Introduction
George Hagivassilis: Welcome and good morning, everyone. I’m George Hagivassilis, CCO at Tekspace. We are cybersecurity product experts, and our research powers many of the product decisions at CodeBlue. Today, we’re taking a fascinating dive into the two sides of the same coin: how bad actors use AI to attack organizations, and how we can use AI to respond.
Joining us are two leaders in the field. First, Matthew Jose, CISO at CodeBlue, who leads strategy to help New Zealand organizations manage cyber risk. Second, we have Frank De Pasquale, the driving force behind Tekspace’s strategic direction and cyber SaaS R&D.
Today is actually Safer Internet Day here in New Zealand—a global initiative to create a safer space online—making it the perfect day to discuss cybersecurity awareness.
Part 1: How Attackers Use AI
Matthew: Everyone is happy that we have access to AI, but the bad news is that attackers have it too. They aren’t sitting still. We’re seeing a massive volume of attacks at the coalface.
The “Anatomy of an Attack”
Attackers are now using AI for highly personalized phishing. I recently heard of a case where a homebuyer’s lawyer received an email from their client asking to settle funds into a different bank account. The email was written exactly in the client’s style because the attacker had been monitoring the account. Fortunately, the lawyer followed best practices, called the client, and discovered it was a scam.
Beyond money, attackers use AI to:
-
Create Malware Quickly: They use AI to write code and perform “A/B testing” on malware to see what bypasses security.
-
Conduct Reconnaissance: In one instance we handled, an attacker sat in a compromised account for 20 days, learning the victim’s writing style and profiling customers before sending a single malicious email.
CodeBlue’s 2025 Statistics
The scale of these attacks is staggering. Last year alone, our Security Operations Center (SOC) prevented:
-
217,000 malware attacks.
-
7.3 million spam and phishing emails.
-
2.2 million internet threats.
-
36 Business Email Compromises (BEC): Interestingly, 28 of those involved bypassing Multi-Factor Authentication (MFA)—once the “gold standard” of security.
Part 2: The Modern Response to AI Threats
Frank De Pasquale: If someone is fighting you with guns, you can’t fight back with bows and arrows. We need AI-assisted detection.
The Human Element: Security Awareness Training (SAT)
We need to uplift the “human firewall.” Most modern solutions focus on three pillars:
-
AI-Driven Phishing Simulations: Instead of sending the same fake email to everyone, AI analyzes individual risk profiles. It looks at what apps you use (Zoom, LinkedIn, etc.) and what time of day you’re most vulnerable to send a tailored test.
-
Adaptive Difficulty: If a user is struggling, the system sends easier simulations to build confidence. As they improve, the difficulty increases.
-
Positive Reinforcement: We want to move away from “policing” staff. When a user reports a suspicious email, they should be rewarded and encouraged.
The Purpose-Built Curriculum
Think of it like teaching a child math. You don’t just give them a library; you give them a curriculum. We use “micro-learning” sessions (under 5 minutes) that are interactive and engaging, building a foundation so that spotting a threat becomes as organic as looking both ways before crossing the street.
Part 3: Key Takeaways and Q&A
Matthew: Technology is essential, but it cannot cover every gap. Security awareness creates a culture of shared responsibility. Key Takeaways:
-
Resilience: Trained staff recognize attempts earlier, making the impact on the organization smaller and cheaper to fix.
-
Trust: In a regulated environment, having a trained workforce is visible proof that you take security seriously.
-
Layered Defense: You need a “house” approach—locks on the doors (firewalls), an alarm (detection), and people who know how to use them.
Highlights from the Q&A
-
Frequency: Best practice is to run phishing simulations at least twice a month and training modules once a month.
-
Bypassing MFA: Attackers use “Man-in-the-Middle” attacks to steal session tokens, which is why users must be trained to check the URL of a login page.
-
Small Business: These solutions are absolutely scalable for small businesses—even those with only 10 employees.
George Hagivassilis: That’s all for today. Thank you to Frank De Pasquale and Matt for their insights. Remember, the best security is a mix of smart technology and informed people.
Would you like me to create an “About the Speakers” section for the bottom of this page to give it more professional polish?