ema-logo-secondary-c

Cybersecurity Awesomeness Podcast Recap - Episode 109: Using AI for Cyberattacks

May 20, 2025 9:16:30 AM

Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.

In the fast-evolving landscape of cybersecurity, where threats become more sophisticated by the day, the introduction of agentic AI marks a pivotal moment in how IT practitioners approach their security challenges. Following the recent RSA Conference, this topic has garnered significant attention, particularly due to its implications for both defenders and attackers in the digital realm. In a recent episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler delve into the intricacies of agentic AI, shedding light on how this technology is transforming operational workflows in the network operations center (NOC) and security operations center (SOC).

Agentic AI refers to intelligent systems that assist organizations in achieving specific operational goals. In cybersecurity, this means more than just the automation of tasks; it involves intelligent decision-making capabilities that can streamline responses and enable quicker reactions to threats. While the potential benefits of agentic AI are exciting, the implementation of these systems is still in its nascent stages, lending itself to both opportunities and risks.

One of the most gripping revelations from the conversation is the dual-edged sword of agentic AI. Not only is it revolutionizing how security teams operate, but it's also enabling threat actors to optimize their attacks. Agentic AI systems that can perform reconnaissance far more efficiently are replacing the traditional methodologies cybercriminals employ—characterized by probing networks for vulnerabilities. This advancement creates a paradox in which adversaries are leveraging the very tools designed to safeguard digital environments to enhance their attack capabilities.

Ken Buckler points out how threat actors can utilize agentic AI for more effective lateral movement within a compromised network, allowing them to gather information, acquire access, and potentially escalate privileges without triggering typical network alarms. This new breed of cyber-attack not only highlights the growing urgency for protective measures, but also encapsulates the evolving nature of the cat-and-mouse game that defined cybersecurity for decades. As the discussion unfolds, listeners are invited to contemplate how their organizations can adapt to this rapidly changing environmental landscape, where speed and efficiency are paramount.

One of the pressing concerns raised in the podcast is the gap between detection and response capabilities in many organizations. While advancements in intrusion detection have accelerated, the sophistication in response strategies has not kept pace. As Chris emphasizes, it is not enough to simply identify threats; the response mechanisms must be equally robust to mitigate risks swiftly. This need for urgency is compounded by the increasing velocity of threats, which shifted from days or weeks to mere seconds.

The benefits of understanding agentic AI, both from defensive and offensive perspectives, cannot be overstated. As organizations invest in automated systems, they must also develop strategies to combat the inevitable exploitation of these technologies by malicious actors. The podcast serves as an essential resource for IT practitioners and decision-makers looking to deeply comprehend the implications of agentic AI.

To gain further insights into these discussions and explore the forefront of cybersecurity strategies, we encourage you to listen to the full podcast episode. Additionally, for more expert analyses and resources, visit Enterprise Management Associates at www.enterprisemanagement.com.

You can find the Cybersecurity Awesomeness Podcast at www.cybersecurityawesomeness.com. To gain deeper insights and hear firsthand comments from Chris and Ken on these vital topics, we invite you to listen to the full podcast. Furthermore, for more resources and expertise on cybersecurity, visit Enterprise Management Associates at www.enterprisemanagement.com.

Chris Steffen & Ken Buckler

Written by Chris Steffen & Ken Buckler

Christopher Steffen, CISSP, CISA, is the vice president of research at EMA, covering information security, risk, and compliance management. Before EMA, he served as the CIO for a financial services firm, focusing on FedRAMP compliance and security. He has also served in executive and leadership roles in numerous industry verticals. Steffen has presented at numerous industry conferences and has been interviewed by multiple online and print media sources. Steffen holds over a dozen technical certifications, including CISSP and CISA.

Kenneth Buckler, CASP, is a research director of information security/risk and compliance management for Enterprise Management Associates, a leading industry analyst and consulting firm that provides deep insight across the full spectrum of IT and data management technologies. Before EMA, he supported a Federal agency’s Enterprise Visibility program, providing security insights and compliance trending for the agency’s national network of computers and devices. He has also served in technical hands-on roles across multiple agencies in the Federal cyber security space and has published three Cyber Security books. Ken holds multiple technical certifications, including CompTIA’s Advanced Security Practitioner (CASP) certification.

  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts