The acceleration of artificial intelligence in companies poses a challenge that can no longer be solved by technology alone: trained talent and processes are needed to ensure that systems are deployed safely and responsibly. That is exactly what it seeks to cover the recent EC-Council announcement, which presented a new battery of role-oriented certifications within the IA life cycle, along with a renewed version of its executive leadership program in cybersecurity, Certified CISO v4. The bet is to close the gap between adoption and human capacity and does so with a practical approach that combines adoption, defence and governance.
The figures that motivate this initiative are overwhelming. Sector studies indicate that the economic risk associated with an IA adoption without proper management could amount to several billion dollars worldwide. An analysis disseminated by IDC and collected by Workera puts that exposure around 5.5 billion. At the same time, consultants such as Bain & Company alert about a significant deficit of professionals who require recycling in the United States to cover IA and cybersecurity functions: hundreds of thousands of people.

In addition, multilateral agencies have repeated that the main brake for IA to boost productivity is the availability of prepared labour force, not just technological availability. Both International Monetary Fund as the World Economic Forum impact on the need for practical and policy training approaches that promote the creation of relevant work capacities in all sectors.
In parallel, the attack vectors evolve with the IA itself. Sector reports show a massive increase in traffic related to generative tools and an increase in incidents in which IA plays a central role. An analysis of Palo Alto Networks document exponential growth in adverse uses, and awareness surveys indicate that an overwhelming majority of companies have experienced attacks with IA components ( SoSafe). At the same time, the geographical concentration of talent and the low participation of women in industry aggravate the inequality in access to these capacities; various market compilations place most of the talent in a handful of cities and show that women represent a smaller fraction of the workforce in IA ( SecundTalent).
In view of this convergence of economic need, capacity gaps and increasing threats, EC-Council proposes a roll-based approach: teaching practical literacy about IA while providing specific training for those who must manage projects, protect models or design governance frameworks. The idea is that organizations not only adopt artificial intelligence, but do so with responsibility and accountability. This initiative comes at a time when the US administration has been promoting frameworks and guidelines for the safe deployment of the IA, including executive orders and public policies aimed at training and reconverting talent for the digital age; the federal government has repeatedly highlighted the priority of training and career in the IA ( White House).
The new set of EC-Council certifications starts with a base to create IA fluidity throughout the organization, and is articulated with a framework of its own that can be summarized in three actions: preparing adoption with controls and tests; protecting systems against emerging attack vectors, such as prompt injections or data manipulation; and incorporating governance, traceability and responsibilities from project design. On this basis, programmes are offered to those who coordinate IA portfolio, to those who test offensive models to discover vulnerabilities, and to those who design ethical and corporate compliance policies. The updated version of the CISUS program focuses on giving tools to executive domes to make decisions in environments where systems learn and act autonomously.

Beyond the technical content, there is a clear intention that these credentials should be useful: it is not just a matter of academic recognition, but of forming profiles that reach the business line with the ability to translate strategies into measurable results, to strengthen infrastructure and to create governance frameworks that meet relevant standards such as NIST or ISO. This approach can be particularly valuable for regulated sectors and organizations already working with government agencies; EC-Council has long-standing relations with defence institutions and has professional certification recognition.
The launch is also a sign that the training offer in cybersecurity and IA is being quickly professionalized: companies are looking for programs that combine practical exercises, realistic scenarios of attack and defense, and modules on ethics and compliance. The challenge for organizations will be to integrate such knowledge into day-to-day processes and risk management, rather than to treat them as specific formations.
Finally, it should be recalled that the solution to the talent gap goes not only through more certified, but also through learning ecosystems linked to real employment, public policies that encourage job conversion and deliberate efforts to diversify access to training. If investment, regulation and practical education are aligned, the IA can scale up more safely and generate real benefits for businesses and workers.. For those who want to explore the new training routes announced, EC-Council has made available a library with its IA programs and online cybersecurity on its official page: EC-Council AI Courses. More information on the entity and its initiatives is available at its institutional website.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...