Podcast Summary: Navigating AI Risks and Resilience in Cybersecurity with Rick Hemsley
To The Point – Cybersecurity (Forcepoint)
Host: Rachael Lyon, co-host Jonathan Knepher
Guest: Rick Hemsley, UK&I Cybersecurity Consulting Leader, EY
Date: April 28, 2026
Episode Overview
This episode dissects the complex intersection of artificial intelligence (AI), evolving threats, and cyber resilience. Rachael Lyon and Jonathan Knepher sit down with Rick Hemsley from EY to explore the rapidly changing threat landscape and the mounting challenges organizations face as AI becomes both a tool for defenders and attackers. The conversation weaves together practical frameworks, real-world statistics, governance challenges, and the critical role of trust and human judgment as the AI age accelerates.
Key Discussion Points & Insights
Rick Hemsley’s Cybersecurity Journey
- Career Background (02:31–05:08)
- Rick’s entry into cybersecurity was triggered by a blend of early computer science fascination and inspiration from the book Cuckoo’s Egg by Clifford Stoll.
- “It just got me excited about how things were connected and how they could do things maybe that they weren’t meant to.” (03:31, Rick)
- Twenty-five years in the field, Rick attributes his longevity to passion over money—“It was definitely passion.” (04:44, Rick)
- The human drive and ongoing evolution in cybersecurity are highlighted as key motivators.
The Advent of AI in Cybersecurity
- Timeline of AI Awareness (05:32–07:10)
- About 3.5 years ago, Rick and colleagues began treating AI as an imminent threat vector, initially focusing on its use in crafting malware and phishing.
- Noted the rapid rise in both offensive and defensive AI capabilities—“We’re seeing attacks happen at machine speed. Our defenses need to be at machine speed.” (06:32, Rick)
- Compares today’s “AI” hype to the “Zero Trust” trend at past RSAs.
Understanding the NAVI Framework
- Defining NAVI (07:36–09:24)
- NAVI: Nonlinear, Accelerated, Volatile, Interconnected
- Describes how today’s cyber environment is unpredictable and fast-moving, demanding constant vigilance and adaptability from defenders.
- “We see one constant thing in cyber, and that's change.” (08:06, Rick)
- AI introduces even greater unpredictability—“Zero click attacks on AI… were eye opening.” (09:05, Rick)
Machine-Speed Threats and Dwell Time Drops
- Impact of AI on Threat Actor Capabilities (09:58–10:48)
- Machines now operate and “break out” within seconds during cyber intrusions.
- “Humans are not breaking out at that pace... it’s machines.” (10:14, Rick)
- Organizations are often caught lagging, reacting slower than attackers leveraging AI.
Governance Gaps and the Rush to Innovate
- AI Governance Realities (11:36–12:38)
- Rick notes a sizable gap between business-driven AI innovation and the slower pace of security and IT controls.
- “If we’re relying on legacy controls... threat actors can exploit that gap, they can be more agile.” (12:09, Rick)
- Key stat: 68% of organizations allow employees to build and deploy AI agents with minimal oversight.
- Business pressure often outweighs caution, heightening risk.
The Limits of Shifting Left
- Security as Innovation Enabler (13:04–14:13)
- Traditional security “shift left” thinking isn’t enough—organizations need security teams embedded as partners, not just as late-stage gatekeepers.
- “It’s a flip in mindset of being an enabler, not a blocker... managing risk and establishing some of those guardrails.” (13:32, Rick)
Surging Phishing Attacks & The Human Factor
- Adversarial Attacks and Overlapping Threats (14:13–16:36)
- AI-generated phishing is up 67%, overall phishing attacks up 442%—traditional signs are vanishing, making detection trickier.
- No silver bullet exists; both technology and continual human awareness are required.
- “Well trained, informed, skeptical users... will provide much more resilience than any tooling alone.” (15:24, Rick)
- Identity programs must expand to include robots and AI agents as “insiders.”
Large Language Model (LLM) and AI Supply Chain Risks
- Third-Party and Supply Chain Attacks (16:36–18:08)
- Transparency and rigorous third-party controls are essential to protect “crown jewels” from exposure via external AI solutions.
- “Look for those hidden dependencies and vulnerabilities, just as we would in software engineering.” (17:40, Rick)
Human Judgment vs. Autonomous Decision-Making
- Balancing Machine Speed and Human Oversight (18:08–20:28)
- Discussion on “agentic AI” raises the specter of AI-controlled system decisions (with memorable reference: “Your agents are my minions”).
- Trust and judgment remain vital: “Without some judgment remaining in the loop, I think we’re missing ourselves. But... there are some things we’re just going to have to accept, have to be done at machine speed.” (19:18, Rick)
Detecting and Defending Against AI-Driven Threats
- Detection and Insider Risk (20:28–21:16)
- AI models must be treated like human insiders; same rigor in monitoring is essential.
- “Don’t separate them into ‘they’re a machine’... they’re an entity operating with your data.” (20:57, Rick)
Real-Time Response Imperative
- AI to Defend Against AI (21:16–22:41)
- Only way to combat AI-driven, real-time threats: use AI in defense (“AI to solve for AI.” (21:54, Rick)).
- SOCs implementing autonomous agents to manage and mitigate threats.
Elevating Security at the Executive Table
- Bridging the Boardroom Gap (22:41–25:06)
- Best CISOs are “talking the language of the business,” using stories of regulatory and reputational risk to gain influence.
- “Seek first to understand and then kind of take people on the journey with you.” (24:15, Rick)
- Recommendation to use frameworks like the UK’s Cyber Governance Code of Practice for communicating effectively with boards.
Wait-and-See vs. Proactive AI Security
- The Cost of Hesitation (25:06–27:36)
- Waiting exposes organizations to loss of trust and reputational damage.
- “If you wait and see, you are endangering that trust.” (25:52, Rick)
- AI represents a rare “greenfield” for building in security from the start.
Actionable Steps for Listeners
- Rick’s Top Recommendations (27:36–28:31)
- Implement “guardrails” as outlined in the EY report.
- Work proactively—security teams must champion delivering trust, resilience, and competitive advantage in the NAVI world.
Quantum Computing: Emerging Risk or Hype?
- Quantum Threat Perspective (28:31–30:30)
- Draws a parallel to Y2K: inventory cryptographic dependencies now, as quantum threats could materialize before legacy encryption is updated.
- “We are still using things that were broken 15 years ago... we need to be on top of it.” (29:27, Rick)
Notable Quotes & Memorable Moments
- On AI in Cybersecurity:
- “We’re seeing attacks happen at machine speed. Our defenses need to be at machine speed.” (06:32, Rick Hemsley)
- On the Human Factor:
- “Well trained, informed, skeptical users... will provide much more resilience than any tooling alone.” (15:24, Rick Hemsley)
- On Insider Threats in the AI Era:
- “Your agents are my minions.” (18:50, Citing an RSA talk)
- “Treat your data flows... as you would with an insider risk program.” (20:34, Rick Hemsley)
- AI for Defense:
- “The only way we can do that is by adopting and using AI ourselves.”
- “AI to solve for AI.” (21:54, Rick Hemsley)
- On Governance:
- “The best CISOs... are talking the language of the business... and translate between tech teams and executives.” (24:15, Rick Hemsley)
- On Waiting for Regulation:
- “If you wait and see, you are endangering that trust.” (25:52, Rick Hemsley)
- On Quantum:
- “We are still using things that were broken 15 years ago… we need to be on top of it.” (29:27, Rick Hemsley)
Recommended Actions (Key Takeaways)
- Establish Clear Guardrails: Use risk frameworks to guide safe AI implementation.
- Embed Cybersecurity as a Business Enabler: Security must support—not block—innovation.
- Treat AI as Insiders: Apply insider threat rigor to AI agents, not just humans.
- Leverage AI for Defense: Invest in automation in SOCs and response functions.
- Communicate in Business Terms: Security leaders must connect cyber risks to business outcomes to influence at the executive level.
- Prepare for Quantum: Start inventories and prioritize cryptographic updates now, not later.
Timestamps for Important Segments
| Timestamp | Segment Description |
|-----------|------------------------------------------------------------|
| 02:31 | Rick’s cybersecurity origins and motivation |
| 05:32 | Early awareness of AI risks in cyber threat landscape |
| 07:36 | Introducing NAVI – Nonlinear, Accelerated, Volatile, Interconnected |
| 09:58 | AI’s impact on dwell time and machine-speed attacks |
| 11:36 | Gaps in AI governance and business-driven innovation |
| 13:04 | Shift left limitations—cybersecurity as a partner |
| 14:13 | Surge in AI-driven phishing and the importance of user awareness|
| 16:36 | Supply chain and third-party risks from large AI models |
| 18:08 | Balancing automation and human judgment |
| 20:28 | Treating AI models as insiders and monitoring accordingly |
| 21:54 | Adopting “AI to solve for AI” in defense |
| 22:41 | Recommendations for CISOs to communicate with executives |
| 25:06 | Risks of a “wait and see” approach to AI security |
| 27:36 | Concrete actions for cybersecurity teams |
| 28:31 | Quantum computing as a looming risk |
This episode offers a realistic, deeply insightful roadmap for navigating AI’s risks while building organizational resilience—in Rick’s words, to “help the organization keep pace in that NAVI world.” Good guardrails, human/AI partnership, and proactive governance are essential as we race toward an unpredictable, machine-accelerated future.