Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical Security

5 Minutes With

What AI Vulnerabilities Do Security Leaders Tend To Overlook?

By Jordyn Alger, Managing Editor
5 Minutes with Watters
Bio image courtesy of Watters
November 20, 2025

Artificial intelligence (AI) has grown increasingly prevalent in cybersecurity headlines. Whether framed as a useful technology or a sophisticated adversary, the industry is always almost always talking about it — but is something about AI security being overlooked? 

Here, Security magazine talks with John Watters, CEO and Managing Partner at iCOUNTER, about managing the risks associated with AI adversaries. 

Security: Tell us about your background and career. 

Watters: Since we’re talking cybersecurity, let’s start with iDEFENSE. I bought the company in 2002 as an investor rather than an operator, then subsequently became CEO. As the first commercial cyber threat intelligence vendor, we established the first global zero day acquisition program and created the ‘Responsible Disclosure’ process driving software companies to accelerate their patch creation and rollout schedule. This was ground breaking and the initiation of the bug bounty world we live in today. We sold the business to Verisign in 2005 when I retired the first time.

In 2007, I founded iSIGHT Partners and took cyber threat intelligence to the next level opening global research centers and constructing the foundation of the cyber intelligence industry today. We enumerated and tracked global adversaries by objective, their associated Tactics, Techniques, and Procedures (TTPs), and the machine-readable Indications of Compromise (IOCs) that our customers could correlate against their security alerts. Customers use these correlated alerts to drive patch prioritization, configuration, detection rule development/deployment, and to initiate hunting for the associated threats across their company. After we were acquired by FireEye, merged with Mandiant, and ultimately became part of Google in 2022, our intelligence collection and analysis continued to expand creating a world class cyber intelligence business documenting almost every visible threat in the world.  

My work helping pioneer the cyber intelligence industry was done as my belief that what we built at iSIGHT/Mandiant/Google could never be replicated.  After retiring, I continued to invest in cyber security companies — one being Apollo.

Then, the world changed almost overnight as industry embraced AI like never before and we set out on creating efficiency in every walk of life, from search to coding to financial analysis.  Adversaries always embrace innovation at a pace well in advance of defenders and the AI surge is no different. The world has seen just the tip of the iceberg in terms of adversary innovation through their use of AI for impersonation, advanced phishing spears, etc. What the world has not seen is what we have seen at Apollo for the past 5 years — the rapid acceleration of AI-enabled adversaries to select targets, conduct reconnaissance to define security gaps, and build highly customized attack methods to exploit those security gaps.  

As I sat on the Boards of different companies, and served as a venture partner at a couple of venture capital firms, it became clear to me that the most dramatic shift in the cyber threat landscape was happening right in front of my eyes — and the unique intelligence capability at Apollo had anticipated this change and built a robust intelligence collection capability over the past five years specifically focused on this problem. It was time to get back in the game and support the industry in this new era of AI-enabled adversaries, which will reshape the entire cybersecurity landscape and materially reduce the effectiveness of traditional cyber intelligence. That’s why we’ve launched iCOUNTER.

Outside of my role in the cybersecurity industry, I’m also the founder, director and President of the STAIRS Program, a non-profit organization supporting inner-city education, since 2000.

Security: AI has increased the speed and sophistication of cyberattacks. In today’s cyber threat landscape, how can organizations remain protected? 

Watters: Today, AI-enabled attackers of all types are rapidly shifting their focus and targeting specific companies, leveraging AI capabilities to dramatically reduce the time and cost of selecting and conducting reconnaissance to profile a target. Once attackers fully understand a target’s environment, including its security controls and specific gaps, they leverage AI to create ‘zero-day TTPs.’ As I mentioned before in terms of why I’m getting back in the game, traditional cyber intelligence is increasingly becoming marginalized in an AI-enabled adversary threat environment. 

Why?

Today’s cyber intelligence relies on adversary reuse of TTPs and IOCs by actor groups which will rapidly become obsolete. Let me explain. The ‘Anti-virus’ industry determined that if you discovered a new virus, you could build an ‘Anti-virus’ signature to counter further infection for the next customer. Then, what happened? Adversaries used polymorphic viruses and defenders were protecting against a virus that would never be used again. Then customers began to extend their perimeter and find the infrastructure that the malware/viruses were launched from. Here comes Fast Flux leveraging rapidly changing infrastructure to obfuscate malicious activity. Then, with respect to malware, the industry created rules to prevent infection from malware that was used against it — you can imagine what happens next. By 2015, 80% of all malware we say at FireEye was seen the first time; i.e., polymorphic malware.  

Now, as the threat intelligence industry continuously documents and alerts on every new actor/TTP/IOC used in the world, adversaries are beginning to leverage AI to generate ‘Zero Day TTPs.’ At the Museum of Modern Art, they have an AI-powered art installation called “Unsupervised.” They fed over 200 years of art into an LLM that now generates a brand new piece of art every 30 seconds. 

Are you seeing a trend?  

Adversaries can simply tune a large LLM with every TTP ever used before in order to create Zero Day TTPs that have never been seen before. Meanwhile, traditional cyber intelligence providers report on what has been seen before. You can see the trend that has been in place for more than 20 years in the cybersecurity industry. Except this one is here to stay, and this trend is accelerating at an extremely alarming rate.

Security: What vulnerabilities do security leaders tend to overlook when securing against advanced cyber threats? 

Watters: AI is enabling the creation of zero day TTPs so the actual attack methodology and tools are brand new and precision built to compromise a specific target company. In this scenario, the intelligence on what’s been seen before goes out the window and an increasing number of victims become “Patient Zero”. More on that later. Defending against this reality will require a new approach from defenders and a very agile intelligence capability to support them.

Zero-day TTP’s present a new challenge for cyber and fraud defenders by circumventing their existing controls. The threat intelligence frontier has shifted from humans vs. humans to machines vs. humans. Ten years from now, the battle will be fought with machines vs. machines. Zero-day TTP’s makes every cyber defender what I referenced earlier as Patient Zero in an age when they’re conditioned to protect against what’s been seen by others.  

Today, there are very few “Patient Zeros” as almost every attack that you see has been seen before. In a very short period of time — say five years — almost every attack will be seen for the first time.

Security: How should organizations prepare for the next five years of AI-enhanced cyber threats? 

Watters: Traditional security approaches of updating defenses to combat general threat tactics are no longer sufficient to protect sensitive information and systems. To effectively defend against AI-driven rapid developments in targeted attacks, organizations need more than mere actionable intelligence — they need AI-powered analysis of attack innovations and insights into their own specific weaknesses that can be exploited by external parties. 

Security: Is there anything else you’d like to add on the topic that we haven’t covered? 

Watters: Adversarial innovation is at an all-time high today and we plan to match their speed. Our own use of AI is what fuels our capability to act with speed and precision to enable our customers to enhance their counter threat capabilities to divert, deflect and defend against a new breed of adversaries. It will take quite some time for traditional cyber intelligence companies to shift operating model providing iCOUNTER with a substantial competitive advantage.

KEYWORDS: 5 minutes with artificial intelligence (AI) risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hamburger

    Security Leaders Discuss Restaurant Brands International’s Vulnerabilities

    See More
  • Glasses in front of monitors

    DOGE inputs federal data to AI, cyber leaders discuss implications

    See More
  • International flags

    US declines international AI declaration, security leaders discuss

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing