Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

5 Minutes With

The end of digital transformation, the rise of AI transformation

By Jordyn Alger, Managing Editor
5 Minutes with Tait

Image courtesy of Tait

January 22, 2025

The modern technology landscape is becoming increasingly advanced, and many enterprises are still trying to catch up. With the growing prominence of generative AI, organizational data is faced with new risks. 

Here, we talk with Steve Tait, Chief Technology Officer at Skyhigh Security, regarding the key areas of risk that generative AI can create. 

Security magazine: Tell us about your background and career.

Tait: I began my career as an engineer in the emerging mobile data space in the late 90s, and over time progressed through the traditional path of technical team management and leadership roles. One of my key early positions was Head of Engineering at Capita IT, where I covered a range of projects in financial services and government systems before finally ending as the Director of Software & Application Services for Capita’s Travel and Events business unit.

Later on in my career I joined BAE Systems as an engineering director, leading their global engineering workforce focused on the development of cyber and intelligence products along with complex system integration programs for government and enterprise systems. I was hired as the VP of Engineering at CALYX in 2018 where I focused on critical software solutions for the pharmaceutical industry before taking on my first Chief Technology Officer role at Snow Software. 

Today, I serve as Chief Technology Officer at Skyhigh Security, bringing my decades-long experience building, transforming, and leading highly scaled and distributed engineering teams, with a focus on delivering mission-critical security software to major enterprises, governments, and organizations across the globe.

Security magazine: What are the key areas of generative AI that create risk?

Tait: Generative AI presents numerous risks to the enterprise, including hallucinations, where the AI generates incorrect or misleading outputs, poisoning of its learning data, which could compromise the AI’s reliability, and malicious prompt injections designed to manipulate the system. Intellectual property (IP) risks also arise when data is shared with public AI services, leading to potential breaches of business confidentiality. 

However, in my opinion, the most pressing risk for enterprises lies in data protection within emerging AI-based productivity tools. There are two specific areas to look out for: copilots and AI-based low-code app development tools.

Security magazine: Why are these key areas risky?

Tait: It’s all about access to data. Copilots by their nature have access to an enormous amount of corporate data, which is very different when compared to the scope of access that an individual user has. While there are basic protections in place to protect users from unauthorized data access, there is no guarantee that the AI tool won’t inadvertently link unrelated datasets. This could significantly increase the potential for sensitive data exfiltration, either deliberately or completely by accident.

On the other hand, AI-supported development tools will explode the already steadily increasing output of “citizen developers” or non-technical individuals creating applications. These developers often lack the formal training of basic cyber development practices, such as scope management and the principle of least privilege. Consequently, applications can be built and distributed with minimal oversight.

While systems like Active Directory can manage some coarse-grained privileges, discrepancies arise when application-level access differs from user-level permissions. These horizontal privilege expansions can provide access to unauthorized data, making breaches extremely difficult to detect.

Security magazine: What are some best practices for organizations to keep data safe while incorporating AI?

Tait: Organizations need to invest significant time in understanding their level of data exposure. Where does your data reside? Web, cloud, email, private apps? Who has access to it — and should they?

They must also identify and train citizen developers, in addition to checking their applications for possible vulnerabilities.

When it comes to copilots, organizations must continuously review the outputs — don’t just put data in and forget about it. Additionally, don’t sleep on using cybersecurity tools and Data Loss Prevention (DLP) techniques. Many of these tools are already available and can safeguard your data, prevent threats and ensure compliance all while enabling organizations to embrace AI and innovation.

Security magazine: Anything else you’d like to add?

Tait: “Digital transformation” is over. In today’s technologically advanced landscape, few, if any, businesses would claim they are not already digitally transformed. This shift began two decades ago with the automation of manual tasks and reached its peak during the COVID-19 pandemic. Now, the fundamental challenge facing businesses is how to incorporate generative AI while keeping critical data secure.

AI usage will likely be a dominant priority for 2025 and beyond. This task is made complex not only by the emergence of new risks tied to large language models (LLMs), such as data poisoning and malicious prompt injection, but also by expanding threat vectors from shadow AI, private AI, and sanctioned applications. For instance, corporate copilots, which are deeply integrated with business assets and facilitate extensive “interrogation” of data, amplify these risks. Simultaneously, citizen developers — enabled by LLM-powered tools — create applications without necessarily understanding the principles of secure development, increasing the likelihood of vulnerabilities. As businesses integrate generative AI, securing critical data will remain paramount.

KEYWORDS: 5 minutes with artificial intelligence (AI) Artificial Intelligence (AI) Security data protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insurance-freepik

    The beginning of a beautiful friendship: How the insurance industry can partner with IT to create true digital transformation

    See More
  • 5 Minutes with Chokshi

    Pay Attention to the Intersection of API Security and AI Proliferation

    See More
  • Neon human and android hands

    65% of the Forbes AI 50 List Leaked Sensitive Information

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing