Page 45 - Cyber Defense eMagazine September 2025
P. 45
Why this matters:
• AI drift is real: Models degrade over time or are subtly manipulated.
• Real-time detection stops breaches early: Intervention happens before significant harm.
• Trust becomes fluid: Access isn't binary; it's recalculated continuously.
Takeaway: CISOs must expand Zero Trust beyond humans to include the algorithms themselves.
3. Quantum Security: The Cryptographic Doomsday Clock is Ticking
Quantum computing threatens to break much of today's encryption — and adversaries are already
harvesting encrypted data now to decrypt later. Waiting until "Quantum Day" is a recipe for crisis.
Case Study: Post-Quantum Cryptography (PQC) Rollout
A Canadian government agency adopted a three-phase PQC migration plan aligned with NIST's
recently finalized standards:
1. Inventory: Identify all cryptographic assets and dependencies.
2. Hybrid Deployment: Run PQC and traditional encryption side-by-side to ensure backward
compatibility.
3. Agile Orchestration: Automate cryptographic updates across systems.
Result: They reduced quantum-vulnerable data exposure by 70% in under a year.
Reality check for CISOs: PQC migration is not optional — it's a race against time.
4. Governance Beyond IT: The AI & Quantum Risk Board
AI decisions affect finance, law, healthcare, and public safety. Security leadership must be integrated
with ethics, compliance, and strategy.
Case Study: A Healthcare Network's Bold Move
They created an AI & Quantum Governance Board — a cross-functional body including legal,
compliance, R&D, and security. The board:
• Reviews all AI model change logs.
• Tracks PQC migration milestones.
• Runs annual simulated quantum breach exercises.
The success of the Healthcare Network's approach lies in its cross-functional governance. By
bringing together legal, compliance, R&D, and security, the AI & Quantum Governance Board
eliminates blind spots and accelerates risk mitigation. This is a model that all organizations should
consider.
Cyber Defense eMagazine – September 2025 Edition 45
Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.