Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business ResilienceSecurity Education & Training

PredictiveAI Security: Guarding the Intelligence Behind the GenAI Spotlight

By Diana Kelley
AI computer chip
Immo Wegmann via Unsplash
October 28, 2025

By now, we all know generative AI (genAI) as the inescapable “sparkly star” of our digital lives. From email drafting to workflow automation, genAI is always a click away. ChatGPT and its peers pulled AI out of the labs of machine learning engineers and data scientists and thrust it into the hands of millions of people. However, it’s worth remembering: AI didn’t begin with ChatGPT. 

Long before genAI made headlines, predictive AI (predAI) — sometimes simply called machine learning — was already hard at work, making mission-critical decisions in industries where precision, speed, and trust matter most. And that’s exactly why securing it remains so vital.

I speak from the trenches. Back in 2016 — years before Claude and ChatGPT became household names — I had the privilege of working on IBM’s Watson for Cyber Security, an AI assistant trained specifically on the language of cyber threats. We fed Watson thousands of cybersecurity documents, painstakingly labeling them so the system could learn to parse industry-specific language. For example, Watson had to be taught that a “honeypot” was not a jar of honey for bears, but rather a decoy server designed to lure in attackers. That training process was one of the first times I saw the immense power of predAI applied to real-world security: models built to interpret, predict and act in domains where human analysts were drowning in data.

PredAI Is Everywhere and Growing

Watson wasn’t an anomaly. PredAI is not outdated, nor is it a niche technology waiting to be replaced by genAI. PredAI is the engine room of modern enterprise. Large organizations today run thousands of predictive models, quietly fueling everything from fraud detection to clinical trial design. In financial services alone, machine learning-driven fraud detection is projected to save banks over $10.7 billion globally by 2027. In pharmaceuticals, the global predAI market is scaling rapidly, with revenue projections climbing into the hundreds of millions by the early 2030s, driven by AI-assisted drug discovery and diagnostics.

Chances are, if your business relies on data, you already have a hundreds or thousands of predAI models humming away behind the scenes, models that influence who gets a loan, which supply chain route is chosen, or which molecule advances in a billion-dollar drug trial.

Ungoverned PredAI Models Lead to Bias, Breaches and Bad Decisions

Here’s the catch: predictive models don’t govern themselves. They’re a little like garden hoses left running unattended, if they’re tangled, misdirected, or forgotten, the damage can be significant. At best, you wind up with wasted water. At worst, you wake up to a flooded basement; or in enterprise terms, a breached system, corrupted analytics, bad decisions, or regulatory non-compliance.

Here are some of the ways that ungoverned models can cause risk and harm in organizations:

  • Bias and discrimination: Without checks, models can embed and amplify biases hidden in training data. The result? Financial institutions approving loans with discriminatory patterns, exposing themselves to lawsuits and reputational damage.
  • Model drift: Over time, predictive models degrade as real-world data shifts. What was once accurate can turn dangerously misleading. In pharmaceuticals, this could mean flawed patient recruitment for clinical trials, delaying life-saving drugs and eroding trust with regulators.
  • Opaque decisioning: Many organizations cannot explain why a model made a particular call. That lack of auditability isn’t just a technical oversight, it can quickly escalate into a serious compliance failure, particularly under regulations like the EU AI Act or U.S. financial disclosure requirements.
  • Security vulnerabilities: Machine learning models can themselves be attacked — through data poisoning (feeding them bad training inputs) or adversarial manipulation (crafting malicious inputs that fool the model). If you don’t know what models you have or how they’re secured, how can you defend them?

In short, ungoverned predAI models don’t just create operational risks — they open the door to systemic failures that can undermine business strategy, regulatory standing, and customer trust.

Building PredAI Governance: Inventory, Control and AIBOMs

Strong model governance isn’t a nice-to-have, it’s what keeps predAI reliable, secure and compliant over time. The good news is, getting started doesn’t have to be overwhelming. Starting with Inventory, Control and AIBOMs is a great way to put the right foundations in place.

Build Your Model Inventory

You can’t govern what you don’t know exists. Start by cataloging every predictive model across the organization. Enrich the inventory data with critical security information such as: who owns it, model provenance, reputational risk, what data feeds it and what business problem and tools it supports. Treat model inventory the same way you would a hardware or software asset inventory. Automated discovery tools can help uncover “hidden” models, both on-prem and in the cloud, living in notebooks, pipelines, or shadow projects.

Put Governance and Controls in Place

With visibility in hand, the next step is control. Define policies for training data quality, fairness standards and safety criteria. Set up approval gates before deployment to stress-test and red-team models for bias, drift, privacy leaks or misbehavior. And don’t stop at go-live. Continuous monitoring at run-time is essential to catch degrading performance, anomalous outputs, guardrail jailbreaks and toxic prompt triggers before they cause harm.

Manage Models with an AI Bill of Materials (AIBOMs)

Finally, create an AIBOM for each model — a detailed “ingredient list” that documents data sources, features, training code, versions and dependencies. Just as software BOMs help track components and vulnerabilities, AIBOMs give you the ability to trace issues back to their root. If a training dataset turns out to be tainted, or a library patch breaks accuracy, your AIBOM provides the roadmap to investigate and fix quickly.

GenAI Shines while PredAI Keeps the Lights On

GenAI commands the spotlight. But behind the scenes, it’s predAI and machine learning models that quietly keep the lights on: enabling fraud detection, predicting retail trends, optimizing logistics, and powering decisions that drive revenue, reduce risk, and keep businesses running every single day.

Securing genAI is vital, and so is safeguarding the machine learning models that power both genAI and predAI. Strengthening their governance ensures that value continues to grow. By inventorying models, putting thoughtful controls in place, and managing them with AIBOMs, organizations can build a comprehensive and balanced AI security program that supports both innovation and trust.

KEYWORDS: artificial intelligence (AI) compliance compliance problems

Share This Story

Diana kelley headshot

Diana Kelley is Chief Information Security Officer at Noma Security. Image courtesy of Kelley 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

critical event management

Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing