Artificial intelligence is changing the world of cybersecurity at a pace few could have predicted. For defenders, AI is a powerful ally,ย automating detection, acceleratingย responseย andย identifyingย vulnerabilities before attackers exploit them. But for cybercriminals,ย itโsย a newย weaponย amplifyingย their reach and precision.ย
In my experienceย as a crisisย communicationsย andย cyberย incidentย responseย expertย working with companies across industries,ย from finance and healthcare to manufacturing and education,ย one thing has become clear,ย AI is making both sides of the cybersecurity equation smarter. Unfortunately, the bad actors are often faster.ย
The Double-Edged Swordย Called AIย
AI is a force multiplier. Security teams are using it to analyze massive data sets, flagย anomaliesย and automate containment processes that used to take hours.ย Thatโsย the goodย news.ย
Theย bad newsย isย threat actors are using AIย as well,ย to craft more convincing phishing e-mails, mimic executive voices,ย identifyย weak points in networks and launch targeted social engineeringย campaigns atย scale.ย The days of phishing e-mails with misspelled words and bad design areย a thing of the past.ย
Recent research by IBM found 51% of breaches now involve AI-assisted tools used by attackers, shortening the time between infiltration and data exfiltration. Combine that withย deepfakeย technology and syntheticย identitiesย andย itโsย easy to see how AI has become both a friend and foe in cybersecurity.ย
The Myth of Preparednessย
Despite these evolving threats,ย far too manyย organizations believe they are ready to respondย to a cyber event. Unfortunately, that confidence is often misplaced.ย
Time and again, I see companies that have invested heavily in technology but neglected to prepare for the human side of cyber incidents,ย the communications,ย theย coordinationย and the rapid decision-makingย requiredย when an attack hits.ย The elements of reputationย managementย thatย are the real perils that face a company experiencing a cyber event.ย
They have incident response plans, but those plans areย in many cases more theoretical thanย actionable. Theย plan looksย good on paper and checksย the box from aย Board oversightย perspective,ย butย when ransomware locks systems or a data breach hits the headlines, those same plans fall apart.ย
The simple truthย isย a plan that has never been tested is not a plan.ย Itโsย a false sense of security.ย
When Theoreticalย Plans Failย
The difference between theoretical and actionable plans becomes painfully obvious in the first hour of a cyber event. Theoretical plans often rely on ideal circumstances,ย systems working, e-mailsย flowingย and decision-makers readily available.ย
Reality rarely cooperatesย when it comes toย a cyber event.ย
When a companyโs systems are encrypted, the e-mail server may be down. Key contact lists may be inaccessible. Executives may be traveling. And the clock is ticking. The team quickly realizes theyย donโtย knowย whoโsย responsible for what, what to say publicly, or how to reach stakeholders.ย
Panic and confusion take over, resulting in confusion,ย delaysย and reputational damage that can last far longer thanย the technicalย disruption.ย
The Five Cs of Effective Responseย
Thatโsย why I encourage companies to focus on what I call the Five Cs of Cyber Incident Response: Communication, Coordination, Clarity, Credibility and Confidence.ย
Eachย elementย plays a critical role inย determiningย whether a company recovers quickly or collapses under pressure.ย
- Communication:ย Who needs to know what,ย whenย and how? This includesย key stakeholders such asย employees, customers, vendors,ย regulatorsย and the media. Silence or inconsistent messaging fuels speculation and distrust.ย
- Coordination:ย Ensure all parts of the response teamย —ย IT, legal, HR,ย communicationsย and leadershipย —ย are aligned.ย
- Clarity:ย Provide fact-based information.ย Donโtย speculateย or promise outcomes youย canโtย guarantee.ย
- Credibility:ย Transparency builds trust. If you make a mistake,ย ownย it.ย
- Confidence:ย A calm,ย factualย andย unified response reassures stakeholders and stabilizes the situation.ย
When companies rehearse these elements through tabletop exercises and simulated incidents, they turn theory into muscle memory.ย
Reputational Fallout: The Forgotten Riskย
While the financial and operational impacts of a cyberattack are well-documented, the reputational toll often receives less attention,ย untilย itโsย too late.ย
A single poorly handled incident can erase years of trust. In many cases, the reputational fallout costs more than the breach itself. Theย Cost of a Data Breach Report 2024ย from IBMย reportedcompaniesย with a strong incident response plan and tested communications strategy saved an average of $1.49 million per breach compared to those thatย didnโt.ย
Thatโsย not just a number.ย Itโsย the difference between a company thatย emergesย stronger and one that loses customers,ย investorsย and credibility.ย
Reputation management is not a post-incident activity.ย Itโsย an integral part of cyber preparedness.ย When a breach happens, the public judges not just what occurred but how the organization responds.ย
Building an Actionable, Tested Planย
An actionable plan goes beyond IT protocols.ย Itโsย a cross-functional framework that defines roles,ย responsibilitiesย and communication pathways when normal systems fail.ย
Here are some of the most important steps Iย advise organizations toย take:ย
- Establish a cross-functional incident response team.ย Include representatives fromย across your organization, such asย leadership, IT, legal, HR,ย salesย and communications.ย
- Identifyย and engageย externalย cyber incident response expertsย in advance.ย Identifyย your insurer, forensics firm, data privacyย counselย and crisis communicationsย experts.ย
- Test the plan regularly.ย Tabletop exercises expose gaps and build confidence acrossย the response team.ย
- Prepare communication templates.ย Have pre-approvedย messaging for all stakeholders, such asย employees, customers,ย vendorsย and media.ย
- Ensureย plan accessibility.ย Store critical contact lists and procedures in print or secure formatsย separated from your organizationโsย onlineย systems.ย
- Integrate reputation management.ย Make protectingย trustย a key responseย objective, not an afterthought.ย
The goal is simple,ย eliminateย surprises when the unexpected happens.ย
AIย Isnโtย Going Away,ย But Neither Is Human Judgmentย
AI will continue to reshape the cybersecurity landscape. Defensive systems will getย smarterย and attackers will become more sophisticated. But amid all the automation, human judgmentย remainsย the mostย valuable assetย in a crisis.ย
The companies that weather cyber incidents best are those that empower people,ย not just systems,ย to act quickly, communicate clearly and lead with integrity.ย
AI may change the tools we use, but itย doesnโtย change the fundamentals: preparation,ย testingย and teamwork.ย
Prepare, Test, Repeatย
Cyber events are here to stay. The questionย isnโtย whether your organization will be targeted, but whenย and how wellย youโllย respond.ย
With AI making attacks faster, moreย deceptiveย and more damaging, now is not the time for complacency.ย ย
Build a plan, testย itย and make sure it works in the real world,ย not just on paper.ย
Because in todayโs environment, the difference between a company that survives a cyber event and one thatย doesnโtย oftenย comesย down to a single factorย —ย preparedness.ย


