The Human Role in Cybersecurity: Adapting to AI’s Evolution

As artificial intelligence (AI) and machine learning (ML) continue to revolutionize the field of cybersecurity, it’s crucial to understand the evolving roles of humans and machines in this domain. While AI can handle many tasks with unprecedented speed and accuracy, there remains a vital space for human expertise. This article explores the division of responsibilities between humans and AI, highlighting what each is best suited for and how cybersecurity professionals can adapt to this changing landscape. It’s the first in a sort of “thinking out loud” articles looking at what I think is an inevitable future.

AI’s Strengths in Cybersecurity

AI and ML excel in tasks that require the rapid processing of large amounts of data, identifying patterns, and reacting in real-time to threats. These technologies are particularly effective in:

1. Threat Detection and Response: AI systems can monitor network traffic, analyze vast amounts of data, and recognize patterns that may indicate a cyber threat far faster than any human could. For example, AI can identify anomalies in behavior or detect new types of malware by recognizing subtle patterns that would be invisible to the human eye.

2. Automated Incident Response: In situations where speed is crucial, like when containing a ransomware attack, AI can automate responses to mitigate damage. Automated systems can isolate infected devices or block malicious traffic almost instantaneously, actions that might take a human operator minutes or even hours to execute.

3. Predictive Analytics: By analyzing historical data, AI can predict potential future attacks and help organizations to preemptively strengthen their defenses. This predictive capability is essential in a landscape where new threats emerge constantly, and staying ahead of adversaries is key.

The Speed of Adversaries and the Challenge for Humans

One of the most significant challenges in modern cybersecurity is the speed at which adversaries, often empowered by AI themselves, operate. Cybercriminals are leveraging AI to launch sophisticated attacks at a pace that is simply incompatible with human response times. For instance, AI-driven phishing campaigns can target millions of users simultaneously, adapting their strategies based on real-time data, making it nearly impossible for humans to keep up without assistance. A few resources:

As these threats become more advanced, the role of AI in defense becomes not just beneficial but necessary. While AI can manage and respond to these threats quickly, it still requires human oversight to make sure that responses are appropriate and ethical.

Human Strengths: What AI Can’t Replace

Despite AI’s capabilities, there are areas where human skills are (at least currently) irreplaceable:

1. Strategic Decision-Making: AI can provide data and even suggest actions, but humans are better at making complex decisions that consider context, ethics, and long-term consequences. For example, deciding how to respond to a sophisticated attack might require an understanding of the geopolitical implications that AI lacks.

2. Creativity and Problem-Solving: While AI excels at pattern recognition, it struggles with out-of-the-box thinking. Humans can devise creative solutions to new problems, such as developing innovative cybersecurity strategies or creating novel defenses that an AI might not be programmed to consider.

3. Understanding Human Behavior: Cybersecurity is not just about technology but also about people. Humans are better at understanding and anticipating how other humans behave, which is crucial in areas like social engineering defense and insider threat detection.

Note: The notion that there are things that AI can’t replace is an interesting topic, and something worthy of an entire article challenging whether these three examples are truly impossible for AI to dominate.

Shifting Focus: What Humans Can Do with Freed-Up Time

As AI takes over routine and time-consuming tasks, cybersecurity professionals have the opportunity to focus on more strategic and creative work. This shift is not unlike what has happened in other industries over time. For example:

Manufacturing: Automation and machinery took over repetitive tasks on the production line, allowing workers to move into roles that required more oversight, quality control, and innovation.

Agriculture: The introduction of industrial equipment reduced the need for manual labor, enabling farmers to focus on crop management, sustainability practices, and business expansion.

In cybersecurity, professionals can now dedicate more time to:

Developing Security Policies and Frameworks: With AI handling real-time threats, humans can focus on creating and refining security policies that address broader organizational goals and compliance requirements.

Conducting Advanced Threat Research: Freed from routine monitoring, security experts can delve into researching emerging threats, studying the latest attack vectors, and developing new defense techniques.

Training and Awareness: Human experts can invest more time in educating employees and users about security best practices, an area where human interaction is essential.


Adapting Training and Education for Entry-Level Cybersecurity Professionals

As AI takes on a more significant role in cybersecurity, it’s crucial to rethink how we train and educate entry-level cybersecurity professionals. The traditional curriculum, which often focuses on manual processes and basic technical tasks, must evolve to prepare new professionals for a world where AI is a critical component of the cybersecurity toolkit. While it’s still important to train cybersecurity professionals on the fundamentals, it’s worth revisiting the reality of the new co-pilot or AI collaboration model of day-to-day cyber work.

Traditional Curriculum vs. AI-Enhanced Curriculum

A typical entry-level cybersecurity curriculum includes courses on network security, incident response, ethical hacking, and cybersecurity fundamentals. For example, a program like the Certified Information Systems Security Professional (CISSP) or CompTIA Security+ certification includes topics like:

Network and Host-Based Security: Configuring and managing firewalls, intrusion detection systems, and antivirus software.

Incident Response: Identifying, analyzing, and mitigating cybersecurity incidents manually.

Ethical Hacking: Learning to use manual penetration testing tools to identify vulnerabilities.

While these skills are foundational, many of the tasks involved can now be performed more efficiently by AI. Therefore, the curriculum needs to pivot to ensure that entry-level professionals are not just equipped to work alongside AI but can leverage it effectively as a “cybersecurity co-pilot.” Again, this isn’t to suggest we ditch the basics and let people simply rely on AI without understanding the core concepts. Instead, there must be a balance.

Potential Curriculum Changes

Here’s how we can adapt the existing curriculum to incorporate AI:

1. AI-Driven Security Tools:

Current Curriculum: Manual use of firewalls, IDS, and antivirus software.

Updated Curriculum: Training on AI-driven security platforms like those from Palo Alto Networks, CrowdStrike’s Charlotte AI, or IBM’s AI-driven threat detection tools. Students should learn how to configure, monitor, and interpret the outputs of these AI tools, understanding how AI makes decisions and how to intervene when necessary.

2. AI-Augmented Incident Response:

Current Curriculum: Manual identification and response to security incidents.

Updated Curriculum: Focus on AI-based incident response automation. Students should be trained to work with AI systems that automatically detect, analyze, and respond to incidents. They should understand how to use these systems, how to review AI-driven decisions, and how to escalate or modify responses when human judgment is required.

3. AI in Ethical Hacking:

Current Curriculum: Learning manual penetration testing techniques.

Updated Curriculum: Introduction to AI-powered penetration testing tools that can automate the discovery of vulnerabilities. Students should be trained on how to interpret the results from these tools, validate findings, and understand where AI can fall short, requiring human intuition and creativity.

4. Understanding AI Ethics and Governance:

New Addition: Introduce courses that cover the ethics and governance of AI in cybersecurity. As AI systems make decisions that affect security, understanding the ethical implications of AI deployment and the biases that may be present in AI algorithms becomes critical.

5. Collaborative Problem Solving:

New Addition: Develop courses that emphasize collaboration between human and AI teams. This includes case studies where students must determine when to trust AI, when to intervene, and how to work in tandem with AI to solve complex security challenges.

Emphasizing Soft Skills and Strategic Thinking

As AI handles more routine and technical tasks, entry-level cybersecurity professionals should be encouraged to develop soft skills and strategic thinking. This includes:

Communication Skills: Explaining complex AI-driven decisions to non-technical stakeholders.

Strategic Planning: Understanding the broader implications of AI in security and how to align AI strategies with business objectives.

Continuous Learning: As AI evolves, professionals must stay updated on the latest technologies, tools, and ethical standards.


The pivot to a collaborative model between humans and AI in cybersecurity necessitates a corresponding shift in how we train the next generation of professionals. By updating curricula to emphasize AI tools, strategic thinking, and ethical considerations, we can ensure that entry-level professionals are well-prepared to thrive in a landscape where AI is a central player in cybersecurity defense. This approach not only equips them with the necessary technical skills but also empowers them to take on more strategic roles, driving innovation and enhancing the overall security posture of organizations.

Conclusion

In a world where AI is increasingly capable of handling many cybersecurity tasks, the role of the human evolves rather than diminishes. While AI excels at speed, pattern recognition, and automation, humans remain essential for strategic decision-making, creativity, and understanding human behavior. As AI takes over more routine tasks, cybersecurity professionals can focus on higher-level responsibilities that require human insight, ensuring that they continue to play a crucial role in protecting organizations from evolving cyber threats.

Note: This article was written in collaboration with ChatGPT and WordPress. I used ChatGPT to create the initial outline based on the prompt:



What is the role of the human in a world where AI can handle many of the tasks needed in cybersecurity? Help me write an outline for an article about what people should do vs. what AI should be responsible for and include the following:
1. What cybersecurity tasks are obviously better suited for AI/ML based on things like speed and pattern recognition
2. The idea that adversaries are taking advantage of AI/ML and will continue operating at a speed incompatible with human capacity
3. What humans will be better at than AI/ML
4. What people can do if they're not spending time on the types of tasks that will be taken over by AI - here please give examples of work that humans did in the past, but innovation in automation, machinery, industrial equipment etc. meant that people could instead do more strategic work
5. How we should adapt our approach to training and educating entry-level cybersecurity professionals given this pivot to a collaborative model between humans and AI. 

Additionally, every image in the post was generated using the default “create image with AI” feature within WordPress.

Leave a Reply

I’m Nate

Nathan Burke

Welcome to my site. I’m going to start blogging at least 3x per week as I get back into the habit of writing. Expect a combination of cybersecurity, sports, AI, and more.

Let’s connect

Discover more from NathanWBurke.com

Subscribe now to keep reading and get access to the full archive.

Continue reading