• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Process Compliance and Governance

AI at the centre of the cyber storm in Asia

allantan by allantan
February 24, 2025
AI at the centre of the cyber storm in Asia

AI at the centre of the cyber storm in Asia

Share on FacebookShare on Twitter

The Asia-Pacific (APAC) region is facing a relentless barrage of cyberattacks. In 2024, organisations in APAC experienced an average of 1,963 cyberattacks per week, exceeding the global average of 1,876, according to the FS-ISAC. A significant factor driving this surge is the increasing sophistication of AI-driven threats.

While artificial intelligence offers immense potential for innovation and efficiency, it has also become a powerful tool in the hands of cybercriminals, demanding a proactive and adaptive approach from security teams.

AI-enhanced cyberattacks are here

Artificial intelligence is no longer just a tool for innovation; it's a weapon in the hands of cybercriminals. Joseph Carson, chief security scientist at Delinea, notes that AI is "reshaping cybercrime, making attacks faster, smarter, and harder to stop." These aren't isolated incidents; AI enables criminals to learn, adapt, and evolve their tactics in real-time.

One of the most concerning developments is the use of AI to steal identities, a preferred method for gaining initial access to systems. Traditional security measures like passwords and multi-factor authentication (MFA) are increasingly insufficient against these sophisticated attacks. Defences need to be dynamic, continuously adapting to shifting risks.

Identify as the new perimeter

Given the increasing focus on identity theft, organisations must prioritise identity security. Carson advises, "Attackers increasingly target identities to gain access, and organisations must prioritise identity security." This requires a shift in mindset towards a zero trust strategy.

A zero Trust approach assumes that no identity or device is automatically trustworthy. Every access request must be verified, regardless of whether it originates from inside or outside the network. Identity Threat Detection and Response (ITDR) plays a critical role, enabling security teams to monitor behaviours, detect anomalies, and respond to threats instantly.

“AI-powered risk scoring and auditing provide an extra layer of protection, allowing organisations to spot unusual activity and block or challenge suspicious access before it escalates.” Joseph Carson

According to Delinea’s Identity Security Report, 78% of organisations plan to increase spending on identity security this year, prioritising ITDR, Privileged Access Management (PAM), and cloud identity governance to stay ahead of changing threats.

Related:  Okta Device Access to help organisations mature their zero trust strategy

Securing non-human identities

As AI and automation become more prevalent, non-human identities, such as bots, AI models, and DevOps tools, are outnumbering human users in many organisations. These machine identities are often overlooked in security strategies, making them vulnerable to misuse.

Carson warns that attackers "actively target non-human identities, also known as machine identities, to move laterally through systems undetected." Protecting these identities requires applying the same zero trust principles used for human users. This includes enforcing least privilege access, continuously verifying credentials, and securing sensitive machine-to-machine communications.

Intelligent authorisation for AI systems

AI-driven systems are now making autonomous decisions that impact business operations. However, many organisations lack visibility and control over their AI and automation workflows. Without strict security measures, AI models and automation tools can have excessive privileges and access, creating a significant security blind spot.

The key to securing AI systems is intelligent authorisation.

Joseph Carson

"Organisations must integrate PAM and Just-in-Time access controls into AI workflows, ensuring that AI-driven processes only access what they need, when they need it, with the right level of oversight." Joseph Carson

AI agents and automation tools must also adhere to strict identity security policies to prevent privilege creep and secure machine-to-machine interactions.

Behavioural monitoring and real-time alerts

Attackers are increasingly using deepfakes, AI-generated voice impersonation, and synthetic identity fraud to mimic trusted users. Traditional security measures often struggle to detect these evolving threats. Continuous behavioural monitoring and real-time alerts provide a crucial layer of defence by identifying unusual activity that could indicate an attack.

Monitoring deviations in login locations, session durations, or access requests allows organisations to flag suspicious behaviour and trigger additional verification before damage is done.

A critical investment for APAC businesses

APAC businesses face unique vulnerabilities, including credential theft, insider risks, and gaps in multi-cloud security. With nearly 90% deploying significant workloads across multiple public clouds, managing identity across fragmented systems is a major challenge. Attackers are exploiting these weaknesses, targeting privileged credentials to infiltrate critical infrastructure.

Related:  Cybersecurity trends and practices

Privileged Access Management (PAM) helps enforce least privilege, secure DevOps workflows, and detect identity threats before they escalate and move laterally across the network. Given the tightening cybersecurity regulations in the region, businesses can no longer afford to overlook privileged identity security.

Collaboration with cyber insurance providers

Cyber insurers are raising their standards, requiring organisations to implement strong identity security controls like PAM, MFA, and continuous identity monitoring to qualify for coverage.

In Singapore, the Personal Data Protection Act enforces strict data protection requirements, leading insurers to insist on stronger identity security controls to mitigate the risk of breaches.

Carson notes that businesses that "proactively strengthen identity security not only reduce their risk exposure but also improve insurability and secure better policy terms."

“By working closely with insurers, security teams can align their defences with evolving risk models, prioritising investments in Identity Threat Detection and Response and adaptive access controls.” Joseph Carson

Key takeaways for APAC CISOs in 2025

  • Embrace a zero trust mindset: Verify every access request, regardless of origin.
  • Prioritise identity security: Focus on protecting both human and non-human identities.
  • Implement ITDR: Monitor behaviours, detect anomalies, and respond to threats instantly.
  • Secure AI systems: Enforce intelligent authorisation and least privilege access for AI-driven processes.
  • Invest in PAM: Manage and protect privileged credentials to prevent lateral movement.
  • Collaborate with insurers: Align security measures with evolving risk models and regulatory requirements.
  • Continuous behavioural monitoring: Implement continuous monitoring and real-time alerts to detect unusual activity.

By adopting these strategies, CISOs and security teams in APAC can build robust defences against AI-powered cyberattacks and protect their organisations in the evolving threat landscape of 2025.

Tags: Artificial IntelligenceDelineaDevOpsidentity securityMFAZero Trust
allantan

allantan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses
  • Weak password reuse crisis remains

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl