Share
Facebook Facebook icon Twitter Twitter icon LinkedIn LinkedIn icon Email

Brain Circuits

How to win at digital ‘cops and robbers’

Published 12 November 2024 in Brain Circuits • 3 min read

Companies must continually upgrade their AI-driven security measures to counter increasingly sophisticated cybercrime attacks. Implementing the following measures will help you build a secure, future-facing digital environment for your organization. 

Fix the basics  

Before you start worrying about how to leverage AI, make sure you have a solid foundation of basic, up-to-date security controls and procedures in place. This includes the required use of multi-factor authentication (MFA), upgrades of software and systems to the latest vendor-supported versions, and rapid implementation of security patches.  

 

Develop hybrid models  

AI tools excel in rapidly processing vast amounts of data and detecting patterns but can miss the details or context of certain activities. Humans can bridge this gap with their ability to understand nuance, intuition, and context. The optimal defense mechanism is thus a harmonious fusion of AI and human expertise. In this hybrid model, AI systems manage vast datasets, rapid scans, and initial responses, while human experts oversee these processes, providing essential context, judgment, and decision-making.  

 

Engage in continuous training  

In the cyber realm, threats continuously evolve and adapt. To stay a step ahead, it’s not enough to deploy AI tools and then leave them. The tools need to grow and learn continuously. Regularly updating and training AI models with the latest threat intelligence is imperative. By exposing them to new attack patterns, strategies, and vulnerabilities, AI systems can be primed to recognize and counter emerging threats swiftly and effectively.  

 

Uphold ethical AI practices 

Cybersecurity isn’t just about building digital walls and alarms. It’s crucial to remember the ethical aspects of using data. You need to establish robust policies that prioritize user privacy, guaranteeing that your AI systems handle data with total confidentiality.   

 

Ensure transparency in operations  

Just as transparency is necessary for other key business processes, it is critical to the successful operation of the cybersecurity function, so make sure that users and stakeholders understand how the organization’s AI tools work and make decisions.  

 

Align AI operations with broader ethical considerations 

Aligning AI operations with broader ethical considerations ensures that companies don’t compromise on principles while pursuing security.  

 

Key takeaway 

As cyber threats become more sophisticated through AI, the tools you use to counteract them must also evolve. The good news is that AI is also shaping the future of cybersecurity, offering enhanced capabilities to strengthen company defense mechanisms. But it’s no longer enough to respond to threats as they occur: be proactive, get informed, and stay on the front foot. 

 

Authors

Michael Watkins - IMD Professor

Michael D. Watkins

Professor of Leadership and Organizational Change at IMD

Michael D Watkins is Professor of Leadership and Organizational Change at IMD, and author of The First 90 Days, Master Your Next Move, Predictable Surprises, and 12 other books on leadership and negotiation. His book, The Six Disciplines of Strategic Thinking, explores how executives can learn to think strategically and lead their organizations into the future. A Thinkers 50-ranked management influencer and recognized expert in his field, his work features in HBR Guides and HBR’s 10 Must Reads on leadership, teams, strategic initiatives, and new managers. Over the past 20 years, he has used his First 90 Days® methodology to help leaders make successful transitions, both in his teaching at IMD, INSEAD, and Harvard Business School, where he gained his PhD in decision sciences, as well as through his private consultancy practice Genesis Advisers. At IMD, he directs the First 90 Days open program for leaders taking on challenging new roles and co-directs the Transition to Business Leadership (TBL) executive program for future enterprise leaders, as well as the Program for Executive Development.

Ralf Weissbeck

Former Group Chief Information Officer and member of the Executive Committee at The Adecco Group.

Ralf Weissbeck is the former CIO of The Adecco Group. He co-led the recovery of the 2022 Akka Technologies ransomware attack. He also led the recovery of the 2017 Maersk ransomware attack that shut down 49,000 devices and 7000 servers and destroyed 1000 applications.

Related

Learn Brain Circuits

Join us for daily exercises focusing on issues from team building to developing an actionable sustainability plan to personal development. Go on - they only take five minutes.
 
Read more 

Explore Leadership

What makes a great leader? Do you need charisma? How do you inspire your team? Our experts offer actionable insights through first-person narratives, behind-the-scenes interviews and The Help Desk.
 
Read more

Join Membership

Log in here to join in the conversation with the I by IMD community. Your subscription grants you access to the quarterly magazine plus daily articles, videos, podcasts and learning exercises.
 
Sign up
X

Log in or register to enjoy the full experience

Explore first person business intelligence from top minds curated for a global executive audience