Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & Training

Humans at the Center of AI Security

By Siroui Mushegian
Person with lit up numbers on them
Huzeyfe Turan via Unsplash
January 1, 2026

Whenever the conversation turns to AI’s role in cybersecurity, one question inevitably surfaces — sometimes bluntly, sometimes between the lines: “If AI can spot patterns faster than I can, will it still need me?”

It’s a fair question — and one that reflects a deeper anxiety about the future of security careers. AI is everywhere now: embedded in email gateways, SOC workflows, identity systems, and cloud defenses. But here’s the truth: AI isn’t erasing security roles. It’s reshaping them.

The real risk isn’t replacement — it’s readiness. Too often, organizations fail to prepare people to work effectively alongside AI. Research has found that 40% of workers struggle to understand how to integrate AI into their jobs, and 75% lack confidence in using it.

From my vantage points as a CIO, the question isn’t “Will AI replace my team?” The real question is “How do I keep humans at the center of AI-driven security?”

AI Is Reshaping Cybersecurity 

AI isn’t just a buzzword — it’s already transforming how security teams operate. Analysts are using tools with built-in agents and AI assistants that handle tasks such as pulling signals from various data sources, stitching together related alerts, and summarizing long tickets. This ensures teams across different regions view incidents with consistent context and speed.

In other words, AI delivers scale and velocity that humans alone cannot match. But the ultimate decisions? Those still rest with people.

This shift redefines the division of labor between humans and machines, amplifying the value of human judgment. AI should handle repetitive, time-consuming tasks so people can focus on strategic, higher-value, and impactful work. That only happens if people invest in three things: governance, literacy and collaboration.

Governance that Protects Data and Fuels Innovation

AI runs on data, and data is one of the most important assets any security team protects. That’s why governance isn’t optional — it’s foundational. Organizations should establish a cross-functional AI council that brings together legal, compliance, security, and business leaders. This council should meet regularly with a clear mandate: 

  1. Review AI projects
  2. Monitor emerging regulations
  3. Adjust controls as risks evolve

Two guiding principles should shape every decision:

1. Protect the data. 

Meter or block sensitive flows to AI tools, including security telemetry, customer information, and intellectual property. Guardrails must be strong enough to prevent leaks without slowing critical operations.

2. Enable innovation. 

Overly rigid controls can stifle legitimate experimentation by product and engineering teams. Governance should strike a balance between setting clear boundaries while empowering authorized personnel to explore AI’s potential safely.

Raising AI Literacy Across the Organization

Even the best AI strategy will fail if people are afraid to use the tools or do not know how to use them well.

Studies have predicted that rapid technological change, evolving work models, and new AI-driven priorities will force organizations to adjust. At the same time, employees must learn new skills to keep up. People hear about AI in the news and may use a chatbot in their personal lives, but they do not always know what it means for their day job or what best security practices to follow.

Organizations should also implement an AI training program tailored to their employees across all business functions. Most employees can use AI chat for everyday tasks. A smaller group, with more training and clear rules, can build agents. Don’t ask a nontechnical employee to take the same course as an engineer. Instead, the program offers different paths that match various levels of comfort and responsibility. 

Along with improving productivity, it’s all about hardening your security posture. People who understand AI ask better questions. They know which data they can share and which data they must never paste into an unmanaged tool.

Turning Employees into Co-Designers of AI-Enabled Workflows

AI security works best when frontline teams help design how it fits into daily work.

Companies should build an AI roadmap for their function and name AI champions within their organization. These champions understand both the business and the technology and are curious about new ways of working. They help identify use cases and guide colleagues through early experiments.

Hackathons have been especially effective. Instead of limiting them to engineers, it’s important to also open them to finance, HR, and other functions. Participants can use internal AI tools to solve everyday problems, such as analyzing exit surveys or improving internal processes. Hackathons can also focus on faster alert triage, better incident documentation, or smarter analysis of phishing reports. When analysts and responders help design those workflows, they trust the outputs more and are more likely to use the tools in real incidents.

It helps to remember the difference between automation and augmentation. Automation replaces a task. Augmentation enables analysts to do things they could not do before, such as exploring an entire attack path across multiple systems in seconds.

Keeping Humans at the Center

AI is permanently changing how security pros work, and they are asking for alignment and upskilling. Security leaders need governance that protects critical data while still enabling the testing of new ideas. Organizations should also offer employees the training they need to use AI safely and with confidence while bringing them into the design process — so AI-enabled workflows reflect how work actually gets done.

When leaders take this approach, AI becomes a force multiplier. It handles the heavy lifting while teams continue to bring judgment, creativity, and leadership to every decision.

KEYWORDS: artificial intelligence (AI) data protection employee training

Share This Story

Siroui mushegian headshot

Siroui Mushegian is CIO at Barracuda Networks. Image courtesy of Mushegian 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing