AI Helps Organisations Resist Cyber Crime

As hackers continuously devise new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. AI has the potential to become the principal weapon in the battle against cyber crime.

AI can be used in cyber security to help detect and mitigate threats, as well as build resilience into organisational operations. Clear measures must be put in place to ensure the AI for cyber is adding value to a company’s overall cyber security strategy.

Curating threat intelligence from millions of research papers, blogs and news stories, AI provides instant insights to help cut through the noise of thousands of daily alerts drastically reducing response times. AI and machine learning techniques a hold great promise in security, enabling organisations to operate a IT predictive security stance and automate reactive measures when needed. 

There are clear advantages to using AI to automate certain cyber security tasks. Identification of these patterns can contribute to building predictive models to identify attacks before they occur or to provide decision support while an attack is underway.

Organisations are embracing AI, but at the same time the technology is exposing them to new security threats. Cyber-attacks and threats are considered major disruptors to businesses, nations and consumers alike. Artificial intelligence is seen as a major disruptive force too, but of the positive kind, fueling a new era of hyper connectivity, hyper intelligence and hyper performance. 

An increasingly complex business environment is leading organisations to embrace forms of artificial intelligence such as machine learning and facial recognition technology, while using data to build more intimate relationships with consumers.  However. many of these powerful innovations serve to increase thee ‘attack surfaces’ of an organisation, multiplying the level of vulnerability to cyber crime.

Cyber criminals are starting to use AI using to help drive attacks, employing the technology to uncover unsecured points of entry in enterprise networks. 

There are documented cases of criminals using deep fake technology to imitate the voice of company CEOs, leading to the Israel National Cyber Directorate warning against phishing attacks that are being used to demand access to secure networks, or ever money transfers.  In response to these growing threats, China passed a law that makes it a criminal offence to publish deep fakes or fake news without disclosure, while California criminalised the use of the technology in political advertising.
The question organisations are facing as they increasingly rely on AI in their business operations, is can the opportunities offered by AI be leveraged in cyber security to help better prepare, detect and respond to cyber threats or will it further propagate them?

AI For Cyber Security

In October 2019, the World Economic Forum ranked cyber attacks among the top ten global risks of highest concern, tipped to cost business an estimated -US90 trillion over a ten-year-period.  In fact, according to PwC’s 2019 Digital Trust Insights Survey of 3,500 global organisations, 47 percent said they had experienced operational downtime due to a cyber incident between 2017 and 2019.

Companies need to improve the speed at which they detect cyber threats because hackers are now employing AI to discover points of entry in enterprise networks. Deploying AI software to guard against AI-augmented hacking attempts has therefore become a necessary part of cyber security defense protocols. For instance, AI, when used with cyber security, can accelerate processes such as phishing detection via image recognition and automated tracking. Techniques such as natural language processing, data collection and automation can help organisations classify data more effectively, creating better safeguards against future data leaks. 

Platforms that use machine learning can help companies detect suspicious changes in behaviour and draw on the power of ‘deep learning’ to fend off predicted cyber-attacks.

The growing relationship between AI and cyber security has given rise to platforms and technologies that are leveraging big data, AI and automation to make accurate decisions in cyberspace as well as help scale the cyber operations at a much faster rate than is possible with manual human analysis. But how can organisations use AI to become more resilient to cyber crime and anticipate and respond to changes in the threat landscape over time? 

Here are three strategies for putting AI as a core component of your cyber security strategy, and set the stage for secure growth.

1.Identify the cyber security areas where AI can be applied (and will be most effective) it’s critical to consider where AI will bring the most value from a cyber security perspective. Examples include using AI to automate security operations and enable human-like decision making, ensuring that the vulnerabilities in your environment are classified and rated appropriately for remediation, implementing machine learning algorithms to look for anomalous user behaviour or using natural language processing to classify sensitive data in order to better protect it from future threats.

The power of AI for cyber is about automating manual processes or detecting potential attacks before they happen. But moreover, it’s also about the ability for AI to adapt its detection mechanisms to better understand and respond to the changing threat landscape as cyber criminals become more sophisticated.

2. Invest in developing AI-driven cyber security models to augment current cyber capabilities. Organisations are becoming increasingly wise to the ways in which AI is revolutionising cyber security. According to the PWC Digital Trust Insights survey, 41 percent say that their cyber security team uses automation and emerging technologies for threat intelligence, defence and recovery. AI driven cyber security models can run alongside existing automation engines to help take decisions that need intelligence and sophisticated interpretation capabilities.

3. Measure the ways in which AI is adding value to cyber security capabilities. An AI-driven cyber strategy should promote a proactive approach in anticipating and responding to the threat landscape, while fostering data-driven intelligence that grows and evolves at scale. Organisations need protocols in place to measure the ways in which AI and cyber security are working together and govern cyber security strategies. AI is proving the power of technology to augment human decision making and build trust, and in the process, re-imagining cybersecurity in the process. 

Ultimately, an AI-enabled cyber security will lay the foundation for a smarter organisation that holds resilience and intelligence at its heart. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. 

AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users, whether employees, customers, partners or suppliers, to ensure that all parties have the access they need, but only the access they need.

IBM:       PWC:      Computer Weekly:      Security Informed

You Might Also Read:

Advanced AI For Cyber Operations:

 

« Cyber Security Industry Growth Rate Will Reduce
VPNs – Training and Access – both now available on CYRIN »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.

LeakSignal

LeakSignal

At LeakSignal, we transform the way you monitor and protect your data. We provide unparalleled visibility and control over your sensitive data flows.