Securing AI in the business, Understanding AI in security

Why AI Sec? Why now?

 

7th May 2026, London, UK

 

According to a recent survey of 2,250 IT and cyber decision makers across 21 countries, 81% of global businesses are already using AI-driven tools as part of their cybersecurity strategy. This figure is even higher in the UK; 86% of businesses have incorporated AI. The survey underscores that AI and automation are considered top priorities for improving cybersecurity over the next 12 months by 42% of organisations surveyed. Companies see AI as a critical tool for staying ahead of threats and managing increasingly complex digital environments. However, 94% of global businesses believe that AI will negatively affect their cyber risk exposure within the next 3-5 years. In the UK, 66% of businesses surveyed are concerned that AI-driven attacks will increase significantly in both complexity and scale during this period.

 

The inaugural AI Sec Summit will cover the critical topics in both securing organisation adoption of AI...

 

Data Protection, Privacy & Confidentiality Leakage Risks
Preventing unintentional data exfiltration into LLMs. Guardrails for prompt injection, retention, training-data exposure and shadow Al.

Secure Al Model Development & MLOps Hardening
Supply-chain risks in model weights, training pipelines, and open-source components. Securing feature stores, model registries, datasets and automated deployment paths.

Al-Augmented Cyber Attacks
Adapt detection and control frameworks for automated phishing, synthetic identities, deepfake authorisation, and other offensive Al-enabled attacks.

Human-Al Interaction & Control Boundaries
Preventing automation bias, over-trust, and "rubber-stamping" of AI outputs. Designing human-in-the-loop vs human-on-the-loop architectures.

Operational Resilience & Al Failure management
Al as a potential single point of failure. Resilience testing for autonomous agents, chain-of-thought suppression, fall back modes and kill-switch design.

Regulatory Landscape, Compliance & Liability
EU Al Act high-risk controls, UK principles-based approach, US AI EO, NIS2, DORA, GDPR. Mapping these into control frameworks, RCSAs, and testing cycles.

 

…and the critical topics around AI in security including:

 

Al-Driven Identity Security & Insider Threat Detection
Models flagging impossible travel, anomalous privilege escalation, sensitive-data access, Al-agent misuse. Detection of compromised API keys and model-to-model interactions.

Al-Powered Vulnerability Discovery & Code Security
Models that scan codebases, laC, and microservices for exploitable patterns. AI accelerated fuzzing and automated patch recommendation.

Al Anti-Phishing & Social Engineering Defences
Real-time detection of Al-generated phishing, deepfake voice/video attacks, and synthetic identities. Behavioural biometrics and intent modelling for high-risk approvals.

Al for Supply-Chain & Dependency Risk
Detecting malicious libraries, poisoned datasets, adversarial model weights and compromised training pipelines. Al-driven analysis and anomaly detection.

Al-Enhanced SOC Operations
Triage copilots, incident-response assistants, and automated enrichment of alerts. Natural language correlation across logs, chats, tickets, detections and threat intel.

Intelligent Threat Detection & Behavioural Analytics
ML models learning normal vs anomalous identity, access, network and API patterns. Adaptive baselining for LLM usage.

 

AI sec will look at how cybersecurity professionals can stay 
ahead of this rapidly evolving environment.

Join our real-life case studies and in-depth technical sessions from 
the most sophisticated teams globally. 

 

View highlights from a recent AKJ Associates event here: