Thank you for your interest in AI and Cybersecurity: Strategies for Resilience and Defense (Live Online)

Live Online Curriculum

From AI's ethical governance challenges to expert-led sessions on AI-driven defense strategies, this live online curriculum equips you with actionable insights to build cyber resilience and stay ahead in the rapidly evolving AI landscape.

Part A: Introduction to AI and Cybersecurity

Begin your learning journey with an executive-level overview of how AI is transforming cybersecurity for CTOs, executives, and cybersecurity professionals.

  • AI technologies impacting cybersecurity

    • Explore AI, machine learning (ML), and deep learning technologies and their applications in defense and offense.

  • Strategic challenges and opportunities for CTOs and cybersecurity leaders

    • Understand how AI can enhance threat detection, response, and prevention.

    • Examine the role of AI in improving decision making for security teams.

  • Overview of AI-driven risks and cybercrime

    • Understand how attackers are leveraging AI and the growing threat landscape.

Part B: Introduction to Cyber Vulnerabilities and Cybercrime

Understand the evolution of cybercrime and how AI represents its next stage, along with the tactics and tools used by threat actors.

  • Introduction to tools and tactics

    • Explore phishing, malware, open source intelligence, sensors, social engineering, the underground market, and the evolution of AI in cyber vulnerabilities.

Part A: Offensive and Defensive Uses of AI

Explore how AI is transforming both offensive and defensive cyber operations and how organizations can govern these technologies responsibly. Learn how to balance human oversight with automation and govern AI responsibly to protect enterprise systems and data integrity.

  • AI models in cybersecurity

    • Differentiate between generative, supervised, and unsupervised ML models used in cybersecurity.

    • Understand how each model supports detection, defense, and response in digital ecosystems.

    • Recognize where AI models add value and where they introduce risk.

  • When to use AI vs. humans

    • Apply decision quadrants and mission command frameworks to assign tasks between humans and AI.

    • Evaluate when automation improves efficiency and when human oversight is essential.

    • Balance speed, scale, and judgment in cybersecurity decision making.

  • How attackers use AI

    • Examine the use of AI in cybercrime, including dark web services and AI tools designed for malicious actors.

    • Explore how attackers use AI and deepfake tools to manipulate authentication mechanisms (e.g., voice synthesis and face recognition).

    • Identify how malicious AI models are weaponized to create new types of malware and vulnerabilities.

  • LLM attack surface and risks

    • Identify key vulnerabilities in large language models (LLMs), including prompt injection and data poisoning.

    • Examine how insecure plugins, excessive autonomy, and model theft create new risks.

    • Discover strategies for mitigating enterprise exposure in an LLM-powered world.

Part B: Governance of AI

Explore AI governance frameworks, executive roles, regulatory structures, and the AI Secure-by-Design Framework to embed ethics, accountability, and risk control throughout the AI life cycle.

  • AI governance and risk management

    • Govern AI responsibly by understanding organizational structures, ethical and regulatory frameworks, executive roles, and risk controls designed for AI-specific challenges beyond traditional IT governance.

    • Understand the key components of good AI governance.

  • Governance, risk, and compliance (GRC) aspects of AI

    • Examine principles for the ethical and responsible use of AI.

    • Explore the AI Secure-by-Design Executive Framework. Learn how it can help technical executives integrate security, governance, and ethics into the AI life cycle and promote cross-functional alignment.

Part A: How AI Systems Can Be Abused

Learn how adversaries exploit AI vulnerabilities, and gain strategies for securing AI models and systems against misuse, ensuring both internal and external integrity. 

  • Thinking like an attacker

    • Step into the mindset of an adversary to uncover how threat actors exploit AI vulnerabilities.

    • Explore frameworks, including MITRE ATLAS and OWASP Top 10, for LLMs to understand adversarial tactics and techniques.

  • How AI systems can be abused

    • Learn about AI manipulation, biases, and feedback poisoning of training data.

    • Explore the risks of insecure output handling, including data leaks and hallucinated responses.

    • Understand jailbreaking and prompt engineering with real-world examples of attackers bypassing AI safeguards.

    • Learn how AI can be used to create deceptive content to compromise business and security practices.

    • Identify adversarial attacks and discuss how attackers poison models or exploit vulnerabilities.

  • Organizational risks

    • Assess how AI-driven abuse impacts enterprise trust, compliance, and cybersecurity operations.

    • Connect individual AI exploits to larger strategic and governance challenges facing modern organizations.

Part B: AI Agents and Autonomous Cybersecurity Systems

Enable executives to understand the role of AI agents in cybersecurity, how they can shape the future of work, and the potential risks and rewards for business operations.

  • AI agents in defense and business operations

    • Explore what AI agents are and how they can autonomously plan, execute, and adapt to cybersecurity threats.

    • Examine how AI agents will shape business and security practices, the future of AI-enhanced security operations, and their impact on business efficiency.

  • Risks associated with AI agents

    • Identify potential attack vectors against autonomous systems, including tampering and adversarial manipulation.

Part A: Shadow AI

Understand the risks posed by the growing trend of Shadow AI in enterprises, gain insights into the unsanctioned use of AI tools without oversight or visibility gaps, and introduce strategies to address these challenges.

  • Differentiate Shadow AI from Shadow IT.

    • Define Shadow AI as unsanctioned use of AI tools, and Shadow IT as unauthorized use of general IT services or software.

    • Identify the unique risks of Shadow AI—such as unvetted data outputs and model bias—going beyond the compliance and security challenges of traditional Shadow IT.

  • Assess the risk that unsanctioned AI use introduces to visibility, compliance, and cybersecurity.

    • Identify the potential risks of unsanctioned AI use, including data leaks, regulatory non-compliance, and intellectual property violations.

    • Understand the security vulnerabilities arising from lack of audit trails and oversight of AI-generated decisions or content.

    • Recognize the threats posed by unauthorized AI systems such as malware, data theft, prompt injection attacks, and potential financial liabilities.

    • Evaluate how these risks impact organizational visibility, compliance frameworks, and cybersecurity posture to inform better governance and controls.

  • Identify tools and technologies that can detect and mitigate Shadow AI activity.

    • Understand the OODA Loop that helps organizations detect what AI tools are in use, where they are being used, and how

Part B: Human Security Risks in the Age of AI

Understand the human component in the relationship between AI and cybersecurity and the importance of trust, collaboration, and human oversight in securing AI systems.

  • Building human-AI trust frameworks

    • Create organizational strategies that build trust between human operators and AI systems.

    • Assess transparency and accountability in AI systems to ensure that executives and cybersecurity teams have confidence in AI's decision-making processes.

  • Cybersecurity risks in AI-human interactions

    • Understand the psychological, ethical, and strategic considerations of human interaction with AI systems in security.

    • Explore AI-driven social engineering attacks and how attackers use AI, including deepfakes and voice synthesis, to manipulate humans into compromising security.

Program Information Session

MIT xPRO School Image

    Frameworks and Tools

    Participants will be introduced to key frameworks and industry standards that shape AI security and serve as reference points for understanding emerging risks and executive-level strategies. This includes:

    • MITRE ATLAS

    • AI Secure-by-Design Executive Framework

    • MIT AI Risk Taxonomy Tool

    • NIST AI Risk Management Framework

    Key Takeaways

    The program will equip you with the critical tools and strategies needed to:

    • Integrate AI into cybersecurity strategy to enhance threat detection, response speed, and system resilience  

    • Address the risks AI brings to both defense and offense in cybersecurity

    • Manage AI’s ethical and governance challenges, especially when dealing with Shadow AI and AI system abuse

    • Build skills to design strong defenses against AI-powered cybercrime

    Program Highlights

    Core Curriculum: Decorative Image relating to a pen and paper
    Real-world Curriculum

    Engage in a four-week curriculum exploring AI-powered cybercrime, Shadow AI, adversarial threats, and autonomous defense, designed to support executive cybersecurity decision making.

    Live Faculty Session: Decorative Image relating to a laptop and a speech bubble
    Live Faculty Sessions

    Participate in live, engaging faculty-led sessions with Keri Pearlson and Etay Moar. Engage in interactive discussions on cutting-edge topics in AI and cybersecurity.

    Expert Faculty: Decorative Image relating to a a Badge and a person outline
    Expert Faculty

    Learn from MIT faculty and industry leaders with deep expertise in AI systems, cybersecurity strategy, and enterprise risk. Four 90-minute live sessions offered weekly

    Practical Frameworks and Tools: Decorative Image relating to a framework in a shape of jigsaw puzzle
    Practical Frameworks and Tools

    Explore framework models to assess Shadow AI risks, evaluate governance maturity, and align AI strategies with enterprise goals. Utilize these resources to help you enhance system security, build resilience in your organization, and support strategic decision making.

    Capstone Experience: Decorative Image relating to a light bulb and cogs
    Capstone Experience

    Work through a strategic AI-enabled cybersecurity scenario that brings together risk, ethics, and governance concepts. Apply course frameworks to propose a resilient, executive-level response to a real-world-inspired threat.

    Case Studies: Decorative Image relating to a pen and magnifying glass
    Case Studies

    Gain insights from contemporary case studies exploring the offensive and defensive uses of AI in cybersecurity. Analyze real-world challenges to strengthen your decision-making and threat evaluation skills.

    Office Hours with Program Leaders: Decorative Image relating to a hand and 3 people on top
    Office Hours with Program Leaders

    Attend optional weekly hours with a program leader to ask questions about program material.

    Peer Learning: Decorative Image relating to a bulb and interconnecting human outlines
    Peer Learning

    Interact with like-minded leaders from diverse industries, and exchange views and ideas during structured learning and networking activities.

    Who Is the Program For?

    This program is designed for professionals working across cybersecurity, AI, or technology leadership — especially those facing new challenges in aligning security strategy with emerging AI risks. It is ideal for:

    • CTOs, chief information security officers (CISOs), and senior information technology leaders tasked with setting an enterprise-wide strategy for AI adoption and cybersecurity resilience

    • Cybersecurity, risk, and compliance executives responsible for securing systems, managing AI governance, and navigating evolving regulatory landscapes

    • Digital transformation and innovation leaders seeking to implement AI tools and automation while ensuring alignment with security protocols and business objectives

    • Technical leads in AI, data, or infrastructure roles who oversee the design, deployment, or defense of AI systems and need to address threats, including adversarial attacks, model abuse, and Shadow AI

    Hear From Past Participants

    "The best part of this program was how practical it was, especially the way real attack scenarios (poisoning, prompt injection, and jailbreaks) were paired with governance and defense frameworks."
    Christopher Poluyi
    Head, Cybersecurity Architecture & Engineering, Mastercard Foundation
    "The program design was well‑structured and grounded in MIT‑backed pedagogy. The live sessions were organized, and technical concepts were explained in a clear, easy‑to‑understand way, supported by re...
    Amit Sharma
    Director Cyber Initiatives, MoveAmerica
    "The balance of technology/system topics with governance and human‑centered content was very effective."
    Lisa Abshire
    Vice President, JPMorgan
    "I really enjoyed the lectures featuring real‑world examples as well as the strategy on how to protect and defend against AI threats. I gained knowledge that I am not seeing online — on LinkedIn or Re...
    Sonny Pastore
    Lead, Managed Services and 3rd Party Security, Vanguard
    "The relevance of the program to corporate life and the on‑point examples made the content very valuable."
    Rob Brabers
    SOC, Philips
    "The best part of this program was learning from such experienced lecturers. Their real‑world insights, practical examples, and clear explanations made the material easier to understand and much more ...
    Jesus Cantu Valle
    CSO, Aleph5
    "I thought having two instructors — providing both the technical and the governance perspectives — made this a very effective program. As part of my organization’s AI group responsible for security as...
    Ted Wagner
    VP & BISO, SAP NS2

    Case Studies

    Gain insights from real-world cybersecurity incidents. The AI and Cybersecurity: Strategies for Resilience and Defense program offers participants an opportunity to explore practical case studies based on actual incidents to understand how today’s most sophisticated threats unfold—and how leaders can respond. Examples include:

    • The $25 Million Deepfake Video Conference

    • The CEO Voice Cloning Attack

    • The Energy Company CEO Fraud

    • The Livestream Crypto Scam

    Building on these real-world scenarios, the capstone experience challenges learners to evaluate enterprise risk, navigate complex threat environments, and develop AI-integrated security strategies grounded in both technical rigor and executive decision-making.

    Live Session Schedule

    Date

    Time

    Module 1: AI and Cybersecurity: Vulnerabilities and Cyber Crime

    May 27, 2026

    10:30 AM - 12:00 PM EST

    Module 2: AI Tactics and Strategic Governance

    June 10, 2026

    10:30 AM - 12:00 PM EST

    Module 3: AI Abuse, Agents and Autonomous Cybersecurity

    June 17, 2026

    10:30 AM - 12:00 PM EST

    Module 4: Shadow AI, Human Risk, and Trust

    June 24, 2026

    10:30 AM - 12:00 PM EST

    Note: All live sessions are recorded and will be available for viewing after

    About MIT xPRO

    MIT xPRO’s online learning programs leverage vetted content from world-renowned experts to make learning accessible anytime and anywhere. Designed using cutting-edge research in the neuroscience of learning, MIT xPRO programs are application-focused to help professionals build their skills on the job. To explore the full catalog of MIT xPRO programs, visit xpro.mit.edu.

    Faculty

    KERI PEARLSON
    Keri Pearlson

    Senior Lecturer and a Principal Research Scientist at the MIT Sloan School of Management.

    Keri Pearlson is a Senior Lecturer and a Principal Research Scientist at the MIT Sloan School. She previously served as the Executive Director of the CAMS (Cybersecurity At MI...

    Supporting Faculty

    Supporting Faculty ETAY MAOR
    Etay Maor

    Chief Security Strategist, Cato Networks | Founding Member, Cato CTRL

    Etay Maor is a cybersecurity expert with extensive experience in threat intelligence, security research, and strategic defense. As the chief security strategist at Cato Networ...

    Decorative image relating to certificate of completion

    Certificate

    Get recognized! Upon successful completion of this program, you receive 2 Continuing Education Units (CEUs), a globally recognized measure of professional learning that reflects compliance with international quality standards, and a certificate of completion from MIT xPRO.

    This program is graded as a pass or fail; participants must receive 75 percent to pass and obtain the certificate of completion.

    After the successful completion of the program, a verified digital certificate will be emailed to participants, at no additional cost, with the name used when registering for the program.

    All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT xPRO.

    FAQs

    How do I know if this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to more in-depth information. If you still have questions on whether this program is a good fit for you, please email [email protected], and a dedicated program advisor will follow-up with you very shortly.

    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page. If you are uncertain about program prerequisites and your capabilities, please email us at the ID mentioned above.

    Note that, unless otherwise stated on the program web page, all programs are taught in English and proficiency in English is required.

    What is the typical class profile?

    More than 50 percent of our participants are from outside the United States. Class profiles vary from one cohort to the next, but, generally, our online certificates draw a highly diverse audience in terms of professional experience, industry, and geography — leading to a very rich peer learning and networking experience.

    What other dates will this program be offered in the future?

    Check back to this program web page or email us to inquire if future program dates or the timeline for future offerings have been confirmed yet.

    How much time is required each week?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the Duration section, which you can obtain by submitting the short form at the top of this web page.

    How will my time be spent?

    We have designed this program to fit into your current working life as efficiently as possible. Time will be spent among a variety of activities including:

    • Engaging with recorded video lectures from faculty

    • Attending webinars and office hours, as per the specific program schedule

    • Reading or engaging with examples of core topics

    • Completing knowledge checks/quizzes and required activities

    • Engaging in moderated discussion groups with your peers

    • Completing your final project, if required

    The program is designed to be highly interactive while also allowing time for self-reflection and to demonstrate an understanding of the core topics through various active learning exercises. Please email us if you need further clarification on program activities.

    What is it like to learn online with the learning collaborator, Emeritus?

    More than 300,000 learners across 200 countries have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner the cost of which is already included in the overall course fee of the course.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.

    How do I interact with other program participants?

    Peer learning adds substantially to the overall learning experience and is an important part of the program. You can connect and communicate with other participants through our learning platform.

    What is the relationship between Emeritus and MIT xPRO?

    Emeritus and MIT xPRO collaborate to create and deliver educational programs. None of these programs are Title IV-eligible.

    What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what will be required before you enroll. This is referenced at the top of the program landing page under the Duration section, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. Please email us if you need further clarification on any specific program requirements.

    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile.The digital certificate will be sent approximately two weeks after the program, once grading is complete.

    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.

    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. 

    How long will I have access to the learning materials?

    You will have access to the online learning platform and all the videos and program materials for 24 months following the program start date. Access to the learning platform is restricted to registered participants per the terms of agreement.

    What equipment or technical requirements are there for this program?

    Participants will need the latest version of their preferred browser to access the learning platform. In addition, Microsoft Office and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts.

    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet, and video content is not available for download. However, you can download files of video transcripts, assignment templates, readings, etc. For maximum flexibility, you can access program content from a desktop, laptop, tablet, or mobile device.

    Video lectures must be streamed via the internet, and any livestream webinars and office hours will require an internet connection. However, these sessions are always recorded, so you may view them later.

    Can I still register if the registration deadline has passed?

    Yes, you can register up until seven days past the published start date of the program without missing any of the core program material or learnings.

    What is the program fee, and what forms of payment do you accept?

    The program fee is noted at the top of this program web page. 

    • Flexible payment options are available (see details below as well as at the top of this program web page next to FEE).

    • Tuition assistance is available for participants who qualify. Please email [email protected].

    What if I don’t have a credit card? Is there another method of payment accepted?

    Yes, you can do the bank remittance in the program currency via wire transfer or debit card. Please contact your program advisor, or email us for details.

    I was not able to use the discount code provided. Can you help?

    Yes! Please email us with the details of the program you are interested in, and we will assist you.

    How can I obtain an invoice for payment?

    Please email us your invoicing requirements and the specific program you’re interested in enrolling in.

    Is there an option to make flexible payments for this program?

    Yes, the flexible payment option allows a participant to pay the program fee in installments. This option is made available on the payment page and should be selected before submitting the payment.

    How can I obtain a W9 form?

    Please connect with us via email for assistance.

    Who will be collecting the payment for the program?

    Emeritus collects all program payments, provides learner enrollment and program support, and manages learning platform services.

    Are there any restrictions on the types of funding that can be used to pay for the program?

    Program fees for Emeritus programs with MIT xPRO may not be paid for with (a) funds from the GI Bill, the Post-9/11 Educational Assistance Act of 2008, or similar types of military education funding benefits or (b) Title IV financial aid funds.

    What is the program refund and deferral policy?

    For the program refund and deferral policy, please click the link here.

    Financing Options

    US Residents

    CLIMB CREDIT

    Immediate repayment, interest-only repayment, and deferred payment options are available. Click here to know more

    Flexible Payment Options For All

    Flexible payment options allow you to pay the program fee in installments. Click here to see payment schedule.

    Didn't find what you were looking for? Write to us at [email protected] or Schedule a call with one of our Academic Advisors or call us at +1 401 443 9591 (US) / + 44 189 236 2347 (UK) / +65 3129 7174 (SG)

    Flexible payment options available.

    Starts On