{"id":84168,"date":"2026-01-12T07:26:40","date_gmt":"2026-01-12T07:26:40","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84168"},"modified":"2026-02-25T04:22:53","modified_gmt":"2026-02-25T04:22:53","slug":"leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/","title":{"rendered":"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84168\" class=\"elementor elementor-84168\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3e5d8ec0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e5d8ec0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5276c03d\" data-id=\"5276c03d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18a14f70 elementor-widget elementor-widget-video\" data-id=\"18a14f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/zH2TZtSrEy8?si=3Hlj3mz1I0ALnKrW&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3708227e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3708227e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-75d585c3\" data-id=\"75d585c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f4725e elementor-widget elementor-widget-heading\" data-id=\"1f4725e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-211bad73 elementor-widget elementor-widget-post-info\" data-id=\"211bad73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>January 12, 2026<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45d48a4 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tThe Cybersecurity Podcast\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d6b9663 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d6b9663\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-575a7ed3\" data-id=\"575a7ed3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ae8714a elementor-widget elementor-widget-heading\" data-id=\"1ae8714a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">AI\u2019s potential and its dangers for cybersecurity: Insights from Air Force Veteran John Dickson\u2019s conversation with EC-Council Founder Jay Bavisi <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23ddab93 elementor-widget elementor-widget-text-editor\" data-id=\"23ddab93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As AI rapidly transforms the digital landscape, more and more organizations are waking up to not only its promise, but also its risks. This is especially true in cybersecurity, where AI generated codes can both strengthen defenses through rapid threat detection and arm cybercriminals to launch dangerous attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dd01863 elementor-widget elementor-widget-text-editor\" data-id=\"7dd01863\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In an exclusive interview with EC-Council Founder Jay Bavisi, Air Force Veteran and CEO of Bytewhisper Security John Dickson offers candid insights into the challenges, realities, and the future of cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1608777 elementor-widget elementor-widget-text-editor\" data-id=\"1608777\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this episode, John shares his unique perspective shaped by decades in military and private-sector cybersecurity. He talks about his journey, the lessons he drew from military intelligence, and offers his critical views on AI\u2019s role in modern software engineering across industries. In a world where human and AI-generated code now coexist, John underscores the need for stringent checks and responsible software development to maintain trust and security in organizations and the digital community.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71d10000 elementor-widget elementor-widget-heading\" data-id=\"71d10000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A career in cybersecurity is not only for tech majors; anyone from a non-tech background can explore this field <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c62f55 elementor-widget elementor-widget-text-editor\" data-id=\"1c62f55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many cybersecurity professionals, like John himself, don\u2019t start their careers with technical degrees. What brings them to this arena is curiosity, self-learning, and adaptability.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9748d5 elementor-widget elementor-widget-text-editor\" data-id=\"9748d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>John, who was a political science student, happened to be part of a team that worked on the early stages of the SUN SPARC station and its co-computers and laptops. This exposure enabled a non-technical professional like him to transition into technology.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-169622e0 elementor-widget elementor-widget-heading\" data-id=\"169622e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Structured programs, self-learning, and curiosity are closely knit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b0dd02 elementor-widget elementor-widget-text-editor\" data-id=\"2b0dd02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Several cybersecurity programs and university degrees are widely available today\u2014options that didn\u2019t exist 30 years ago. Yet, according to John, the single most important quality remains curiosity. The more you learn, the more you want to explore.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c99cc49 elementor-widget elementor-widget-text-editor\" data-id=\"2c99cc49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>John concludes that formal education is only the beginning; curiosity and commitment to lifelong learning are the true essentials. An additional understanding of the history and customs of cybersecurity will also prove beneficial. \u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b0a4a7c elementor-widget elementor-widget-heading\" data-id=\"6b0a4a7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The convergence of AI in cybersecurity <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82cbf6b elementor-widget elementor-widget-text-editor\" data-id=\"82cbf6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Though AI has been around for years, it was the arrival of ChatGPT that truly pushed it into the spotlight, and everyone started taking notice of the power of AI.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f3f0658 elementor-widget elementor-widget-text-editor\" data-id=\"5f3f0658\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>On being asked what it was about the convergence of AI into cybersecurity that frightened him the most? He replied, \u201cPeople who trust the output of it inherently right now.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-770b2795 elementor-widget elementor-widget-text-editor\" data-id=\"770b2795\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI accelerates software creation and documentation but also introduces risks such as \u201challucinations,\u201d where it produces incorrect or fabricated outputs. Yet many people still approach AI with a high level of trust.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f0c30f elementor-widget elementor-widget-heading\" data-id=\"21f0c30f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overreliance on AI-generated code <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5942a0b8 elementor-widget elementor-widget-text-editor\" data-id=\"5942a0b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>John\u2019s biggest fear is that overreliance on AI-generated code without conducting proper checks can lead to dangerous vulnerabilities.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d9b49b elementor-widget elementor-widget-text-editor\" data-id=\"7d9b49b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>He shared an example where he used Perplexity to write a 100-word preamble for a LinkedIn post. The platform delivered the result. But what he noticed was that the names, quotes, and other details mentioned in the post were entirely inaccurate. Somehow, the AI had reimagined the scenario and written its own version!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee6f240 elementor-widget elementor-widget-heading\" data-id=\"7ee6f240\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The importance of guardrails and human oversight <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58868587 elementor-widget elementor-widget-text-editor\" data-id=\"58868587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nonetheless, when it comes to software, the real challenge with AI is surprisingly not its hallucination\u2014those can be easily spotted. The deeper issue is AI\u2019s nature of being non-deterministic.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19582c71 elementor-widget elementor-widget-text-editor\" data-id=\"19582c71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In traditional software, determinism is depicted when a user enters a command and receives the same output each time he enters the same command. This predictability is known as the backbone of quality, security, and trust. But this is not the case with AI. Here, if the user enters the same prompt twice, he may receive two different responses, even though nothing in the prompt has changed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d5d722 elementor-widget elementor-widget-text-editor\" data-id=\"8d5d722\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>John explains this with the example of a neural network like a pachinko machine in Japan: The user launches the ball (i.e., the prompt or input), but the path it takes and where it lands (i.e., the output) can differ greatly with each attempt. The results might look similar, but not alike.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f69ad16 elementor-widget elementor-widget-text-editor\" data-id=\"7f69ad16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another example is when a user tries to generate an image or a paragraph several times using the same prompt, they begin noticing minor variations in the output. Though this doesn\u2019t happen every time; it complicates matters when used for software development. From debugging to compliance and security auditing, everything could hit the deck.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ada024e elementor-widget elementor-widget-text-editor\" data-id=\"6ada024e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Non-determinism demands a new level of scrutiny and oversight as unpredictability at the code level can lead to unpredictable risks. Therefore, blindly trusting AI outputs is a risk especially in cases of critical systems. Human review and rigorous vulnerability scanning remain essential.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d9486b elementor-widget elementor-widget-heading\" data-id=\"5d9486b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The question of the era: Will AI replace software jobs, or will the roles change?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59ba8dc2 elementor-widget elementor-widget-text-editor\" data-id=\"59ba8dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Claims that AI will make software developers obsolete are overhyped. As John puts it, \u201cWith ChatGPT, casual use for social media purposes is manageable. But if it is for the larger community or critical systems, it requires rigorous security checks and human intervention.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7689d1f7 elementor-widget elementor-widget-text-editor\" data-id=\"7689d1f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We don\u2019t know how software roles will evolve. Entry-level hiring is already shifting, but as cybersecurity curricula evolve over the years, skills such as critical thinking, curiosity, and adaptability are sure to remain valuable and ensure long-term relevance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-176b8ca5 elementor-widget elementor-widget-text-editor\" data-id=\"176b8ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Certain job functions that involve easily automated tasks are expected to disappear, while demand for those that can solve AI and business needs will be on the rise.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35e7d9d4 elementor-widget elementor-widget-heading\" data-id=\"35e7d9d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consequentiality and explainability in AI: The role of AI managers <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3118f866 elementor-widget elementor-widget-text-editor\" data-id=\"3118f866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The demand for AI managers will increase with time; they are likely to be the gatekeepers of agentic processes within organizations. Currently, people understand AI but are yet unaware of its appropriate usage. Only the gatekeepers will be equipped to solve this issue.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31234234 elementor-widget elementor-widget-text-editor\" data-id=\"31234234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The importance of understanding what AI systems do and why is further magnified in high-stakes environments such as aviation and critical infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49c86d3c elementor-widget elementor-widget-heading\" data-id=\"49c86d3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">From ambitious goals to real-world impact <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e09efae elementor-widget elementor-widget-text-editor\" data-id=\"7e09efae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A renowned hospital in Houston once set its sights on an ambitious AI project to \u201csolve cancer.\u201d When initial efforts weren\u2019t successful, the team made a pivotal shift: Instead of chasing difficult-to-achieve goals, they redirected their AI resources toward a more pressing, everyday problem: Scheduling the flow of patients and resources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60603792 elementor-widget elementor-widget-text-editor\" data-id=\"60603792\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By implementing AI to optimize factors like scheduling of facilities, rooms, doctors, equipment, and medication, the hospital achieved a remarkable improvement in delivering smoother and more humane care to its patients as well as their family.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3093ad94 elementor-widget elementor-widget-text-editor\" data-id=\"3093ad94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This story highlights a critical lesson for organizations: The most impactful use of AI often lies not in headline-grabbing projects, but in addressing complex challenges that truly affect people\u2019s lives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e7dc990 elementor-widget elementor-widget-heading\" data-id=\"1e7dc990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The adoption of AI in business and enterprise environments is a double-edged sword<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-799132f4 elementor-widget elementor-widget-text-editor\" data-id=\"799132f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The potential of AI is vast, but there are also risks associated with it. Not all AI systems are created equally. When AI is deployed in high impact environments such as aviation or healthcare, it demands the highest level of transparency and human oversight. To ensure safety and trust, these systems must undergo rigorous checks and accountability.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2665b51f elementor-widget elementor-widget-text-editor\" data-id=\"2665b51f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When AI is used for regular business purposes like scheduling hospital resources, it delivers tangible benefits with manageable risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68e3d069 elementor-widget elementor-widget-text-editor\" data-id=\"68e3d069\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>John warns that agentic AI, which can execute a sequence of tasks on behalf of a user, poses real dangers if not checked thoroughly. Unchecked, agentic AI processes can manipulate systems. If an AI agent is allowed to manage complex processes such as database management or system configuration without checks or regulation it can cause serious errors including accidental data deletion, if the system isn\u2019t designed to \u201cfail well.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24ac059b elementor-widget elementor-widget-heading\" data-id=\"24ac059b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion \u202f <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68bff980 elementor-widget elementor-widget-text-editor\" data-id=\"68bff980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As AI becomes more and more central to how we build and protect software, it needs watchdogs in the form of vigilance, adaptability, and ethical oversight. When we overhype AI, we invite blind trust and sloppy security practices. The real win is using AI as a smart co-pilot while humans fly the plane, bringing judgment, critical thinking, and detailed review.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8541f1 elementor-widget elementor-widget-text-editor\" data-id=\"5d8541f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AI is not here to make software developers extinct! As John points out, using tools like ChatGPT for casual purposes may be manageable, but in critical systems and environments like aviation and healthcare, we still need rigorous security checks and humans in the loop.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6998ac01 elementor-widget elementor-widget-text-editor\" data-id=\"6998ac01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To go deeper into these issues, visit the podcast <a href=\"https:\/\/www.youtube.com\/watch?v=zH2TZtSrEy8&amp;t=725s\" target=\"_blank\" rel=\"noopener\">Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson<\/a>, where John not only unpacks them in much more detail but also jumps into a rapid-fire round of blunt, experience-driven takes on government cyber readiness, AI-generated code in enterprise systems, and what he\u2019s truly willing to trust in high-impact environments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c96f098 elementor-widget elementor-widget-text-editor\" data-id=\"c96f098\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For more conversations shaping the future of cybersecurity, subscribe to the Cybersecurity Podcast by EC-Council.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15b06b81 elementor-widget elementor-widget-text-editor\" data-id=\"15b06b81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/bit.ly\/Cloud-nativesecurityandtheAIfrontier\" target=\"_blank\" rel=\"noopener\">https:\/\/bit.ly\/Cloud-nativesecurityandtheAIfrontier<\/a><br \/><a href=\"https:\/\/bit.ly\/worldeconomicforumcybersecurityawarenessmonth\" target=\"_blank\" rel=\"noopener\">https:\/\/bit.ly\/worldeconomicforumcybersecurityawarenessmonth<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson AI\u2019s potential and its dangers for cybersecurity: Insights from Air Force Veteran John Dickson\u2019s conversation with EC-Council Founder Jay Bavisi As AI rapidly transforms the digital landscape, more and more organizations are waking up to not only its&hellip;<\/p>\n","protected":false},"author":105,"featured_media":84180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[13062],"tags":[],"class_list":{"0":"post-84168","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity-podcast"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson - Cybersecurity Exchange<\/title>\n<meta name=\"description\" content=\"Hear insights from Air Force veteran and CEO John Dickson on leading cybersecurity strategies and innovation in the rapidly advancing age of AI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson\" \/>\n<meta property=\"og:description\" content=\"Hear insights from Air Force veteran and CEO John Dickson on leading cybersecurity strategies and innovation in the rapidly advancing age of AI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-12T07:26:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T04:22:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"830\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/\"},\"author\":{\"name\":\"tarun.mistri.ctr@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\"},\"headline\":\"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson\",\"datePublished\":\"2026-01-12T07:26:40+00:00\",\"dateModified\":\"2026-02-25T04:22:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/\"},\"wordCount\":1494,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dickson.jpeg\",\"articleSection\":[\"Cybersecurity Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/\",\"name\":\"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson - Cybersecurity Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dickson.jpeg\",\"datePublished\":\"2026-01-12T07:26:40+00:00\",\"dateModified\":\"2026-02-25T04:22:53+00:00\",\"description\":\"Hear insights from Air Force veteran and CEO John Dickson on leading cybersecurity strategies and innovation in the rapidly advancing age of AI.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dickson.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Dickson.jpeg\",\"width\":1600,\"height\":830},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Podcast\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cybersecurity-podcast\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\",\"name\":\"tarun.mistri.ctr@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson - Cybersecurity Exchange","description":"Hear insights from Air Force veteran and CEO John Dickson on leading cybersecurity strategies and innovation in the rapidly advancing age of AI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/","og_locale":"en_US","og_type":"article","og_title":"Leading Security in the Age of AI: A Conversation with Air Force Veteran & CEO John Dickson","og_description":"Hear insights from Air Force veteran and CEO John Dickson on leading cybersecurity strategies and innovation in the rapidly advancing age of AI.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-12T07:26:40+00:00","article_modified_time":"2026-02-25T04:22:53+00:00","og_image":[{"width":1600,"height":830,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg","type":"image\/jpeg"}],"author":"tarun.mistri.ctr@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"Leading Security in the Age of AI: A Conversation with Air Force Veteran & CEO John Dickson","twitter_misc":{"Written by":"tarun.mistri.ctr@eccouncil.org","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/"},"author":{"name":"tarun.mistri.ctr@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837"},"headline":"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson","datePublished":"2026-01-12T07:26:40+00:00","dateModified":"2026-02-25T04:22:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/"},"wordCount":1494,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg","articleSection":["Cybersecurity Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/","name":"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson - Cybersecurity Exchange","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg","datePublished":"2026-01-12T07:26:40+00:00","dateModified":"2026-02-25T04:22:53+00:00","description":"Hear insights from Air Force veteran and CEO John Dickson on leading cybersecurity strategies and innovation in the rapidly advancing age of AI.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dickson.jpeg","width":1600,"height":830},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/leading-security-in-the-age-of-ai-a-conversation-with-air-force-veteran-ceo-john-dickson\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Podcast","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cybersecurity-podcast\/"},{"@type":"ListItem","position":4,"name":"Leading Security in the Age of AI: A Conversation with Air Force Veteran &amp; CEO John Dickson"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837","name":"tarun.mistri.ctr@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84168"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84180"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}