The role of intelligence in modern security
A core theme of the interview is the value of intelligence-led security, an approach that integrates intelligence into strategic, operational, and tactical decision-making. Rather than reacting to incidents after they occur, organizations can use intelligence to understand emerging threats, assess potential impacts, and act proactively.
This approach aligns security with business priorities, enabling leaders to better allocate resources, reduce uncertainty, and focus on what matters most.
Technology as a force multiplier
Emerging technologies such as artificial intelligence and machine learning are reshaping the security landscape. These technologies can be powerful tools for both defenders and attackers. Organizations that effectively integrate AI into their security strategies can gain significant advantages, but human expertise remains essential.
At Securitas' Risk Intelligence Center (RIC), technology and human analysis work together to ensure that advanced tools enhance, rather than replace, expert judgment.
Emerging threats: deepfakes and AI-enabled attacks
Among the most concerning developments are AI-driven threats such as deepfakes and synthetic media. These technologies are increasingly used in fraud and social engineering schemes, including cases where attackers impersonate executives using cloned voices or manipulated video.
Such tactics illustrate how modern threats often target people and processes, not just IT systems, and highlight the importance of awareness and verification practices across organizations.
Five principles for staying ahead of cyber threats
In the interview, Mike Evans also shared several key principles for organizations seeking to stay informed and agile in the face of evolving cyber threats:
-
Cyber attacks are not a matter of if, but when.
-
Threats evolve rapidly, often faster than defenses can adapt.
-
Attackers look for weak links, including human vulnerabilities.
-
Cyber incidents can create physical impacts, particularly in critical infrastructure.
-
Cyber threats extend beyond code, including misinformation, social media manipulation, and deepfakes.
The importance of critical thinking
Beyond technology and processes, he emphasizes the importance of critical thinking. In an era of information overload, the ability to question sources, evaluate claims, and assess potential manipulation is becoming increasingly important for both individuals and organizations.
Looking ahead
As the threat landscape continues to evolve, organizations must move beyond reactive security approaches. Intelligence-led strategies can help leaders anticipate risks, protect their operations, and respond with confidence.