Skip to main content

The CISO Brief

Insights for future-focused cybersecurity leaders

The CISO Brief is designed for current and aspiring cyber leaders, offering valuable insights, strategies, and tools to help you excel in the dynamic field of cybersecurity.

The AI Impact on Cyber Risk: Understanding new threats, defenses, and the CISO's evolving mandate

Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape, redefining both the nature of threats and the tools available for defense. While AI creates opportunities for automation, threat detection, and resilience, it simultaneously arms adversaries with sophisticated techniques—ranging from autonomous attacks to hyper-realistic and personalized social engineering.

CISOs now need to manage AI-driven threats, shape risk decisions, and set AI controls across the business. Because AI changes how attacks work, cyber capabilities need a rethink from the ground up. Traditional detection and app security may not keep up with AI attackers that generate new patterns and write malware at speed. The cyber organization needs to be more predictive, agile, and autonomous.

This issue focuses on what’s changing for CISOs—and what to do now to get ahead of AI-enabled attacks.

Quick take: AI is changing cybersecurity

  1. AI is accelerating attacks. More convincing social engineering, faster vulnerability discovery, and more scalable credential and identity abuse are raising the baseline threat level.
  2. The blast radius is bigger. AI-powered attacks can move laterally more quickly by dynamically exploiting a wider range of vulnerabilities to access sensitive data across employees, third parties, and AI-enabled workflows.
  3. The CISO mandate is widening. When the entire business runs on AI, protecting the AI models and processes is top priority.
  4. Cyber leaders are asking: “What should we do in the next 30–90 days to reduce exposure to AI-enabled attacks, and how do we begin the AI journey to enable the cyber function?”

The new CISO role: From technical owner to enterprise risk leader for AI

AI-driven threats change the CISO’s job in three practical ways:

  1. You need controls that travel with the workflow. When work happens inside chat tools, co-pilots, agents, and integrated software-as-a-service (SaaS) platforms, controls can’t be limited to traditional endpoints and networks.
  2. Identity becomes the control plane. Many AI-enabled attacks ultimately target identity—stealing credentials, bypassing authentication, or manipulating trusted interactions. Agent-based AI will likely become the main way to coordinate workflows and automate work. That means you will need controls to manage each agent’s lifecycle and access.
  3. You’re shaping secure AI adoption, not just secure systems. CISOs are increasingly expected to influence how AI is approved, deployed, monitored, and governed across the enterprise—especially where sensitive data, regulated processes, or customer outcomes are involved.

AI is changing rapidly. How can you stay in control?

There are several ways AI accelerates cyberattacks. It’s important to be familiar with the latest innovations and how to counter them.

AI impersonation

What’s changing: Video and voice manipulation can make impersonation and social engineering more scalable and believable.

Countermeasures: Solutions that use AI to identify deepfakes, continuous identity verification, and anti-fraud tools.

Agent exploitation

What’s changing: Attackers target highly privileged agents to steal data, perform malicious activity, or sabotage operations.

Countermeasures: Strong access controls, least privilege, human oversight for privileged actions, and monitoring to detect unusual or unauthorized behavior.

Enhanced credential harvesting

What’s changing: AI can increase the success rate of credential harvesting and enable faster targeting at scale.

Countermeasures: Stronger password policies, improved identity and access management (IAM) monitoring and detection, and faster identity threat detection and response.

Model poisoning and sabotage

What’s changing: Attacks can introduce data that reduces the effectiveness of machine learning operations (MLOps) and trust.

Countermeasures: Secure MLOps practices, stronger access controls for AI-related data stores, and protections for retrieval-augmented generation (RAG) data sources.

Prompt attacks

What’s changing: Techniques can cause AI assistants to disclose private data. These techniques include persona switches, extracting conversation history, and fake completion.

Countermeasures: Implementing IAM context and authentication for user interactions, session monitoring, and controls.

AI-enabled password cracking

What’s changing: Neural networks trained on password data can now crack passwords faster than brute force techniques. AI-enabled password cracking can be 51% to 71% more effective than current brute-force techniques.1

Countermeasures: Stronger password policy and rotation, monitoring for password-cracking activity, and detection for password-cracking malware.

Attacks targeting MCP services

What’s changing: Model context protocol (MCP) services let AI agents talk to each other and let people or other apps interact with AI tools. By default, they do not require sign-in. That can be risky because attackers could access these services and potentially trick them into revealing sensitive data.

Countermeasures: Establish authentication for MCP services, leverage application programming interface (API) security or data tagging and classification to reduce sensitive data exposure and help ensure MCP services are not running with excessive privileges. 

What to do in the next 30 to 90 days

Use this as a short-cycle plan to reduce exposure while longer-term programs mature.

1) Establish a single view of AI usage and data exposure

  • Inventory where AI is being used (enterprise tools, developer tooling, “shadow AI,” third parties).
  • Identify the highest-risk data paths (customer data, IP, credentials, regulated data) and where they touch AI-enabled workflows.
  • Establish accepted architecture patterns, standards, and policies to shape practices that foster AI adoption at reduced risk.
  • Define monitoring standards to collect evidence and monitor AI activity.

2) Put minimum viable guardrails in place for AI deployments

  • Define what must be true before launching AI-enabled features and workflows (access controls, logging, testing, data handling rules, third-party requirements).
  • Set expectations with product and business leaders. A deployment that is secure-by-design now avoids an expensive retrofit later.

3) Harden MCP services against common attack patterns

  • Prioritize stronger authentication and continuous verification for high-risk roles and workflows.
  • Improve identity monitoring and detection for anomalous access patterns and rapid credential abuse.
  • Establish controls for agentic AI and put controls into secure software development life cycle (SSDLC) processes to reduce security vulnerabilities.

4) Reduce susceptibility to AI-enhanced social engineering and fraud

  • Update and define incident response patterns for social engineering and deepfake attacks.
  • Update security operations center (SOC) playbooks for voice and video impersonation and fraud scenarios.
  • Align fraud, security, and communications teams on rapid verification procedures for high-risk requests.

5) Add targeted monitoring for new attack paths

  • Monitor data exfiltration patterns tied to AI tools and AI-enabled workflows.
  • Put basic controls around privileged automation and agents: who can create them, what they can access, and how actions are logged.

Conclusion

To combat the rapid pace of change, CISOs need to start maturing and evolving capabilities that keep their organizations ahead of the evolving AI arms race. CISOs are being asked to move from reactive controls to proactive, business-aligned defense against AI-enabled attacks. The goal is not just better tools—it is stronger decisioning, clearer accountability for high-risk actions, and controls that reduce exposure as AI-driven threats evolve.

1Ramesh RV, “How cracking passwords can be easier in the age of AI/ML,” Okta, February 12, 2025.

Cyber solutions

Deloitte offers a unified approach to help you tackle obstacles and build new capabilities fast. Leverage our breadth of solutions and cybersecurity leading practices that can help you transform your organization and achieve success, wherever you are on your journey.

Subscribe to our cybersecurity series, The Current

Sign up for our quick-read series to keep pace with the latest in cybersecurity strategies, insights, news, and views.

Let's chat

We’d love to hear what you think—reach out with feedback and suggestions for future topics.

This document contains general information only and Deloitte is not, by means of this document, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This document is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.

Deloitte shall not be responsible for any loss sustained by any person who relies on this document.

As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting.

Copyright © 2026 Deloitte Development LLC. All rights reserved.