chat
expand_more

How CISOs Are Staying Ahead of Bad AI with Good AI

Learn how CISOs are using good AI to fight bad AI in this recap from Chapter 2 of our Convergence of AI + Cybersecurity series.
October 26, 2023

This is a recap of part two in our three-part series, The Convergence of AI + Cybersecurity. Read the recap of part one here.


Cybercriminals can and are using artificial intelligence for the same reasons that non-criminal organizations are: to augment and enhance human potential. Leveraging generative AI and large language models, threat actors can craft more complex, personalized email attacks at scale.

During the second chapter of The Convergence of AI + Cybersecurity web series, a panel of Fortune 1000 CISOs shared how they are fighting back in kind, tackling the malicious use of AI by adopting AI-native cybersecurity solutions.

Here are a few important insights from the webinar.

Generative AI Enables Novice Cybercriminals to Uplevel Attacks

Cybercriminals have harnessed large language models and generative AI to enhance the sophistication and scalability of their email attacks. Utilizing this technology to collect real-time data on their targets and convincingly impersonate individuals, threat actors of all skill levels can increase the effectiveness of their attempts to acquire sensitive information or funds.

Although legitimate tools like ChatGPT have built-in measures to prevent malicious use, these safeguards can be circumvented. Additionally, tools like FraudGPT further facilitate hacking by lowering the barrier of entry for less advanced attackers.

“For all the reasons we want to use AI for good, they're using it for bad, and they're focusing on where they can get sort of better bang for their buck. We see bad actors using technologies like FraudGPT to create things like phishing-as-a-service.”
—Gary Brickhouse, CISO and Vice President, GRC Services, Guidepoint Security
“We had this in the mid-2000s when hacker and fraud forums popped up and they were all teaching each other. It made us really, really nervous about how quickly a lay hacker could get up to speed. This is just another iteration of that [except] much, much faster and much, much better.”
—Stephen Ward, Managing Director, Insight Partners

AI Empowers Security Teams to Be More Effective and More Efficient

AI is perfectly suited for sifting through large amounts of data very quickly and automating complex actions, which means it excels in reliable threat detection. By combing through an organization’s network, AI-powered solutions create a baseline of good behavior and trusted devices. The AI then flags any deviations that might indicate a threat.

Additionally, the panelists agreed that AI has the potential to significantly enhance the efficiency and effectiveness of security operations. By using AI to filter out false positives and automate routine tasks, security teams can focus on more strategic and value-added work.

“We're now feeding the contents of suspicious inbound email messages into a large language model to discern whether they were created by generative AI. This helps us detect more sophisticated phishing and BEC messages that lack some of the indicators of human-created attacks. Sometimes it takes generative AI to detect a generative AI-created threat.”
—Bradley Schaufenbuel, CISO, Paychex
“We're reducing the time that an analyst spends chasing down a given threat by using the AI engines. That's measurable, and it benefits the entire organization.”
—Patrick Hellman, Vice President and Chief Security Officer, Arrow Electronics

Enterprises Must Embrace the Paradigm Shift

AI is still an emerging technology, and even the experts aren’t certain where it will go in the years to come. But for these CISOs, it’s clear that AI is here to stay, and embracing it is essential in order to stay ahead of threats.

Further, while AI is undeniably powerful, the panelists emphasized the need to ensure your organization isn’t just using AI for AI’s sake. They highlighted the importance of understanding the specific functionality of AI-powered tools and the outcomes they aim to achieve, such as reducing false positives, decreasing response times, and improving overall threat detection.

“Necessity prompted us to start using AI-enhanced security tools. The more cybercriminals leverage AI, the more sophisticated attacks become, and the lower the efficacy of our traditional security tools.”
—Bradley Schaufenbuel, CISO, Paychex
“Innovation requires bravery. We're very lucky to be a part of this moment. There's going to be a lot of bravery that's needed over the next 10 years to really see where this takes us. But it's an incredible time to be in this space.”
—Stephen Ward, Managing Director, Insight Partners
“Using AI to fight AI is the key. Our teams loved jumping in and seeing what the tools could do. And with that, we have to apply some guardrails. But don't be afraid of the tool. Get in, use it, and see how it can help you do your job and fight the bad guys.”
—Patrick Hellman, Vice President and Chief Security Officer, Arrow Electronics

For additional insights into the evolving threat of AI, watch the on-demand recording of Fighting AI with AI: A CISO Panel on Security Best Practices.

Watch the Webinar
How CISOs Are Staying Ahead of Bad AI with Good AI

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B PFPT
Discover how Abnormal Security detected a sophisticated phishing attack that evaded both Proofpoint and DarkTrace, and learn how it outperforms traditional solutions in combating modern email threats.
Read More
B Writing Detection Rules with LL Ms Blog
Discover how Abnormal Security leverages large language models (LLMs) to automate and enhance email threat detection with AI-generated detection rules.
Read More
B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More