The CISO Brief is designed for current and aspiring cyber leaders, offering valuable insights, strategies, and tools to help you excel in the dynamic field of cybersecurity.
Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape, redefining both the nature of threats and the tools available for defense. While AI creates opportunities for automation, threat detection, and resilience, it simultaneously arms adversaries with sophisticated techniques—ranging from autonomous attacks to hyper-realistic and personalized social engineering.
CISOs now need to manage AI-driven threats, shape risk decisions, and set AI controls across the business. Because AI changes how attacks work, cyber capabilities need a rethink from the ground up. Traditional detection and app security may not keep up with AI attackers that generate new patterns and write malware at speed. The cyber organization needs to be more predictive, agile, and autonomous.
This issue focuses on what’s changing for CISOs—and what to do now to get ahead of AI-enabled attacks.
AI-driven threats change the CISO’s job in three practical ways:
There are several ways AI accelerates cyberattacks. It’s important to be familiar with the latest innovations and how to counter them.
What’s changing: Video and voice manipulation can make impersonation and social engineering more scalable and believable.
Countermeasures: Solutions that use AI to identify deepfakes, continuous identity verification, and anti-fraud tools.
What’s changing: Attackers target highly privileged agents to steal data, perform malicious activity, or sabotage operations.
Countermeasures: Strong access controls, least privilege, human oversight for privileged actions, and monitoring to detect unusual or unauthorized behavior.
What’s changing: AI can increase the success rate of credential harvesting and enable faster targeting at scale.
Countermeasures: Stronger password policies, improved identity and access management (IAM) monitoring and detection, and faster identity threat detection and response.
What’s changing: Attacks can introduce data that reduces the effectiveness of machine learning operations (MLOps) and trust.
Countermeasures: Secure MLOps practices, stronger access controls for AI-related data stores, and protections for retrieval-augmented generation (RAG) data sources.
What’s changing: Techniques can cause AI assistants to disclose private data. These techniques include persona switches, extracting conversation history, and fake completion.
Countermeasures: Implementing IAM context and authentication for user interactions, session monitoring, and controls.
What’s changing: Neural networks trained on password data can now crack passwords faster than brute force techniques. AI-enabled password cracking can be 51% to 71% more effective than current brute-force techniques.1
Countermeasures: Stronger password policy and rotation, monitoring for password-cracking activity, and detection for password-cracking malware.
What’s changing: Model context protocol (MCP) services let AI agents talk to each other and let people or other apps interact with AI tools. By default, they do not require sign-in. That can be risky because attackers could access these services and potentially trick them into revealing sensitive data.
Countermeasures: Establish authentication for MCP services, leverage application programming interface (API) security or data tagging and classification to reduce sensitive data exposure and help ensure MCP services are not running with excessive privileges.
Use this as a short-cycle plan to reduce exposure while longer-term programs mature.
To combat the rapid pace of change, CISOs need to start maturing and evolving capabilities that keep their organizations ahead of the evolving AI arms race. CISOs are being asked to move from reactive controls to proactive, business-aligned defense against AI-enabled attacks. The goal is not just better tools—it is stronger decisioning, clearer accountability for high-risk actions, and controls that reduce exposure as AI-driven threats evolve.
1Ramesh RV, “How cracking passwords can be easier in the age of AI/ML,” Okta, February 12, 2025.
This document contains general information only and Deloitte is not, by means of this document, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This document is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.
Deloitte shall not be responsible for any loss sustained by any person who relies on this document.
As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting.
Copyright © 2026 Deloitte Development LLC. All rights reserved.