Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical Security

5 Minutes With

Agentic AI: Benefits, Risks and Best Practices for Implementation

By Jordyn Alger, Managing Editor
5 Minutes with Kelley
Image courtesy of Kelley
September 29, 2025

Artificial intelligence (AI) has altered the cybersecurity landscape, leading to technological breakthroughs and increasingly sophisticated threats alike. Agentic AI is among these developments.

As organizations consider adopting agentic AI, there are benefits and risks that must be considered. Here, Security magazine talks with Diana Kelley, Chief Information Security Officer (CISO) at Noma Security, about the best practices for implementing agentic AI. 

Security magazine: Tell us about your background and career.

Kelley: I’ve spent my career helping organizations navigate the evolving world of cybersecurity. Today I serve as Chief Information Security Officer at Noma Security an AI security platform. My journey has taken me through technical leadership and advisory roles at companies large and small, including: Protect AI (now Palo Alto Networks), Microsoft, IBM Security, Symantec, Burton Group (now Gartner), and KPMG, as well as co-founding the consultancy SecurityCurve. Along the way, I’ve been fortunate to serve on industry boards including WiCyS, the Executive Women’s Forum, CyberFuture Foundation, TechTarget Security Editorial, and InfoSec World.

Teaching, writing, and mentoring are passions of mine. I love sharing knowledge in my public speaking and keynotes, via my LinkedIn Learning courses, and was so proud to learn that a book I co-authored Practical Cybersecurity Architecture, had been adopted by some professors as a textbook. I’m honored to be recognized as a Global Cyber Security Hall of Fame inductee and EWF Executive of the Year, yet what matters most to me is building collaboration and inclusion. Security is at its strongest when we come together, learn from one another, and work side by side to protect what’s most important.

Security: What is agentic AI, and in what industries might the use of agentic AI be the most valuable?

Kelley: Agentic AI brings together software and language models (genAI) to create systems that can make decisions and act autonomously toward defined goals. Traditional genAI reacts to prompts, while agentic AI systems plan, adapt, and collaborate across complex tasks. It has useful applications in many industries but early adoption is being seen in industries where speed and context are critical, such as financial services for fraud detection and dynamic risk modeling and manufacturing for supply chain optimization. 

We’re also seeing a lot of interest in the cybersecurity industry with a number of companies working on agents that to augment or even backfill tier one responders and improve real-time threat detection capabilities. Some orgs are also experimenting with agents that can perform low-risk or very well defined automated remediation actions. But really, any industry that can benefit from increasing speed of automation while enhancing decision accuracy could benefit from agentic AI.

Security: What are the benefits of introducing agentic AI to an organization? What are the risks?

Kelley: The benefits are pretty clear and very exciting: efficiency gains, improved accuracy, faster problem resolution, and rapid action on insights from data. Agentic AI, done well, can scale processes that once required manual intervention, driving response and resilience. This is incredibly good stuff, but the risks are not to be taken lightly.

With all of that agency and automation comes a big potential for downsides if systems are designed, tested, and deployed with security built in. Risks include over-reliance on autonomous systems, shadow AI, data loss, cascading hallucinations, embedded bias, potential regulatory or ethical violations, and exposure to adversarial attacks.

Without governance, transparency, and oversight, organizations could risk data breach, system outage, reputational damage, and the list goes on. That’s why it’s so critical to build security and governance in: clear accountability, strong human-in-the-loop controls, and a focus on explainability to ensure agentic AI actions operate as expected in line with organizational values and policy and safety requirements.

Security: How can organizations safely and securely introduce agentic AI?

Kelley: Safe adoption starts with governance and risk management frameworks aligned with NIST’s AI RMF, ISO 42001, OWASP GenAI project resources, sector-specific standards, and regulations like the EU AI Act. The old saying, “you can’t manage what you don’t know,” applies here as well.

Organizations should start by conducting a full inventory of all of the AI in use at their organization. A lot of agentic AI work is still in proof of concept mode, so now is the time to build those inventories and having conversations with business owners to understand what they are trying to accomplish so you can help them do it responsibly. Weave AI-aware language into policies and provide standard operating procedures or guidelines so employees are AI literate and responsible adopters. Pilot deployments with red-team testing, ongoing monitoring, and clear escalation paths can help uncover weaknesses early.

Ultimately, secure adoption will require a blend of technical safeguards and controls, AI aware processes, and organizational readiness for cultural change.

Security: Anything else you'd like to add?

Kelley: Agentic AI is exciting! It offers remarkable promise, but its success depends on more than algorithms. Building trust with employees, customers, and regulators requires openness about how systems make decisions and who remains accountable. Equally important is inclusion: diverse perspectives in design and oversight reduce blind spots and strengthen resilience. We should also remember that AI isn’t an infallible magic bullet, it can make mistakes. And, it’s a tool that should amplify human judgment, not replace it.

KEYWORDS: 5 minutes with artificial intelligence (AI) Artificial Intelligence (AI) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Diversity, Equity & Inclusion

    DEI training: Importance, benefits and best practices

    See More
  • Glowing fibers

    Agentic AI Browsers Exploited by “PromptFix” Trick Technique

    See More
  • 5 Minutes with Watters

    What AI Vulnerabilities Do Security Leaders Tend To Overlook?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing