I remember learning early in my career to be kind to administrative assistants because, besides being hard-working and underappreciated, they were also the ones who controlled access to the executives’ calendars, many critical office functions and, equally important, the 3 p.m. secret sugar stash.

In the near future, we’re going to see the role of office power broker shift from an administrative assistant to a virtual assistant such as Siri or Cortana, which will both assist workers with managing their lives and help them interface with enterprise artificial intelligence (AI)-driven business processes. I see this AI cooperation expanding from scheduling and office functions initially to include decision support systems, customer and workforce interaction and, eventually, nearly all work activities.

With nearly 100 percent penetration in the enterprise and computing power available in a hand-held package that is now rivaling and even surpassing the typical desktop computer, the smartphone looks to be the platform of choice. As this takes hold, chief information security officers (CISOs) will experience the déjà vu of yet another security challenge that requires a delicate balance between workforce productivity, user expectations, and security and privacy.

IBM’s announcement in March 2018 of the availability of Watson Services for Apple Core ML provided a glimpse of the potential synergies between artificial intelligence targeted at legacy business processes and artificial intelligence aimed at the consumer. Watson provides the highly regarded Visual Recognition Service integrated with Apple’s Core ML, which delivers local — and therefore extremely low latency and highly autonomous — core machine learning algorithms for analysis.

Expectations for Virtual Assistants Continue to Rise

Meanwhile, the workforce is acclimating to the capabilities that a virtual assistant provides and increasingly turning to shortcuts to simplify their lives. Shortcuts allow smartphone and smart speaker users to set up simple voice cues to execute commands on the device and even chain together multiple commands spanning multiple apps. Users are getting accustomed to controlling their environments — from their home to their car and their personal space — with voice commands.

They are also adapting to several new paradigms, including robust home automation, mobile platforms such as automobiles and, with the improving capabilities of ride-hailing services, transportation systems in general. With the imminent build out of 5G capabilities, the expectation of an always-on, always-in-control experience will quickly be extended well beyond the home and office.

Along with the smartphone’s penetration into business processes will come a desire to leverage the phone for identity management functions, complimenting the integration with the office suite and business processes. At the same time, individuals will seek to extend the voice control they enjoy with their personal technology experience to their office experience. The opportunity to leverage this capability and familiarity will likely have a shadow — namely, the temptation to make the barrier between personal and enterprise functions on the phone more permeable over time. I believe this will be driven by both the enterprise, to make the smartphone/human combination more autonomous, and by the worker, who will demand seamless functionality.

It’s tempting to ask, “Why isn’t this just another setting for a mobile device management (MDM) system?” But that’s like reducing the cloud to just a virtual data center. Cloud computing and on-demand computing capacity is a paradigm shift we’re still learning to exploit fully. Moreover, I believe the enterprise’s embrace of the cloud and our overly restrictive, often obstructive, approach to dealing with the security implications of cloud computing have helped to slow the CISO’s acceptance into the C-suite.

Winning With Trust and Security

A 2019 report from the IBM Institute for Business Value (IBV), “The Cognitive Enterprise: Reinventing your company with AI,” outlined seven keys to success, suggesting that “a new era of business reinvention is dawning.” Of the seven keys, number four (reinvent company workflows around AI) and number seven (win with trust and security) speak directly to our discussion here. I believe the integration of personal and enterprise AI via the smartphone is going to be an increasingly critical aspect of this reinvention.

This brings us to our opportunity as CISOs. We have all experienced first-hand the challenges of new technology trends that came with enormous security implications. Among these, of course, were both cloud computing and bring-your-own-device (BYOD). In both of these cases, we’ve had to pivot from protecting the enterprise from itself as it dove headlong into these trends, seemingly without consideration for the security implications, to helping the enterprise maximize its investment.

After our initial futile demand that the enterprise abandon cloud initiatives and use only approved secure mobile devices, we had a lot of ground to make up. For cloud deployments, we eventually adopted alternative ways of thinking, such as integrating into the development and deployment process by joining DevOps teams. We have the opportunity to get ahead of the curve this time and help lead the enterprise in a new direction.

What should the CISO do to help usher in this new era of reinvention? Some experts suggest that the CISO will play a key role in enabling the cognitive enterprise. I see the potential risks exposed during the reinvention process as possibly higher than both cloud computing and the introduction of personal devices in the enterprise. I also see the potential rewards as far more significant than either. I think the CISO will be critical, and organizations will need to shift their focus from working with CISOs they view as good risk managers to working with those they see as comfortable leading through risk versus merely managing risk.

The CISO’s Changing Role in the Cognitive Enterprise

Going back to the IBM IBV report, the third key (architect your business for change) taken with the sixth key (reinvent your workforce to ignite talent) gives us vital clues to our changing role. The commonality between the integration of the virtual assistant and enterprise artificial intelligence and the progression to a cognitive enterprise is the flow and use of data.

Personal data, customer data, enterprise data and intellectual property will need to coexist safely and with high trust. The CISO needs to play a leadership role in understanding how all of this data should coexist and how maximum utility can coexist with high trust. In this new era of reinvention, the CISO will be positioned to replace the chief information officer (CIO) as the central technology executive in the cognitive enterprise.

As we evolve the relationship between virtual assistants and humans and between one virtual assistant working with another virtual assistant, I’m hopeful that we’ll have both principles and policy-driven rule sets that will allow for substantial flexibility — yet safeguard corporate assets and ensure data privacy. I just hope for our collective waistlines that we aren’t so quick to pry loose the mid-afternoon sugar stash.

More from Artificial Intelligence

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM

Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving and increasing threat landscape Access to and retaining skilled security analysts Learning and managing increasingly complex IT environments and subsequent security tooling The ability to act on the insights from their security tools including security information and event management software…

4 Ways AI Capabilities Transform Security

Many industries have had to tighten belts in the "new normal". In cybersecurity, artificial intelligence (AI) can help.   Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the leading barriers to the effectiveness of their security.   Adding to the dynamics, short-handed teams are overwhelmed with too much data from disparate sources and…

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. New research in this year’s report also reveals for the first time that 83% of organizations in the study have experienced more than one data breach and just 17% said this was their first data breach. And at a time when…