123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

Cybersecurity Teams Largely Left Out Of Ai Policy Development, Isaca Survey Finds

Profile Picture
By Author: Madhulina
Total Articles: 473
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Only 27 percent of cybersecurity professionals or teams in India are involved in the development of policy governing the use of AI technology in their enterprise, and half (50 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology.

In response to new questions asked by the annual study, sponsored by Adobe—which showcases the feedback of more than 1,800 global cybersecurity professionals on topics related to the cybersecurity workforce and threat landscape—security teams in India noted they are primarily using AI for:

- Endpoint security (31 percent)
- Automating threat detection/response (29 percent)
- Automating routine security tasks (27 percent)
- Fraud detection (17 percent)

“In light of cybersecurity staffing issues and increased stress among professionals in the face of a complex threat landscape, AI’s potential to automate and streamline certain tasks and lighten workloads is certainly ...
... worth exploring,” says Jon Brandt, ISACA Director, Professional Practices and Innovation. “But cybersecurity leaders cannot singularly focus on AI’s role in security operations. It is imperative that the security function be involved in the development, onboarding and implementation of any AI solution within their enterprise – include existing products that later receive AI capabilities.”

“AI is promising for enhancing cybersecurity operations, but for the benefits to be fully realized, cybersecurity teams must be integrated in the AI governance process. The fact that only 27 percent of these teams in India are currently involved in AI policy-making is a missed opportunity to ensure that AI is implemented securely and responsibly,” says RV Raghu, director, Versatilist Consulting India Pvt Ltd, and ISACA India Ambassador. “There is an urgent need for organizations to rethink how they integrate cybersecurity professionals in AI decision-making. The strategic importance of collaboration between AI and cybersecurity experts must not be overlooked by organizations.”

Exploring the Latest AI Developments

In addition to the 2024 State of Cybersecurity survey report findings on AI, ISACA has been developing AI resources to help cybersecurity and other digital trust professionals navigate this transformational technology:

- EU AI Act white paper: Enterprises need to be aware of the timeline and action items involved with the EU AI Act, which puts requirements in place for certain AI systems used in the European Union and bans certain AI uses—most of which will apply beginning 2 August 2026. ISACA’s new white paper, Understanding the EU AI Act: Requirements and Next Steps, recommends some key steps, including instituting audits and traceability, adapting existing cybersecurity and privacy policies and programs, and designating an AI lead who can be tasked with tracking AI tools in use and the enterprise’s broader approach to AI.

- Authentication in the deepfake era: Cybersecurity professionals should be aware of both the advantages and risks of AI-driven adaptive authentication, says new ISACA resource, Examining Authentication in the Deepfake Era. While AI can enhance security by being used in adaptive authentication systems that adapt to each user’s behavior, making it harder for attackers to access, AI systems can also be manipulated through adversarial attacks, are susceptible to bias in AI algorithms, and can come with ethical and privacy concerns. Other developments, including research into integrating AI with quantum computing that could have implications for cybersecurity authentication, should be monitored, according to the paper.

- AI policy considerations: Organizations adopting a generative AI policy can ask themselves a set of key questions to ensure they are covering their bases, according to ISACA’s Considerations for Implementing a Generative Artificial Intelligence Policy—including “Who is impacted by the policy scope?”, “What does good behavior look like, and what are the acceptable terms of use?” and “How will your organization ensure legal and compliance requirements are met?”

Advancing AI Knowledge and Skills

ISACA also has added to its education and credentialing options to help the professional community keep pace with the changing AI and cybersecurity landscape:

- Machine Learning: Neural Networks, Deep Learning, Large Language Models— ISACA’s latest on-demand AI course, which joins the recent Machine Learning for Business Enablement course, as well as others on topics such as AI essentials, governance, ethics and audit, can be accessed through ISACA’s online portal at the learner’s convenience and offers continuing professional education (CPE) credits. The courses are available at www.isaca.org/ai.

- Certified Cybersecurity Operations Analyst— As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will become more critical in protecting digital ecosystems. ISACA’s upcoming Certified Cybersecurity Operations Analyst certification, launching in Q1 2025, focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents.

A complimentary copy of ISACA’s 2024 State of Cybersecurity survey report can be accessed at www.isaca.org/campaigns/cyber-month. For more cybersecurity resources from ISACA, visit www.isaca.org/cybersecurity.

ISACA AI resources and courses can be found at www.isaca.org/ai.

Total Views: 27Word Count: 788See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. The Benefits Of Outsourcing To Architectural Rendering Companies
Author: Vizent

2. Custom Gpt Development: A Reverse Engineering Approach To Success
Author: Sonu Kumar

3. Best Drone Camera Price In Dubai
Author: Rohit

4. Upgrade Your Charging Game: Shield's 200w & 165w Gan Chargers Now Available On Flipkart & Amazon
Author: Tiitan

5. Call Planning In Pharma: Strategies For Boosting Sales Success
Author: Jesvira

6. Why Ios App Development Services Are Essential For Your Business
Author: Perfectiongeeks

7. Enterprise Web Applications Drive Innovation In Mobile Application Development
Author: Khurath

8. Reducerea Cheltuielilor și Creșterea Performanței Prin Închirierea Unui Copiator Color
Author: CopyService Total

9. Secure Your Business With Microsoft 365 Services By Entrust Network
Author: Entrust Network Services

10. The Role Of Architectural 3d Modeling In Virtual Reality Applications
Author: Vizent

11. The Role Of Erp Software In Modernizing Colleges, Institutes, And Universities Operations
Author: Libsys Ltd

12. Unlock New Opportunities At The Triple Play Realtor Convention & Trade Expo 2024
Author: Andy Kowalski

13. Why 3d Product Rendering Services Are Essential For High-end Furniture Brands
Author: Vizent

14. Unlock The Full Potential Of Your Tractor With The New Holland Tn55, Tn65, Tn70, Tn75 Tractor Shop Service Repair Manual Pdf
Author: Heavy Equipment Manual

15. Call Answering Services For Small Businesses: A Cost-effective Solution
Author: Eliza Garran

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: