{"id":6051,"date":"2026-04-01T20:40:02","date_gmt":"2026-04-01T20:40:02","guid":{"rendered":"https:\/\/globalnewstoday.uk\/index.php\/2026\/04\/01\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence-financial-post\/"},"modified":"2026-04-01T20:40:02","modified_gmt":"2026-04-01T20:40:02","slug":"ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence-financial-post","status":"publish","type":"post","link":"https:\/\/globalnewstoday.uk\/index.php\/2026\/04\/01\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence-financial-post\/","title":{"rendered":"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence &#8211; Financial Post"},"content":{"rendered":"<p>Cybersecurity is evolving from a technical discipline into a strategic foundation for economic participation<br \/>You can save this article by registering for free <a class=bookmark-link data-evt-skip-click=true href=\/register\/>here<\/a>. Or <a class=bookmark-link data-evt-skip-click=true href=\/sign-in\/>sign-in<\/a> if you have an account.<br \/><span data-contrast=auto>Artificial intelligence (AI) is moving rapidly from experimentation into the operational core of the economy. Systems that once analyzed information are now guiding decisions, executing\u00a0tasks\u00a0and interacting with other digital systems with minimal human oversight. This shift is transforming not only how businesses\u00a0operate\u00a0but also how they must think about security, governance and risk.<\/span><br \/>Subscribe now to read the latest news in your city and across Canada.<br \/>Subscribe now to read the latest news in your city and across Canada.<br \/>Create an account or sign in to continue with your reading experience.<br \/>Create an account or sign in to continue with your reading experience.<br \/><span data-contrast=auto>A new national report released this week by the Canadian Cybersecurity Network, <em>The\u00a0<\/em><\/span><i><span data-contrast=auto>State of AI, Cybersecurity and Digital Trust in Canada<\/span><\/i><span data-contrast=auto>, argues that the convergence of AI and cybersecurity will be one of the defining business challenges of the next decade. Launched at the NGen Advanced Manufacturing Conference in Toronto, the report makes clear that AI is reshaping the threat landscape on both sides of the equation,\u00a0fuelling\u00a0faster, more adaptive\u00a0cyberattacks\u00a0while also\u00a0emerging\u00a0as one of the most potent defensive technologies organizations have ever had at their disposal.<\/span><br \/>Get the latest headlines, breaking news and columns.<br \/>By signing up you consent to receive the above newsletter from Postmedia Network Inc.<br \/>A welcome email is on its way. If you don&#8217;t see it, please check your junk folder.<br \/>The next issue of Top Stories will soon be in your inbox.<br \/>We encountered an issue signing you up. Please try again<br \/>Interested in more newsletters? <a class=newsletter-link href=\/newsletters>Browse here.<\/a><br \/><b><span data-contrast=auto>AI\u00a0is\u00a0accelerating the\u00a0threat\u00a0landscape<\/span><\/b><br \/><span data-contrast=auto>Across sectors, organizations are embedding AI into products, workflows and decision making at unprecedented speed. At the same time, cybercriminals are using the same technology to increase the speed and sophistication of their attacks.<\/span><br \/><span data-contrast=auto>Generative AI can now produce convincing phishing campaigns, automate\u00a0reconnaissance\u00a0and even create deepfake impersonations of executives or employees. In many\u00a0cases,\u00a0the tactics themselves are not new. What has changed is the speed,\u00a0scale\u00a0and realism of the attacks.<\/span><br \/><span data-contrast=auto>Global incident data examined in the report shows that synthetic text used in malicious emails has doubled in recent years. Cybercriminal groups are also beginning to use large language models to support malware development, vulnerability\u00a0discovery\u00a0and increasingly sophisticated fraud campaigns.<\/span><br \/><b><span data-contrast=auto>AI\u00a0is\u00a0also\u00a0transforming\u00a0cyber\u00a0defence<\/span><\/b><br \/><span data-contrast=auto>Yet the rise of\u00a0AI-driven\u00a0cyber threats tells only\u00a0half\u00a0the story.<\/span><br \/><span data-contrast=auto>AI is also rewriting the defensive playbook. Security operations teams are turning to AI to cut through the noise of\u00a0endless alerts, spot anomalies across complex\u00a0environments\u00a0and drive investigations at speeds that were previously impossible. Early adopters report dramatically\u00a0shorter detection and containment times, along with significant reductions in\u00a0breach\u00a0costs. The result, a cybersecurity landscape where both attackers and defenders are now\u00a0operating\u00a0at dramatically higher speed.<\/span><br \/><span data-contrast=auto>\u201cArtificial intelligence is rapidly transforming the foundations of the digital economy,\u201d says Fran\u00e7ois Guay, founder and chief executive of the Canadian Cybersecurity Network. \u201cThe question is no longer whether AI will change cybersecurity. It already has. The\u00a0real challenge\u00a0now is whether organizations can govern these systems safely and responsibly.\u201d<\/span><br \/><b><span data-contrast=auto>The\u00a0leadership\u00a0shift<\/span><\/b><br \/><span data-contrast=auto>The report argues that the real disruption created by AI is organizational, not just technological. For most of the digital era, executives focused on managing technology assets, namely software,\u00a0networks\u00a0and data, while security programs were built to protect systems and respond to incidents. AI breaks that model. Companies are now deploying systems capable of reasoning,\u00a0planning\u00a0and executing decisions inside core business operations.<\/span><br \/><span data-contrast=auto>As a result, leadership\u00a0is transitioning\u00a0from managing technology to governing machine\u2011driven decision systems. And that shift carries profound implications for boards and executives, as governance, oversight and accountability must now extend\u00a0to autonomous systems that\u00a0operate\u00a0continuously and often faster than traditional human decision processes.<\/span><br \/><b><span data-contrast=auto>Cyber\u00a0maturity as a\u00a0business\u00a0requirement<\/span><\/b><br \/><span data-contrast=auto>One of the report\u2019s central findings is that cybersecurity is becoming closely tied to economic competitiveness.<\/span><br \/><span data-contrast=auto>Enterprises, insurers,\u00a0regulators\u00a0and supply\u2011chain partners increasingly require organizations to\u00a0demonstrate\u00a0credible cybersecurity practices before allowing them to connect systems, exchange\u00a0data\u00a0or\u00a0participate\u00a0in critical operations. Companies that cannot\u00a0demonstrate\u00a0strong governance may find themselves excluded from contracts, partnerships or even insurance coverage.<\/span><br \/><span data-contrast=auto>In this environment, cyber maturity is rapidly becoming a passport to\u00a0participate\u00a0in the digital economy.<\/span><br \/><span data-contrast=auto>\u201cOrganizations that can demonstrate strong governance and secure use of AI will be better positioned to innovate, collaborate and compete globally,\u201d Guay says.<\/span><br \/><b><span data-contrast=auto>A\u00a0new\u00a0attack\u00a0surface<\/span><\/b><br \/><span data-contrast=auto>AI is also expanding the attack\u00a0surface itself.<\/span><br \/><span data-contrast=auto>Traditional cybersecurity focused on protecting networks,\u00a0end\u00a0points\u00a0and software. AI adds a new layer of risk tied to prompts, data pipelines, automated\u00a0workflows\u00a0and the\u00a0behaviour\u00a0of intelligent systems; this leads to attack surfaces that barely existed a decade ago. At the same time, automated services, bots,\u00a0APIs\u00a0and AI agents are spreading across enterprise environments, and in many organizations these machine identities now outnumber human users. This creates growing challenges around access control and security oversight as companies try to protect systems increasingly populated by autonomous technologies.<\/span><br \/><b><span data-contrast=auto>Trust as\u00a0infrastructure<\/span><\/b><br \/><span data-contrast=auto>Taken together, these changes point to a\u00a0deeper economic shift. Cybersecurity is evolving from a technical discipline into a strategic foundation for economic participation, and organizations must now\u00a0demonstrate\u00a0that their systems are secure, their governance structures are\u00a0credible\u00a0and their digital operations are resilient.<\/span><br \/><span data-contrast=auto>In other words, trust is becoming\u00a0infrastructure.<\/span><br \/><span data-contrast=auto>For Canada, the report argues, this transformation presents both risk and opportunity. The country has a globally recognized AI research ecosystem and a strong cybersecurity talent base supported by universities,\u00a0industry\u00a0and government collaboration, but as AI adoption accelerates across sectors, the nation\u2019s digital attack surface is expanding just as quickly.<\/span><br \/><span data-contrast=auto>Bridging the gap between innovation and governance will require\u00a0co-ordinated\u00a0action between industry,\u00a0policy-makers\u00a0and the cybersecurity community.<\/span><br \/><span data-contrast=auto>AI will reshape industries in the coming decade, yet its long<\/span><span data-contrast=auto>\u2011<\/span><span data-contrast=auto>term success will not be\u00a0determined\u00a0solely by computing power or model sophistication. It will depend\u00a0on whether organizations can build and\u00a0maintain\u00a0the trust\u00a0required\u00a0to\u00a0operate\u00a0these systems safely.<\/span><br \/><span data-contrast=auto>In the emerging digital economy, competitive\u00a0advantage\u00a0will not belong only to those who innovate the fastest. It will belong to those who govern technology the best.<\/span><br \/><span data-contrast=auto>You can reach the Canadian Cybersecurity Network<\/span><a data-evt-val='{\"control_fields\": {\"mparticle\": {\"keys\": {\"click_source_type\": \"click_source_type\", \"anchor_text\": \"anchor_text\", \"target_url\": \"target_url\", \"layout_section\": \"layout_section\"}, \"mp_event_type\": \"Navigation\", \"extra_keys\": [\"click_vertical_position_percentage\", \"click_vertical_position_pixels\"]}}, \"click_source_type\": \"in-page link\", \"anchor_text\": \"u00a0\", \"target_url\": \"https:\/\/canadiancybersecuritynetwork.com\/\", \"layout_section\": \"in-page-link\"}' data-evt=click data-evt-typ=click href=https:\/\/canadiancybersecuritynetwork.com\/><span data-contrast=auto>\u00a0<\/span><\/a><a data-evt-val='{\"control_fields\": {\"mparticle\": {\"keys\": {\"click_source_type\": \"click_source_type\", \"anchor_text\": \"anchor_text\", \"target_url\": \"target_url\", \"layout_section\": \"layout_section\"}, \"mp_event_type\": \"Navigation\", \"extra_keys\": [\"click_vertical_position_percentage\", \"click_vertical_position_pixels\"]}}, \"click_source_type\": \"in-page link\", \"anchor_text\": \"here\", \"target_url\": \"https:\/\/canadiancybersecuritynetwork.com\/\", \"layout_section\": \"in-page-link\"}' data-evt=click data-evt-typ=click href=https:\/\/canadiancybersecuritynetwork.com\/><span data-contrast=none>here<\/span><\/a><span data-contrast=auto>. Download the report<\/span><a data-evt-val='{\"control_fields\": {\"mparticle\": {\"keys\": {\"click_source_type\": \"click_source_type\", \"anchor_text\": \"anchor_text\", \"target_url\": \"target_url\", \"layout_section\": \"layout_section\"}, \"mp_event_type\": \"Navigation\", \"extra_keys\": [\"click_vertical_position_percentage\", \"click_vertical_position_pixels\"]}}, \"click_source_type\": \"in-page link\", \"anchor_text\": \"u00a0\", \"target_url\": \"https:\/\/canadiancybersecuritynetwork.com\/reports\", \"layout_section\": \"in-page-link\"}' data-evt=click data-evt-typ=click href=https:\/\/canadiancybersecuritynetwork.com\/reports><span data-contrast=auto>\u00a0<\/span><\/a><a data-evt-val='{\"control_fields\": {\"mparticle\": {\"keys\": {\"click_source_type\": \"click_source_type\", \"anchor_text\": \"anchor_text\", \"target_url\": \"target_url\", \"layout_section\": \"layout_section\"}, \"mp_event_type\": \"Navigation\", \"extra_keys\": [\"click_vertical_position_percentage\", \"click_vertical_position_pixels\"]}}, \"click_source_type\": \"in-page link\", \"anchor_text\": \"here.\", \"target_url\": \"https:\/\/canadiancybersecuritynetwork.com\/reports\", \"layout_section\": \"in-page-link\"}' data-evt=click data-evt-typ=click href=https:\/\/canadiancybersecuritynetwork.com\/reports><span data-contrast=none>here.<\/span><\/a><br \/><em>This section is powered by<span>\u00a0<\/span><a data-evt-val='{\"control_fields\": {\"mparticle\": {\"keys\": {\"click_source_type\": \"click_source_type\", \"anchor_text\": \"anchor_text\", \"target_url\": \"target_url\", \"layout_section\": \"layout_section\"}, \"mp_event_type\": \"Navigation\", \"extra_keys\": [\"click_vertical_position_percentage\", \"click_vertical_position_pixels\"]}}, \"click_source_type\": \"in-page link\", \"anchor_text\": \"Revenue Dynamix\", \"target_url\": \"https:\/\/revenuedynamix.com\/\", \"layout_section\": \"in-page-link\"}' data-evt=click data-evt-typ=click href=https:\/\/revenuedynamix.com\/>Revenue Dynamix<\/a>. Revenue Dynamix provides innovative marketing solutions designed to help IT professionals and businesses thrive in the Canadian market, offering insights and strategies that drive growth and success across the enterprise IT spectrum.<\/em><br \/>Postmedia is committed to maintaining a lively but civil forum for discussion. Please keep comments relevant and respectful. Comments may take up to an hour to appear on the site. You will receive an email if there is a reply to your comment, an update to a thread you follow or if a user you follow comments. Visit our <a href=\/community-guidelines\/>Community Guidelines<\/a> for more information.<br \/>365 Bloor Street East, Toronto, Ontario, M4W 3L4<br \/>\u00a9 2026 Financial Post, a division of Postmedia Network Inc. All rights reserved. Unauthorized distribution, transmission or republication strictly prohibited.<br \/>This website uses cookies to personalize your content (including ads), and allows us to analyze our traffic. Read more about <a href=\/cookie-policy\/>cookies here<\/a>. By continuing to use our site, you agree to our <a title=\"Terms of Use (Leaving Financial Post)\" href=https:\/\/www.postmedia.com\/terms-and-conditions\/>Terms of Use<\/a> and <a href=\/privacy-statement\/en\/>Privacy Policy<\/a>.<br \/>You can manage saved articles in your account.<br \/>and save up to 100 articles!<br \/>You can manage your saved articles in your <a data-evt-val='{\"control_fields\": {\"mparticle\": {\"keys\": {\"click_source_type\": \"click_source_type\", \"anchor_text\": \"anchor_text\", \"target_url\": \"target_url\", \"layout_section\": \"layout_section\"}, \"mp_event_type\": \"Navigation\", \"extra_keys\": [\"click_vertical_position_percentage\", \"click_vertical_position_pixels\"]}}, \"click_source_type\": \"click\", \"anchor_text\": \"Account\", \"target_url\": \"https:\/\/financialpost.com\/saved-articles\", \"layout_section\": \"bookmark-max-limit\"}' class=link-bold data-evt=click data-evt-typ=click href=\/saved-articles\/>account<\/a> and clicking the X located at the bottom right of the article.<\/p>\n<p><a href=\"https:\/\/news.google.com\/rss\/articles\/CBMi0gFBVV95cUxPVWJtZXdOdGFsN2JPQS1jSGR0aHRwWmZ1UVhrdTQ2UW9iTnFFVzg4RmtRc0VzdlRwNVIzalNLTmc5MUhYRXd0bFd2MnRMZGhaZTdsaVRjWkhKS0VHZ29EWEFhNDB5RFRJZi1MdC1sQTNJbHFiTGltMkFOWk1SZlBZdnFFcWlGSWk3STNyd2lnblNoYUQtdXY1NUk1NHhqQlFibHp0QTZXM2VFQkh3SGd6X2pvVUlnRUZoSVhMLWkwajQtY1EyZXFhamtJVXAyNjYxaUE?oc=5\">source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is evolving from a technical discipline into a strategic foundation for economic participationYou can save this article by registering for free here. Or sign-in if you have an account.Artificial intelligence (AI) is moving rapidly from experimentation into the operational core of the economy. Systems that once analyzed information are now guiding decisions, executing\u00a0tasks\u00a0and interacting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":{"0":"post-6051","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"_links":{"self":[{"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/posts\/6051","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/comments?post=6051"}],"version-history":[{"count":0,"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/posts\/6051\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/media\/6052"}],"wp:attachment":[{"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/media?parent=6051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/categories?post=6051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globalnewstoday.uk\/index.php\/wp-json\/wp\/v2\/tags?post=6051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}