that when the inevitable does occur, it won’ t permanently cripple the business. It’ s important to remember that fraud management needs investment and innovation, such as creating a cross-functional fraud task force because regulators may enforce broader reimbursement for scam victims. Which brings me to my next tip: keep a pulse on compliance and regulatory changes and align your security improvements with the direction regulators are pushing.
16 WWW. INTELLIGENTCISO. COM