AI-Powered Adaptive Cybersecurity Awareness Training for the Industrial Sector

Authors

  • Aziz Alshehri

Keywords:

AI-powered cybersecurity, adaptive training, industrial cybersecurity, phishing awareness, machine learning security.

Abstract

Cybersecurity threats in industrial environments continue to evolve, necessitating effective security awareness training to mitigate risks. However, traditional training methods often fail due to their one-size-fits-all approach, lacking adaptability to employees’ roles, responsibilities, and threat exposure. This paper proposes an AI-powered adaptive cybersecurity awareness training system tailored for the industrial sector, focusing on manufacturing, energy, and critical infrastructure. The study simulates cybersecurity interactions for 100 industrial employees, each assigned unique profiles representing job roles, security knowledge levels, and cyber-risk factors. AI-driven training dynamically adjusts learning content based on user behavior, phishing susceptibility, response times, and security improvement rates. The simulation results demonstrate the effectiveness of AI-based adaptive training, achieving a 72% reduction in phishing susceptibility, a 50% improvement in incident response time, and a 69% increase in threat detection accuracy. These findings highlight the transformative role of AI and behavioral analytics in cybersecurity education, ensuring real-time, personalized training that enhances industrial cybersecurity resilience

Downloads

Download data is not yet available.

References

IBM X-Force Threat Intelligence Index. (2023). Most Targeted Industries for Cyberattacks. Retrieved from: https://www.ibm.com/security/xforce

Verizon Data Breach Investigations Report (DBIR). (2023). Industrial Cybersecurity Risks and Phishing Threats. Retrieved from: https://www.verizon.com/business/resources/reports/dbir/

Ponemon Institute. (2023). Cost of a Data Breach Report – Industrial Sector Analysis. Retrieved from: https://www.ibm.com/security/data-breach

Cybersecurity & Infrastructure Security Agency (CISA). (2023). Cybersecurity Threats in Industrial Environments. Retrieved from: https://www.cisa.gov/

National Institute of Standards and Technology (NIST). (2023). Guidelines for Industrial Control System (ICS) Security (NIST SP 800-82). Retrieved from: https://csrc.nist.gov/publications

IBM X-Force Threat Intelligence Index. (2023). Ransomware and Supply Chain Attacks in Industrial Environments. Retrieved from: https://www.ibm.com/security/xforce

Verizon DBIR. (2023). Human Error in Cybersecurity: A Leading Cause of Industrial Breaches. Retrieved from: https://www.verizon.com/business/resources/reports/dbir/

Ponemon Institute. (2023). Financial Costs of Cyberattacks in Industrial Sectors. Retrieved from: https://www.ibm.com/security/data-breach

AI-Driven Security Awareness Training Study. (2023). Reducing Phishing Susceptibility Through Adaptive Learning. Retrieved from: https://www.cybersecurity.org/ai-adaptive-training

Cybersecurity & Infrastructure Security Agency (CISA). (2023). Effectiveness of AI-Powered Cybersecurity Awareness Training. Retrieved from: https://www.cisa.gov/

AI-Enhanced Security Training Research. (2023). AI-Based Behavioral Analytics in Cybersecurity Awareness Programs. Retrieved from: https://www.cybersecjournal.org/ai-security-training

Gartner Research. (2023). The Role of AI in Cybersecurity Education and Awareness Training. Retrieved from: https://www.gartner.com/en/research

Industrial Cybersecurity Training Evaluation Study. (2023). Impact of AI-Driven Cybersecurity Training on Employee Awareness and Threat Response. Retrieved from: https://www.industrialcybersecurityreport.com/ai-adaptive-training

KnowBe4. (n.d.). Beyond Security Awareness Training | KnowBe4 Human Risk Mgmt. Retrieved from https://www.knowbe4.com/

CybeReady. (n.d.). Cyber Security Awareness Training Platform. Retrieved from https://cybeready.com/

Cybrary. (2025). Top 6 AI Tools for Cybersecurity Training: Upskill & Reskill. Retrieved from https://www.cybrary.it/

Adaptive Security. (2024). AI-Driven Cybersecurity Awareness Training. Retrieved from https://www.adaptivesecurity.com/

SANS Security Awareness. (n.d.). Cybersecurity Training & Awareness Programs. Retrieved from https://www.sans.org/ 16-25. [Academic Research Papers Listed in Table]

T. E. Gasiba, U. Lechner, M. Pinto-Albuquerque, and A. Porwal, “Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment,” arXiv preprint arXiv:2102.10430, 2021.

N. Al-Dhamari and N. Clarke, “GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness,” arXiv preprint arXiv:2405.04138, 2024.

P. Nespoli, M. Albaladejo-González, J. A. Pastor Valera, J. A. Ruipérez-Valiente, J. Garcia-Alfaro, and F. Gómez Mármol, “SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies,” arXiv preprint arXiv:2401.12594, 2024.

C. Scherb, L. B. Heitz, F. Grimberg, H. Grieder, and M. Maurer, “A Serious Game for Simulating Cyberattacks to Teach Cybersecurity,” arXiv preprint arXiv:2305.03062, 2023.

T. N. Nguyen, L. Sbityakov, and S. Scoggins, “Intelligence-Based Cybersecurity Awareness Training—An Exploratory Project,” arXiv preprint arXiv:1812.04234, 2018.

F. Mancuso et al., “AI in Cybersecurity Skill Assessments,” arXiv preprint, 2024.

R. Buchanan et al., “Cybersecurity Escape Rooms as Training Methods,” arXiv preprint, 2023.

J. Garcia et al., “AI-Generated Security Training Modules,” arXiv preprint, 2024.

J. A. Ruipérez-Valiente et al., “Learning Analytics for Cybersecurity Education,” arXiv preprint, 2024. Chatterjee et al., “Human Behavior in Cybersecurity Training,” arXiv preprint, 2023.

Downloads

Published

12.06.2024

How to Cite

Aziz Alshehri. (2024). AI-Powered Adaptive Cybersecurity Awareness Training for the Industrial Sector. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 5493–5505. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7400

Issue

Section

Research Article