Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnCybersecurity News

To Catch A Spy: The Emergence of Artificial Intelligence

By John McClurg
SEC0319-Cyber-Feat-slide1_900px
SEC0319-cyber-slide2_900px
SEC0319-Cyber-Feat-slide1_900px
SEC0319-cyber-slide2_900px
March 1, 2019

We just celebrated President’s Day. Folklore has it that during the American Revolution, George Washington was approached by an enquiring member of the press who asked: “George! George! What keeps you up at night?”

It wasn’t the Continental Congress, who even then seemed challenged when it came to accomplishing anything. It wasn’t his troops, starving and freezing to death at Valley Forge. His reply: “Their Spies!” Since that time – more than 240 years – we’ve amassed insights as to the early indicators of trusted insiders inclining toward the dark side. Notwithstanding those gains, the best we’ve generally been able to do is catch the spies after they’ve already hurt us. Why is that?

It was while chasing one of those spies, Harold “Jim” Nicholson, that an answer came to me: It was a “Big Data” problem! Those data points, those early indicators, were distributed across too many diverse silos for us to wrap our cognitively-limited minds around. That fact didn’t stop the U.S. government, in the wake of Snowden, from requiring all corporations wishing to do business with them to have functioning, by the end of 2016, what they described as a “viable” insider threat program. No one seemed quite sure what they meant by “viable,” but I assumed it had to involve the demonstrated use of analytical tools or it wouldn’t be accepted.

I was serving as the CSO of Dell. We leveraged the strength of some new “Big Data” analytical tools, Statistica and Kitenga, that allowed us to examine all forms of data, both structured, e.g. Excel files,  and un-structured, e.g. internet traffic. By the close of the deadline, we’d tested and implemented our “Insider” program. In fact, to bolster the confidence we had in our program, we “tweaked” the profile of the Director, running the pilot such that if the algorithm worked it would kick his name out as that individual about whom we should be most concerned. It did just that!

With that success came my first glimpse of what the future might hold for us; my first inkling that, as stymied as our profession had been in the world of reactive detection, a foray into the realm of proactive prevention was in the offing. Our security organization transformed overnight from what had been considered “a distasteful cost of doing business into an indispensable and inextricable aspect of advancing it.”

That emerging possibility was soon thereafter chronicled in a Congressional Report of the OPM breach, which concluded that an AI-supported, math model played a pivotal role in discovering, stopping and remediating malware that caused the data breach.

Thomas Kuhn, in his book “The Structure of Scientific Revolutions,” described the need for a periodic refresh of society – he recognized that over time we need a profound change in our way of thinking. As I look at the paradigm shift that’s now available in the form of this transformative technology, it occurs to me that what we’re up against in effecting that transition is a formidable and entrenched way of thinking. It’s comparable to what Copernicus himself faced almost six centuries ago, as he battled his Ptolemaic predecessors, disproving their belief that the earth was the center of the universe.

Artificial Intelligence and Machine Learning constitute the dawning of a new era. I personally believe we’re witnessing a scientific revolution, the excitement of which hasn’t been felt in decades. It’s a changed age. In the months ahead, I look forward to exploring with you this new way of securing our world, as I advance a series of articles that will examine AI and Machine Learning: what it is, how it works and what it portends for the future of security.

KEYWORDS: artificial intelligence (AI) cyber risk management cybersecurity trends hackers privacy security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More
  • SEC0319-Cyber-Feat-slide1_900px

    The Evolution of Artificial Intelligence as a System

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing