Cybersecurity in a Post-Mythos World

Upgrading Defenses and Improving Governance

April 24, 2026
  • Joe Levy
  • Chief Executive Officer, Sophos
  • Sezaneh Seymour
  • Vice President and Head of Regulatory Risk and Policy, Coalition

The questions below are intended to help board members and CEOs get a strategic and governance-level understanding of their organization’s security profile and whether it can move rapidly enough to address the growing risks associated with AI. The questions are not intended to insert leaders into day-to-day technical decision-making but should give them a clearer line of sight into an organization’s preparedness, priorities, and resilience.

The list below includes both operational and policy actions you should take now. You should not treat them as a one-size-fits-all checklist; some may not be  relevant to your organization. Choose the measures that best fit your business, technology environment, and risk profile, with the aim of reducing exposure, limiting damage, and improving resilience.  Experienced security teams are likely taking many of the actions below and may already be considering how to incorporate AI into their security stack. Smaller or less mature organizations may need to focus on fundamental hygiene and structural hardening. We have also flagged the highest priority actions – those you should assure your organization has taken or will take.  

  1. Harden identity and deploy phish-resistant MFA. Every account, remote access tool, and SaaS application – without exception –  should use either modern hardware security keys, passkeys, or an authenticator app with number-matching. If a system can’t support MFA, put compensating controls in place and make a plan to retire it. Separate and minimize administrative accounts, minimize privileged access, and aggressively monitor service accounts. Extend this rigor to AI agents, treating them as high-privilege non-human identities with access to critical code and data.  Before deploying AI workflows, define strict blast-radius limits and human override mechanisms. Audit the entire agent framework – including prompts, tool definitions, and permission scopes – and integrate these assets into your identity governance and behavioral monitoring systems. Highest Priority.
  2. Turn on automatic updates on every asset that supports them. Workstations, laptops, phones, browsers, routers, firewalls. For anything that can’t auto-update, assign a named person to check for and deploy patches on a regular cadence. Highest Priority.
  3. Aggressively reduce external exposure, with a focus on internet-facing and edge systems. Prioritize rapid patching, isolation, and hardening for externally exposed systems, especially edge devices, web applications, identity platforms, and remote access infrastructure.Decommission internet-facing systems that are not essential or which are no longer supported by vendors. Retire anything you cannot defend and modernize anything that you must keep. Create an emergency patching track for critical CVEs on internet-facing systems, and create a triage model for prioritizing high-volume vulnerability findings. Highest Priority.
  4. Authorize automated responses and accept the potential for false positives. Pick five or six security response actions where the cost of a false positive is lower than the cost of waiting even 15 minutes for a human. Define and get executive sign-off for automated containment actions, including isolating a compromised host, blocking a known-malicious IP, killing an anomalous process, or revoking a credential that just did something impossible. Deploying an AI security tool without this functionality strips it of its effectiveness. Highest Priority.
  5. Implement zero-trust and microsegmentation. Inventory and then separate crown-jewel systems, production administration, backups, and sensitive business processes from general user environments. Restrict the ability to move sideways (“east-west”) between internal systems and reduce implicit trust so systems don’t automatically trust each other just because they are on the same network.
  6. Secure your backups and prioritize resilience. Make secure backup and recovery a top-tier priority by protecting backups with separate credentials, isolation, and immutability where available. Validate and exercise your ability to restore the systems the business cannot survive without.
  7. Expand and improve your logging beyond the endpoint, and build in detection. Centralize all of your logs, whether from identity systems, cloud control planes, edge devices, DNS, admin actions, virtualization, and key business applications. Put AI agents at the front line triaging alerts, enriching them with intelligence, and investigating anomalies continuously – logs without detection are just expensive stored data. Make sure you retain them long enough to investigate slow-moving intrusions.
  8. Turn AI inward; point agents at your own code, pipelines, and configurations now. Begin by having a coding agent perform security reviews of your highest-risk code before it ships, and build toward AI-driven review as a standard gate in your continuous integration and continuous deployment (CI/CD) pipeline. Ultimately, there should be no code, whether human-written or AI-generated, reaching production without machine-speed security analysis.  Do the same for configuration reviews, infrastructure-as-code, and third-party dependencies.
  9. Move from periodic penetration testing to continuous attack simulation. Annual or quarterly penetration tests are snapshots that are stale before the report is written. You need to discover what an AI-enabled attacker would find before they find it. If you can’t run this in-house, engage a firm that offers continuous red-teaming as a service with AI-augmented tooling.
  10. Update and exercise your incident response plans. Review your incident response plans and update them to reflect the accelerating pace of threats. Exercise them regularly with the goal of streamlining decision making and reducing response time. Pre-authorize specific containment actions for defined scenarios and use automation where it speeds up low-regret actions.  
  11. Get your organization into a coordinated vulnerability program. Plug your organization into CISA’s disclosure and known-exploited-vulnerability channels or the equivalent channels run by your national CERT/CSIRT or cybersecurity agency. Ensure you have a disclosure intake and response process, and make sure your major vendors publish clear vulnerability disclosure policies and rapidly tell you when findings affect you.
  12. Mandate, don’t suggest, AI agents use across your security team. Coding agents and AI-assisted workflows are mature enough to accelerate nearly every security function today: vulnerability triage, alert investigation, threat intelligence analysis, audit evidence collection, detection engineering, and incident response. Make agent use a standard expectation for every role on the security team, from the SOC analyst to the CISO, with appropriate guardrails and training.
  13. Fast-track procurement and governance for defensive technology. Most organizations are slow to evaluate and onboard new security tools. If the time between vulnerability disclosure and active exploitation is hours, an procurement cycle is itself a vulnerability. Stand up a cross-functional fast-track process bringing security, legal, engineering, and procurement together to evaluate and deploy priority defensive technologies in weeks, not quarters.

Ultimately, the race to meet AI-driven threats is about more than technology, it requires a shift in organizational leadership that reflects this new environment. The technical steps above will provide necessary protection, but they will not be fully effective without a nimble governance framework. Executives and boards must move beyond passive oversight and treat security as a core business discipline. By removing the friction that slows down everything from patching to procurement, by mandating AI integration across the team, and by setting a security-first tone across the organization, leadership can meet this challenge. The window is closing; the time for decisive action is now.