Expert Analysis · February 2026 · Valentine J. Gandhi

THE PROBLEM

Billions Spent, Impact Unknown — Now Compounded by AI

THE AI PARADOX

THE AI FACTOR

How AI Is Reshaping Both Threat and Defence

AI as Threat Multiplier

AI-generated phishing & social engineering: LLMs produce contextually sophisticated, grammatically flawless lures in any language at scale
Deepfake fraud: Voice cloning and video synthesis enable real-time impersonation — a $25M fraud at engineering firm Arup used video deepfakes of CFO
Polymorphic malware: AI-powered code that rewrites itself to evade signature-based detection; present in 76%+ of phishing campaigns
Adversarial machine learning: Evasion, poisoning, and model extraction attacks targeting defensive AI itself (NIST AI 100-2e2025)
Crime-as-a-Service: Tools like WormGPT and FraudGPT marketed on dark web, lowering barrier for unsophisticated attackers
Automated vulnerability exploitation: AI agents that discover and exploit CVEs faster than defenders can patch

AI as Defence Enabler

Real-time threat detection: ML-based anomaly detection identifies novel attack patterns that rule-based systems miss
Predictive analytics: Models that forecast likely attack vectors based on threat intelligence feeds and vulnerability data
Automated incident response: AI-driven SOAR platforms that triage, contain, and remediate at machine speed
Behavioural analytics: User and entity behaviour analysis detecting insider threats and compromised credentials
Threat intelligence synthesis: NLP processing of unstructured threat data across languages and sources
AI-assisted code review: Automated detection of vulnerabilities in development pipelines (shift-left security)

TWO WORLDS, ONE PROBLEM

Why This Requires Both Cyber and MEL Expertise

GLOBAL LANDSCAPE

How Different Regions Approach Cyber MEL and AI

United States

NIST CSF 2.0
NIST AI RMF
CISA ATT&CK
AI 100-2e2025

MEL Maturity

55%

European Union

NIS2 Directive
EU AI Act
ENISA
Peer Review

MEL Maturity

45%

United Kingdom

Nat. Cyber Strategy 2022
EU AI Act
AI Safety Institute
NAO Auditing

MEL Maturity

50%

Asia-Pacific (ASEAN Focus)

ASEAN CCS 2021–25
Regional CERT
SG AI Governance
CERT Maturity Framework

MEL Maturity

25%

Australia

Cyber Strategy 2023–30
Essential Eight
Strategy Eval Model
AI Ethics Principles

MEL Maturity

60%

Africa

Malabo Convention
AU DTS 2020–30
UN Cybercrime Conv.
GCSCC CMM

MEL Maturity

15%

KEY INSIGHT

AI GOVERNANCE FOR CYBER

Governing AI Within Cybersecurity: The Emerging Framework Landscape

NIST AI RMF
ISO/IEC 42001
EU AI Act
NIST AI 100-2e2025
MITRE ATLAS
OWASP Top 10 for LLMs

PRACTITIONER GUIDANCE

A PRACTICAL FRAMEWORK

Six Stages for Integrating MEL into Cyber & AI Programmes

01
IDENTIFY: Map the Threat Landscape
02
PRIORITISE: Decide Where to Engage
03
INTERVENE: Select from a Structured Menu
04
MEASURE: Apply Tiered Benchmarking
05
ADAPT: Feed Evidence Back
06
GOVERN AI: Evaluate AI Tools Themselves

MEASUREMENT IN PRACTICE

What to Measure and How

Process Indicators
Are We Doing What We Planned?
Outcome Markers
Is Capacity Actually Changing?
Strategic Indicators
Is the Threat Landscape Shifting?

TOOLKIT

A Practitioner's Toolkit: Key Global Frameworks

Framework Purpose MEL Application
MITRE ATT&CK 190+ adversary techniques across 14 tactical categories based on real-world observations Anchors threat identification by behaviour; enables consistent baseline measurement
MITRE ATLAS Adversarial threat landscape specifically for AI/ML systems, with real-world case studies Maps AI-specific attack vectors; enables evaluation of defensive AI security posture
NIST CSF 2.0 Six-function framework (Govern, Identify, Protect, Detect, Respond, Recover) with four Tiers Maturity Tiers as outcome indicators; Organisational Profiles for before/after benchmarking
NIST AI RMF Four-function AI risk management (Govern, Map, Measure, Manage) for trustworthy AI Structured evaluation of AI tools within cyber programmes; maps to ISO 42001
ISO/IEC 42001 First international AI Management System standard; certifiable; 38 controls, 9 objectives Formal governance of AI systems; Plan-Do-Check-Act cycle with audit readiness
Oxford CMM National cybersecurity capacity across 5 dimensions and 5 maturity stages; 95+ deployments Strongest tool for measuring partner readiness and tracking national capacity shifts
OECD DAC Criteria Six evaluation criteria: relevance, coherence, effectiveness, efficiency, impact, sustainability Global standard for programme evaluation; apply to cyber and AI programme assessment
Contribution Analysis Theory-based evaluation tracing plausible causal pathways (Mayne, 2012) Primary methodology for cyber impact evaluation in complex, attribution-constrained domains

CHECKLISTS

Government Readiness Assessment

Institutional Prerequisites

  • Clear mandate and budget: Multi-year political backing and dedicated resources for cyber MEL and AI governance — not just implementation.
  • Cross-agency coordination: Mechanisms connecting cyber, foreign policy, defence, intelligence, and AI development agencies around shared frameworks.
  • Threat intelligence access: Ability to consume and translate both open-source and classified threat intelligence — including AI-specific threat reporting.
  • Evaluation capability: Evaluators with MEL expertise and sufficient security clearances, plus AI governance knowledge or access to it.
  • AI inventory: A current catalogue of all AI tools deployed within cyber programmes, with documented purposes, data sources, and risk profiles.
  • Data infrastructure: Systems for securely storing and analysing programme data, model performance data, and threat intelligence across classification levels.
  • Learning culture: Willingness to treat both cyber strategies and AI tools as living systems to be refined through evidence, not documents to be filed.

MEL + AI Governance Design Checklist

  • Baseline established: Current posture documented using a recognised maturity model (CMM, NIST CSF, Essential Eight) before intervention.
  • Theory of change articulated: Clear, testable causal pathway linking activities to expected outcomes, with explicit assumptions — including AI components.
  • Indicators tiered: Process, outcome, and strategic indicators defined for each intervention with collection methods assigned. AI model KPIs included.
  • AI risk assessment completed: NIST AI RMF Map function applied; MITRE ATLAS threats profiled; adversarial robustness tested.
  • Evaluation methodology selected: Contribution analysis or equivalent theory-based approach, with alternative explanations pre-identified.
  • AI model monitoring designed: Continuous monitoring for model drift, performance degradation, adversarial exploitation, and bias amplification.
  • Adaptation protocol defined: Decision rules for scaling, pivoting, or discontinuing — including AI model retraining or replacement triggers.
  • Scenario tested: At minimum two real-world scenarios run through the complete framework, including at least one AI-augmented attack scenario.

Common Pitfalls to Avoid

  • Measuring activity not outcomes: “20 officials trained” tells you nothing. Track capability shifts, not headcounts.
  • Bolting MEL on after design: Evaluation must be built in from inception. Retrofitting baselines is expensive and unreliable.
  • Treating AI as a magic solution: AI tools require their own evaluation, governance, and risk management — not blind trust in vendor claims.
  • Ignoring adversarial AI risks: If you deploy AI for defence but don’t evaluate it against adversarial ML attacks, you’ve created a new vulnerability.
  • Confusing compliance with impact: NIS2 compliance, Essential Eight maturity, NIST Tier progression are proxies — not proof of reduced risk.
  • Siloing AI governance from cyber MEL: AI governance and cyber evaluation must be integrated — separate reporting lines produce blind spots.

IMPLEMENTATION

A Phased Approach for Any Government

  1. Inception and Scoping (2–3 weeks): Convene cross-agency stakeholders including AI specialists. Confirm scope, map existing programmes and AI deployments, establish data access, and identify the evaluation questions that matter most. Produce inception report.
  2. Evidence Synthesis (3–4 weeks): Benchmark existing interventions against international comparators (CyBIL Portal, CMM data, NIST community profiles). Include AI effectiveness evidence from published evaluations. Conduct key informant interviews. Identify what works, under what conditions.
  3. Framework Design (3–4 weeks): Operationalise each pathway stage: threat mapping templates, prioritisation matrix, intervention menu, tiered measurement framework, AI governance integration, and adaptation protocol. Iterative with evidence synthesis.
  4. Validation and Handover (2–3 weeks): Stress-test with real scenarios including AI-augmented attack scenarios. Present to stakeholders. Conduct peer review. Transfer ownership to internal teams with sustainability plan.

CONTEXT ADAPTATION

CONCLUSION

The Case for Acting Now

The threat landscape is not waiting. AI-powered attacks are scaling faster than most defences can adapt. Ransomware-as-a-Service, deepfake fraud, adversarial machine learning, and the commercial proliferation of cyber intrusion tools are all accelerating. Meanwhile, governments deploying AI in their own cyber defences face an accountability gap: they cannot demonstrate that these tools work as intended, or that they are not introducing new risks.

The analytical building blocks already exist. MITRE ATT&CK and ATLAS provide threat taxonomies. NIST CSF 2.0 and AI RMF provide maturity and trustworthiness frameworks. Oxford CMM provides national capacity benchmarks. ISO/IEC 42001 provides AI governance structure. Contribution analysis provides evaluation methodology. The OECD DAC criteria provide assessment standards. What has been missing is the deliberate integration of these tools into a coherent decision pathway that moves from observed threats, through programme design, through AI governance, to credible evidence of impact.

Building that integration requires a specific combination of expertise: professionals who understand both the operational realities of cybersecurity and the methodological demands of credible evaluation — now with the additional layer of AI governance. That combination is rare, but it is precisely what this moment demands. The governments that invest in it now will be the ones that can answer the questions that, today, almost no one can: Is our cyber programme actually working? Are our AI tools performing as intended? And are we governing both responsibly?

REFERENCES