LmCast :: Stay tuned in

As Gen Z Enters Cybersecurity, Jury Is Out on AI's Impact

Recorded: Nov. 25, 2025, 8:02 p.m.

Original Summarized

As Gen Z Enters Cybersecurity, Jury Out on AI's Impact TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.Dark Reading Resource LibraryBlack Hat NewsOmdia CybersecurityAdvertiseNewsletter Sign-UpNewsletter Sign-UpCybersecurity TopicsRelated TopicsApplication SecurityCybersecurity CareersCloud SecurityCyber RiskCyberattacks & Data BreachesCybersecurity AnalyticsCybersecurity OperationsData PrivacyEndpoint SecurityICS/OT SecurityIdentity & Access Mgmt SecurityInsider ThreatsIoTMobile SecurityPerimeterPhysical SecurityRemote WorkforceThreat IntelligenceVulnerabilities & ThreatsRecent in Cybersecurity TopicsVulnerabilities & ThreatsCritical Flaw in Oracle Identity Manager Under ExploitationCritical Flaw in Oracle Identity Manager Under ExploitationbyRob WrightNov 24, 20252 Min ReadApplication SecurityInfamous Shai-hulud Worm Resurfaces From the DepthsInfamous Shai-hulud Worm Resurfaces From the DepthsbyAlexander CulafiNov 24, 20254 Min ReadWorld Related TopicsDR GlobalMiddle East & AfricaAsia PacificRecent in World See AllApplication SecurityLINE Messaging Bugs Open Asian Users to Cyber EspionageLINE Messaging Bugs Open Asian Users to Cyber EspionagebyTara SealsNov 21, 20257 Min ReadEndpoint SecurityChina's 'PlushDaemon' Hackers Infect Routers to Hijack Software UpdatesChina's 'PlushDaemon' Hackers Infect Routers to Hijack Software UpdatesbyNate Nelson, Contributing WriterNov 20, 20253 Min ReadThe EdgeDR TechnologyEventsRelated TopicsUpcoming EventsPodcastsWebinarsSEE ALLResourcesRelated TopicsResource LibraryNewslettersPodcastsReportsVideosWebinarsWhite Papers Partner PerspectivesDark Reading Resource LibraryCybersecurity OperationsCybersecurity CareersRemote WorkforceCyber RiskNewsAs Gen Z Enters Cybersecurity, Jury Is Out on AI's ImpactDespite possibly supplanting some young analysts, one Gen Z cybersecurity specialist sees AI helping teach those willing to learn and removing drudge work.Robert Lemos, Contributing WriterNovember 25, 20254 Min ReadSource: Mirko Vitali via Alamy Stock PhotoAt 18 years old, cybersecurity researcher Bandana Kaur sits squarely in the middle of Generation Z, the 13- to 28-year-olds who have — or will be — entering the job market in the age of AI, when many college graduates are facing increasing headwinds to find employment.While many of her contemporaries are worried that AI has seemingly reduced entry-level cybersecurity positions, Kaur, who will be presenting at the Black Hat Middle East & Africa conference in Saudi Arabia next week, has a more measured outlook. AI's potential to augment human capabilities is exciting, she says, allowing security analysts to manage tasks at a previously unattainable scale.While her presentation is titled, "The Last Human Hacker: What Comes After AI," Kaur does not see the end of humans in security, because creativity will never be automated, she argues."Some jobs will be consumed — those jobs that were more mechanical and manual-work intensive will be consumed," she says. "But that's going to be for the best, because now we'll be able to leverage humans for what we do best — innovate and use our creative minds to chain vulnerabilities and oversee the impact-and-risk assessments."AI is set to transform cybersecurity in many ways. Already, cyberattackers have adopted the use of AI tools for improving phishing, creating deepfakes, and even modifying malware at runtime in an attempt to avoid detection. Defenders are following suit, with AI features being built into many cybersecurity systems, and AI agents even being given human-like personas.Related:Cloudflare's One-Stop-Shop Convenience Takes Down Global Digital EconomyAs AI automates more activities in security operations centers, intelligent automation will expand what a single analyst can do, which should be exciting for cybersecurity prospects, Kaur says."We're already seeing AI models that can reduce triage workloads, help correlate signals and analyze data and do stuff that humans could not do at such a scale," she says. "It's going to really put humans in positions where we do what we can do best, instead of doing the tasks that we were never meant to do in the first place."Cybersecurity Needs to Fix Its Hiring PracticesWorries continue, however, over the potential for AI to decimate software developer and cybersecurity jobs. At a time when many industry organizations argue that there is a scarcity of qualified workers knowledgeable about cybersecurity, college graduates in technical disciplines such as cybersecurity are currently problems finding jobs. Overall, while the unemployment rate has increased by 0.51% over the past six years, the unemployment rate for recent college graduates have increased 1.34%, according to the Federal Reserve Bank of St. Louis.Related:Inside Iran's Cyber Objectives: What Do They Want?Yet, in Kaur's experience, a lot of the problems in job seeking are not due to the evolution of AI but the unrealistic expectations of human resources. Companies often seek workers with specific certifications, but classify the position as entry-level. Many often use the practice of "ghost jobs" to convince investors that the company is still hiring and prod employees to work harder.Gen Z should embrace AI as a way to explore, but also beware of its shortcomings and learn not to rely too much on it, Kaur says."AI makes it really, really easy to copy and paste a script, or generate a proof-of-concept, or follow some AI-generated attack chain without even understanding why it works," she says, adding: "AI should be leveraged as a learning tool, and that might help us reduce the skill gap. To give a very tangible example, people can use AI to generate roadmaps for themselves for learning cybersecurity."In addition, AI could help humans who focus more on tech than interpersonal skills to better communicate with their peers, Kaur says."AI could really help with people who have trouble communicating technicality," she says. "It's going to help boil that down and really help them simplify their work and communicate it with non-technical people as well."Related:Securing the Win: What Cybersecurity Can Learn From the PaddockTV Hackers & A 'Curious Cat'If anything, Kaur may demonstrate that technical chops and a deep curiosity are far more important in cybersecurity than a formal education. A self-described "curious cat," Kaur started learning about cybersecurity after a bad experience with cyber bullying in her tweens. Soon after, she was inspired by the female hacker character in the science-fiction drama Salvation, one of the few cybersecurity role models for women on TV, she says.She started conducting open-source intelligence gathering, competed in capture-the-flag tournaments, and participated in bug bounties. In addition to her more general presentation, she will be discussing the transferability of adversarial prompts and jailbreaks across different LLM models, which she identified as a significant security risk."I still don't have a set niche in cybersecurity — I just learn whatever interests me," she says. "So that's how I got into cybersecurity just by being curious about certain things."Kaur is getting her computer science degree in India, and works with cybersecurity firm APIsec as a cybersecurity intern. Overall, her path is not exceptional — anyone with curiosity about cybersecurity and a desire to learn has all the resources that they need online, she says."I would say that my path is pretty reproducible in some aspects," she says. "You can just go online, and you have all the knowledge in the [palm] of your hand, and you can watch courses on YouTube. You can learn anything online these days." Read more about:Black Hat NewsAbout the AuthorRobert Lemos, Contributing WriterVeteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.See more from Robert Lemos, Contributing WriterMore InsightsIndustry Reports2025 State of Threat Intelligence: What it means for your cybersecurity strategyGartner Innovation Insight: AI SOC AgentsState of AI and Automation in Threat IntelligenceGuide to Network Analysis Visibility SolutionsOrganizations Require a New Approach to Handle Investigation and Response in the CloudAccess More ResearchWebinarsIdentity Security in the Agentic AI EraHow AI & Autonomous Patching Eliminate Exposure RisksSecuring the Hybrid Workforce: Challenges and SolutionsCybersecurity Outlook 2026Threat Hunting Tools & Techniques for Staying Ahead of Cyber AdversariesMore WebinarsYou May Also LikeBlack Hat Middle East & AfricaCybersecurity OperationsDo National Data Laws Carry Cyber-Risks for Large Orgs?Do National Data Laws Carry Cyber-Risks for Large Orgs?byNate Nelson, Contributing WriterNov 19, 20254 Min ReadKeep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.SubscribeWebinarsIdentity Security in the Agentic AI EraTues, Dec 9, 2025 at 1pm ESTHow AI & Autonomous Patching Eliminate Exposure RisksOn-DemandSecuring the Hybrid Workforce: Challenges and SolutionsTues, Nov 4, 2025 at 1pm ESTCybersecurity Outlook 2026Virtual Event | December 3rd, 2025 | 11:00am - 5:20pm ET | Doors Open at 10:30am ETThreat Hunting Tools & Techniques for Staying Ahead of Cyber AdversariesTuesday, Oct 21, 2025 at 1pm ESTMore WebinarsWhite PapersMissing 88% of Exploits: Rethinking KEV in the AI EraThe Straightforward Buyer's Guide to EDRThe True Cost of a Cyberattack - 2025 EditionHow to be a Better Threat HunterFrom the C-Suite to the SOC: Consolidating the Network Security SolutionsExplore More White PapersDiscover MoreBlack HatOmdiaWorking With UsAbout UsAdvertiseReprintsJoin UsNewsletter Sign-UpFollow UsCopyright © 2025 TechTarget, Inc. d/b/a Informa TechTarget. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.Home|Cookie Policy|Privacy|Terms of Use

Despite anxieties surrounding the potential displacement of entry-level cybersecurity analysts by artificial intelligence, Gen Z specialist Bandana Kaur presents a more measured perspective. Kaur, a 18-year-old researcher presenting at the Black Hat Middle East & Africa conference, believes AI’s capacity to augment human capabilities, particularly at scale, is a significant opportunity. She argues that rather than replacing analysts, AI can free them from repetitive, manual tasks, allowing them to focus on the more creative and strategic aspects of cybersecurity – innovation and risk assessments. Kaur’s presentation, titled "The Last Human Hacker," reflects a belief that human creativity will remain irreplaceable, a core element in effectively chaining vulnerabilities.

Kaur’s experience highlights a shift in the cybersecurity landscape. AI is already being adopted by attackers, utilizing tools for phishing, deepfake creation, and dynamic malware modification, prompting defenders to follow suit with AI-powered systems and AI agents. Intelligent automation is expected to expand the scope of work a single analyst can handle, an outcome Kaur views as beneficial for cybersecurity prospects. She emphasizes that AI will enable humans to engage in activities best suited to their skills – innovation and creative problem-solving.

However, concerns remain about the potential for AI to decimate software developer and cybersecurity job roles, particularly given the perceived scarcity of qualified cybersecurity professionals. College graduates in technical fields, including cybersecurity, are finding it challenging to secure employment, a reality exacerbated by unrealistic expectations from human resources departments, which are known to employ "ghost jobs” to mislead potential investors.

Kaur’s own path, she points out, is remarkably reproducible. Drawing inspiration from the female hacker character in the science-fiction drama *Salvation*, she engaged in open-source intelligence gathering, competed in capture-the-flag tournaments, and participated in bug bounties. Her curiosity – a willingness to learn and explore – is presented as a key element in her success. She is getting her computer science degree in India, and works with cybersecurity firm APIsec as a cybersecurity intern.

More significantly, Kaur advocates leveraging AI as a learning tool. She notes the ease with which AI can generate scripts or proof-of-concept code, stressing that this accessibility should help bridge the skill gap. It is noted that individuals can now use AI to generate roadmaps for learning cybersecurity and to simplify complex technical concepts. In addition, she suggests that AI could assist individuals with communication difficulties, converting technical details into more accessible formats.

Kaur identifies a critical security risk: the transferability of adversarial prompts and jailbreaks across different large language models (LLMs). She emphasizes that a lack of specific niche expertise, coupled with a drive for curiosity, are more valuable assets than narrowly defined certifications. Her work, combined with learning resources readily available online, provides a reproducible path for aspiring cybersecurity professionals. She believes that anyone with the desire to learn can acquire the necessary knowledge through online courses and readily accessible information. The readily available resources provide a pathway for anyone who is curious about cybersecurity.