Agentic AI & the urgency trap: Why explainability and governance must come first
Learn how explainability, governance, and auditability in agentic AI systems help ensure safe, ethical, and accountable deployment while keeping innovation on track.
Insights from the information-packed cybersecurity conference.

If you guessed that a dominant theme at SecureWorld Charlotte would be Artificial Intelligence, you would be correct. But while AI is demanding attention from all security professionals, conversations about security fundamentals and funding are still center stage. Here are our three key takeaways from the event:
Cyber threats may be evolving, but traditional attack methods aren’t going anywhere.
While much attention is now drawn to the challenges new tech may pose, cybersecurity leaders from various industries emphasized the ongoing relevance of traditional hacking methods such as brute force attacks, social engineering, and malware.
These strategies, though considered “old”, are surprisingly effective due to human vulnerabilities. The continued use of weak passwords is a shining example of such a vulnerability. As is the susceptibility of humans to sophisticated phishing scams. These simple, but clear vulnerabilities perpetuate the use of traditional tactics.
As we fortify defenses against new threats, it’s critical not to overlook safeguarding against traditional attack methods. The key lies in maintaining vigilance against the full spectrum of cybercrime, both old and new.
Strategies for combating traditional cyber threats:
There is no doubt that AI has the potential to create cyber superheroes. However, many cybersecurity professionals are struggling with adoption and usage.
The lack of industry agreement on a framework for AI use, governance, and standardization are huge roadblocks to adoption and utilization because organizations are left to independently develop essential guardrails.
Cybersecurity professionals are also struggling to trust AI – can it assist them without displacing them at the same time?
This fear, coupled with a lack of governance and standardization, makes for a challenging AI journey. But that journey can be made much less arduous if it starts on solid ground.
Unlocking the value of AI while creating the right protections is possible. If the right actions are taken up front, roadblocks can be overcome.
Essential actions to effectively leverage AI:
Four years ago, when the world grappled with the impact of COVID-19, investments in workplace technologies surged. Soon after, ransomware evolved, affecting business continuity in unprecedented ways. This prompted another wave of technology investments, primarily in cybersecurity.
Those investments have now changed.
Because some previous investments were made in haste, neglecting strategic integration or long-term sustainability, budgets are now under scrutiny, and organizations are evaluating their technology spending.
Showing return is critical, even for essential investments like cybersecurity.
To increase funding for cybersecurity initiatives, Chief Information Security Officers (CISOs) must not only quantify cyber risks but also articulate and quantify the benefits of their initiatives. The C-suite recognizes the critical nature of cybersecurity but now demands increased proof of performance.
Strategies to support increased cybersecurity funding:
Between the innovation opportunities that lie with AI, and the continued prioritization of cybersecurity by the C-suite, it was clear that SecureWorld attendees and speakers all agree the future for cybersecurity is bright. They also agreed that while new challenges may arise, applying foundational principles and tactics can be extremely impactful. Do you agree?
Practical Guidance & Threat Intelligence
Stay a step ahead of the competition–and attackers–with fresh perspectives, practical guidance, and the latest threat intelligence.
Learn how explainability, governance, and auditability in agentic AI systems help ensure safe, ethical, and accountable deployment while keeping innovation on track.
Our team shares key takeaways from Black Hat 2025, including why foundational security practices, AI governance, and insider threat management are more critical than ever for building resilience and aligning cybersecurity with business strategy.
Joseph Karpenko, Field CISO, shares ways to master foundational security practices to dramatically reduce risk, enhance operational resilience, and empower you to stay ahead of evolving cyber threats.
