Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

5 Minutes With

Challenges and opportunities that AI presents CISOs

By Jordyn Alger, Managing Editor
Jadee Hanson 5 minutes with logo

Image courtesy of Hanson

May 22, 2024

The artificial intelligence (AI) landscape is constantly shifting. To maintain pace with these evolving technologies, CISOs must prepare for additional complexity in their security strategies. 

While AI presents a challenge for CISOs, it also offers an opportunity. Here, we talk with Jadee Hanson, Chief Information Security Officer at Vanta to discuss the risks and benefits of AI. 

Security magazine: Tell us about your title and background.

Hanson: I serve as Chief Information Security Officer at trust management provider, Vanta. As Vanta’s CISO, my responsibilities are to protect the organization from cyber threats and data loss. Because Vanta is selling to the security buyer, I also play a role in helping the organization understand the security landscape and buyer nuances. 

I’ve been in security for almost two decades. I became interested in technology very early on in high school, where I used to help the tech department build desktops. This eventually sparked my interest in pursuing a degree in information systems, and later a career as a security professional.

My first security job out of college was at Deloitte. There, I did a lot of work on security audits and consulting. I did a lot of pen testing, back when no one knew what pen testing was. 

I later joined Target. I was there for over seven years and led a number of security functions. During my time at Target, I was able to oversee the security aspects included with the acquisition Target Pharmacies to CVS Health. After that, I served as Chief Information Security Officer and Chief Information Officer at Code42 where I led the security and technology organizations and served as the technology strategy leader ensuring we purchase the right technology to move the organization forward. 

Security magazine: What new challenges and risks do CISOs have to contend with due to the proliferation of AI technologies?

Hanson: The risks largely stem from the fundamental unknowns. One of our customers recently described AI as an “alien-like technology.” I love that description because it’s accurate. AI is something completely new and different.

This is a challenge for security practitioners because we are cautious by nature. We like to understand how things work in order to figure out how to secure them.

I myself am on a continuous fact-finding mission to decode the fundamentals of AI models — especially given how quickly the space is evolving — in effort to understand how they work and how I can properly add security controls. 

Here are a few specific risks as I see them today.

  1. One is training models on protected information. AI systems rely on data. Models contain data that we feed it for training or that it collects as part of their normal functionality. In many cases this data is pulled from public sources, but when private information is used to train models, we need to ensure that the model is isolated.
  2. A second risk is when companies entrust AI to handle too much too early. We know AI is doing some really great things to create efficiencies throughout many of our everyday activities. That said, we all have seen AI get things wrong. For example, there was a recent case where a chatbot run by a major airline lied to customers about a bereavement policy. The chatbot told the passenger they could retroactively apply for a last-minute travel discount, which was not actually outlined in the airline’s policy. To be clear, I am not saying we shouldn’t use chatbots to help customers with service issues. I am merely saying that having chatbots deal with sensitive issues such as policies might be a bit premature, and we therefore should be prepared for the consequences should the chatbot get something wrong.
  3. Then there is the use of AI by malicious adversaries. Whenever new technology is released, people are lured by its benefits, while bad actors are thinking of ways to use it in malicious and non-intended ways. We’re already seen this happen with deepfakes, misinformation campaigns, malware and phishing campaigns. 

So, as excited as I am about this technology, we need to make sure we fully think through risks and approach the use of the technology in a thoughtful manner. 

Security magazine: How can the top risks associated with AI be mitigated?

Hanson: First and foremost, we need to start figuring out how to adopt the tech and do it the right way. 

The security teams that are pushing back on AI will only get passed by, so it will be key to partner with business teams so they can adopt AI in a thoughtful way. 

As I see it, security teams should start by doing two important things.

First, understand what vendors you use that are leveraging AI in the software within your stack. Make sure you ask questions to understand the specific application of AI to your data. Find out if they are training models on the data you are providing and what that means in terms of further protecting the data. 

Second, find out what vendors are using models trained on your sensitive data. This is where things get risky, and you need to understand if this is something you feel comfortable with or not. 

The other thing to understand is that AI is like any other new technology and that the main security controls still apply. We need to be thinking about access controls, logging, data classification, etc. — the basic fundamental controls still apply to AI. 

Security magazine: What are the benefits that AI technology can provide CISOs?

Hanson: Machine Learning (or ML) has been used in security for years to perform functions like identifying anomalies in logs. This new wave of AI and Large Language Models (LLMs) will take this to a new level. 

We’re seeing this degree of acceleration with key security functions within our own AI product, which we use ourselves. For example, we’re seeing greater efficiencies in questionnaire automation, mapping of controls and tests and reporting advances. 

And it’s precisely these everyday tasks that we need the most help within security. By further automating these functions, we can stay focused on addressing the higher risks throughout the organization.

Security magazine: Anything else you would like to add?

Hanson: There’s one additional concern security pros are grappling with at the moment: the regulatory risk posed by the rapid development of AI.

To stay ahead of this, businesses can follow the AI Risk Management Framework (RMF) by the National Institute of Standards and Technology (NIST). The AI RMF was created to mitigate risks associated with the design, development, use, and evaluation of AI products. 

KEYWORDS: 5 minutes with artificial intelligence (AI) CISO leadership risk mitigation security strategies

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC_Web_5Minutes Bovee.jpg

    The top challenges CISOs face in identity security

    See More
  • Man standing in front of window

    CISOs respond: 49% of CISOs plan to leave role without industry action

    See More
  • 5 Minutes with Tait

    The end of digital transformation, the rise of AI transformation

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!