Get the Latest Report on How CISOs Are Leveraging AI in 2026
AI Heading Into 2026: CISOs See Change, Growth and Opportunity
Access objective, data-driven insights from IANS community polls and cross-industry CISOs to see how today's security leaders are approaching AI in practice. Download this report to understand:
- The evolving standards shaping AI policy and governance, and how CISOs are tightening access while building business-aligned oversight.
- How leaders are redefining AI vendor strategy, moving to multi-vendor models with stronger guardrails for data and operational risk.
- The top AI-driven priorities commanding executive focus in 2026, from workforces augmentation to identity assurance and AI-enabled threats.
Download the report to benchmark your AI strategy against real-world CISO practices and stay ahead of emerging risks.
What's the REAL Risk of Autonomy in AI Agents Today?
Many leaders dream of fully autonomous agents that can replace or augment staff. But the hard truth is: autonomy and control exist on opposite ends of a scale. In this video, Jake Williams, IANS Faculty, breaks down one of the biggest misconceptions about deploying Agentic AI.
IANS Faculty, Jake Williams, explains why CISOs, CIOs, and CTOs must have honest conversations about autonomy risk before setting unrealistic expectations.
Your employees want to use generative AI tools, especially chatbots. If you don't provide access to vetted and approved tools, employees will find ways to expose your data to unapproved tools.
Jake Williams, IANS Faculty
Additional Resources
Prompts for Testing AI Security
September 15, 2025
This document provides a detailed set of prompts to evaluate the security and data privacy guardrails of AI systems.

Paul Snyder
Mitigate These Five AI Risks
September 25, 2025
This report explores five critical risk areas: over-reliance on AI, AI bias, hiring misrepresentation through AI, combinatorial risks from agentic AI systems and AI tool sprawl.

Michael Pinch
Securing Microsoft 365 Copilot: A Checklist (Updated)
September 30, 2025
This checklist is designed to help security teams securely pilot and deploy specific Microsoft 365 (M365) Copilot features, such as M365 Copilot for Intelligent Search, Chat, Bing, SharePoint and Teams.

Wolfgang Goerlich
Prepare for Recursive AI Cryptographic Attacks
December 01, 2025
Building efficient key and secret management processes and testing the rapid rekeying of your cryptographic estate will become increasingly important as recursive AI is directed at keys and secrets reverse engineering. This report explains how to prepare for recursive AI cryptographic attacks.

Aaron Turner
AI Acceptable Use Policy Template
July 29, 2025
Find best practices to help create and govern your organization’s policy on acceptable generative AI use cases.
.png?sfvrsn=e4b46d1f_2)
Jason Robbins
Get More Cybersecurity Insights
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.