Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Amazon’s director of security on locking down enterprise AI

By CIO Dive by By CIO Dive
July 18, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

Cybersecurity is a growing concern for organizations as they sprint to bring AI into the enterprise. 

Amid deployment efforts, AI security issues have surpassed ransomware for nearly one-third of security chiefs, according to Arctic Wolf data. The technology’s reliance on company data to create accurate results puts cybersecurity front and center.

In June, CIO Dive spoke with Mark Ryland, director of security at Amazon, about AI’s rapid rise, how executive concerns are evolving and the impacts the technology is having on cybersecurity defense. 

Editor’s note: This interview has been edited for length and clarity.

INDUSTRY DIVE: What is it about these latest iterations of AI, be it generative or agentic, that makes it a greater security challenge in certain respects? Why are we seeing higher concern related to AI?

MARK RYLAND: The fact that these are non-deterministic systems that can give different results with the same input: That’s something that computer people have never been accustomed to. And the fact that people are just trying to apply these tools across a broad range of business problems is also a factor. We’ve seen hype cycles before, but this one is a little different. There is major transformation happening, for sure, and business transformations that will result from the use of this powerful technology that can use structure and unstructured data.

How has AI changed cybersecurity work for organizations? Where do you foresee it having its greatest impact? 

It’s already having a big impact, starting with something very simple like human language queries of analytics tools. If I’m training a cybersecurity analyst, now they can just ask intelligent questions in human language and get very good results very efficiently. Another area that we see immediate benefit is contextual summarization. If there’s a security issue, a human files a ticket that says, “Hey, I think there’s something wrong here,” and now, an AI system can bring in an entire corpus of similar tickets that a human might not have been able to find with a text search. On the proactive security side, our AppSec team is using AI for better, automatic test generation. There are lots of benefits already that we’re seeing, and I feel like we’re just getting started.

How will the adoption of these technologies impact the cybersecurity sector workforce? 

I think the desirable outcome, and the one that we’re working toward, is increasing the capacity of human experts to be much more efficient and do work that was difficult to do. At the same time, we don’t want to stop the process by which humans develop expertise and judgment in these areas. As an industry, we have to find a way to continue to train people, but at the same time recognize that the tools can do a lot of the work that they used to do. I think maintaining a goal of keeping human expertise at a high level is important.

How can organizations improve their cybersecurity posture as they adopt agentic AI?

What we were advocating for people to do is to continue to use deterministic checkpoints on an agentic system. If you use identity-based controls, you have the ability to lock things down – this identity can only access this set of data. Then, if an agent is running as that identity, you’ve now constrained the ability of the agent to do things that you don’t want it to do. Treat the agent itself as a human actor that can also make mistakes. “Human-in-the-loop” will also be important for a while. Human-supervised feedback can also become part of a model which then improves the accuracy of the agents.

Do you have any advice for how IT and security can work more collaboratively with each other?

You’ve got to make security just as much a part of the goals you’re trying to achieve as performance, costs or any other kind of criteria in an engineering effort. We’ve got to get to a point where the easiest path is a secure path, where software engineers are given an environment in which they write the business logic, but everything else is built right in for them. Another pattern that we’ve seen help is creating a cloud Center of Excellence, a joint skills team with the CTO, the CIO, CISO, all contributing experts can help engineering teams to modernize and onboard to cloud technology.



Source link

By CIO Dive

By CIO Dive

Next Post
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Recommended.

Disney and Universal Sue AI Company Midjourney for Copyright Infringement

Disney and Universal Sue AI Company Midjourney for Copyright Infringement

June 11, 2025
The 20 Coolest Identity Access Management And Data Protection Companies Of 2025

The 20 Coolest Identity Access Management And Data Protection Companies Of 2025

February 18, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio