Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCybersecurityCyber Tactics ColumnCybersecurity News

To Catch A Spy: The Emergence of Artificial Intelligence

By John McClurg
SEC0319-Cyber-Feat-slide1_900px
SEC0319-cyber-slide2_900px
SEC0319-Cyber-Feat-slide1_900px
SEC0319-cyber-slide2_900px
March 1, 2019

We just celebrated President’s Day. Folklore has it that during the American Revolution, George Washington was approached by an enquiring member of the press who asked: “George! George! What keeps you up at night?”

It wasn’t the Continental Congress, who even then seemed challenged when it came to accomplishing anything. It wasn’t his troops, starving and freezing to death at Valley Forge. His reply: “Their Spies!” Since that time – more than 240 years – we’ve amassed insights as to the early indicators of trusted insiders inclining toward the dark side. Notwithstanding those gains, the best we’ve generally been able to do is catch the spies after they’ve already hurt us. Why is that?

It was while chasing one of those spies, Harold “Jim” Nicholson, that an answer came to me: It was a “Big Data” problem! Those data points, those early indicators, were distributed across too many diverse silos for us to wrap our cognitively-limited minds around. That fact didn’t stop the U.S. government, in the wake of Snowden, from requiring all corporations wishing to do business with them to have functioning, by the end of 2016, what they described as a “viable” insider threat program. No one seemed quite sure what they meant by “viable,” but I assumed it had to involve the demonstrated use of analytical tools or it wouldn’t be accepted.

I was serving as the CSO of Dell. We leveraged the strength of some new “Big Data” analytical tools, Statistica and Kitenga, that allowed us to examine all forms of data, both structured, e.g. Excel files,  and un-structured, e.g. internet traffic. By the close of the deadline, we’d tested and implemented our “Insider” program. In fact, to bolster the confidence we had in our program, we “tweaked” the profile of the Director, running the pilot such that if the algorithm worked it would kick his name out as that individual about whom we should be most concerned. It did just that!

With that success came my first glimpse of what the future might hold for us; my first inkling that, as stymied as our profession had been in the world of reactive detection, a foray into the realm of proactive prevention was in the offing. Our security organization transformed overnight from what had been considered “a distasteful cost of doing business into an indispensable and inextricable aspect of advancing it.”

That emerging possibility was soon thereafter chronicled in a Congressional Report of the OPM breach, which concluded that an AI-supported, math model played a pivotal role in discovering, stopping and remediating malware that caused the data breach.

Thomas Kuhn, in his book “The Structure of Scientific Revolutions,” described the need for a periodic refresh of society – he recognized that over time we need a profound change in our way of thinking. As I look at the paradigm shift that’s now available in the form of this transformative technology, it occurs to me that what we’re up against in effecting that transition is a formidable and entrenched way of thinking. It’s comparable to what Copernicus himself faced almost six centuries ago, as he battled his Ptolemaic predecessors, disproving their belief that the earth was the center of the universe.

Artificial Intelligence and Machine Learning constitute the dawning of a new era. I personally believe we’re witnessing a scientific revolution, the excitement of which hasn’t been felt in decades. It’s a changed age. In the months ahead, I look forward to exploring with you this new way of securing our world, as I advance a series of articles that will examine AI and Machine Learning: what it is, how it works and what it portends for the future of security.

KEYWORDS: artificial intelligence (AI) cyber risk management cybersecurity trends hackers privacy security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More
  • SEC0319-Cyber-Feat-slide1_900px

    The Evolution of Artificial Intelligence as a System

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing