AI in the right hands means efficiency, innovation and competitiveness. But AI in cyber attacks means cunning assaults that do not match known patterns and hit the organisation in areas where the IT department traditionally does not have control. This changes the playing field, shifts the threat landscape and affects how you as an IT manager must prioritise security work in your organisation.

Threat actors using AI is nothing new. But it has changed the threat landscape in several ways.
AI-generated communication intended to deceive is contextually adapted, linguistically accurate, and difficult to distinguish from legitimate messages even for trained eyes. Previously, we had the Nordic advantage with small languages acting as a natural filter. This is now disappearing. Large language models easily handle our Scandinavian languages, meaning this can no longer be considered a protection.
Malware adapts its behaviour based on the environment it encounters. This automated vulnerability analysis works quickly, faster than the sharpest security teams can react. This has resulted in the time margin between intrusion and escalation shrinking.
AI blurs the boundary between broad, generic campaigns and targeted attacks. Spear phishing can be conducted on a large scale, tailored to recipients' roles, industries, and organisations. But the scaling does not stop at social engineering. AI will scan and identify vulnerabilities with a power we have not seen before – automated, continuous, and faster than manual processes can respond. This is perhaps the single greatest shift: attackers gain industrial capacity without industrial cost. This in turn requires a corresponding build-up of awareness and resilience on the organisational side.
The ability to adapt means that threats increasingly fall outside the traditional scope of the IT department. This might involve deep fake calls to the chief financial officer, AI-generated supplier invoices matching ongoing projects, or manipulated voice messages or emails from a colleague.
The ability to customise means that threats increasingly fall outside the traditional scope of the IT department.
When the threat landscape shifts, it is reasonable to ask whether your existing security solutions are sufficient. For most organisations, the answer is uncomfortable. Not because protections are lacking, but because they were built for a different type of threat.
When attacks no longer follow known patterns, the accuracy of, for example, rule-based detection and signature-based tools decreases. This also affects vendor relationships. That an MSSP or SOC provider has AI capabilities does not say much if they cannot demonstrate how they concretely impact detection and response.
Training efforts must be adapted so that they are no longer based on yesterday's scenarios. Looking for spelling mistakes or strange senders does not prepare your staff when attacks become smarter. Incident planning is also affected. Especially those that assume human analysis at every step risk being too slow when the attack chain is automated.
When the threat landscape shifts, it is reasonable to ask whether your existing security solutions are adequate?
The question is therefore not whether you have protection in place, but whether you set the right requirements for it. Here are some questions to raise internally to adapt your cybersecurity to a threat landscape that changes every day.
What do we require from our suppliers? Move the conversation from "do you have AI" to "show me how your detection capabilities have evolved over the past year, what types of attacks do you identify today that would have gone unnoticed twelve months ago". Ask for concrete examples rather than feature lists and ask the same question to all suppliers.
Is our detection capability adapted for unknown patterns? Behaviour-based analysis and anomaly detection sound good in a product presentation. The question is whether this exists as an actual, tested capability in your environment?
No organisation solves this overnight, and that is not the point. The point is that the IT manager who understands how AI changes the playing field, and drives these questions internally, builds a significantly more resilient organisation. It doesn't start with a new tool, but with an updated picture of what you are actually facing.
