Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020

Cognitive systems are driving $8 billion in revenue in 2016, and the space, which includes artificial intelligence (AI) and machine learning, is slated to become a $47 billion industry by 2020.

According to the IBM Institute of Business Value (IBV), cognitive solutions are already seeing widespread adoption in other industries. Yet the security community is still in the early stages of pioneering cognitive security systems. Today, only 7% of security professionals claim to be using cognitive technologies, and a lack of internal skills in the area and competency are the main obstacles, both cited by 45% of respondents.

That said, 21% said their organisations plan to use these solutions in the next two to three years, meaning that the use of cognitive security is set to triple within the next few years.

Ironically, the staffing challenge is also a driver: “The 24/7 nature of security operations presents a challenge that is costly for most organizations to staff, which is where the appeal of cognitive-enabled security comes in, it never sleeps or fatigues,” said Michael Pinch, CISO, University of Rochester, in the report.

In terms of where respondents think that cognitive could improve outcomes, nearly 60% of security professionals believe cognitive security solutions can significantly slow down cyber-criminals.

About 40% of respondents believe this technology will improve detection and incident response decision-making capabilities. A full 37% of respondents believe cognitive security solutions will significantly improve incident response time, and 36% of respondents think cognitive security will provide increased confidence to discriminate between innocuous events and true incidents.

“Cognitive security has so much potential, you can meet your labor shortage gap, you can reduce your risk profile, you can increase your efficiency of response,” said David Shipley, director of Strategic Initiatives, Information Technology Services, University of New Brunswick, in the report. “It can help you understand the narrative story. People consume stories—this happened, then this happened, with this impact, by this person. Additionally, cognitive can lower the skills it takes to get involved in cybersecurity. It allows you to bring in new perspectives from non-IT backgrounds into cracking the problem.”

And on a related note, the study revealed that the top challenges in security today are reducing incident response times (45%), optimising accuracy of alerts (41%) and staying current on threat research (40%). Threat research was also the top challenge cited due to insufficient resources, according to 65% of respondents.

“These challenges are, in many ways, intertwined. If security analysts were able to stay current on threats and increase accuracy of alerts, they could also reduce response time. This means there are many scenarios in which cognitive could help,” said Diana Kelley, executive security advisor for IBM Security, in a blog.

She added, “Although it’s not a silver-bullet, automation and cognitive security are part of an evolution necessary to solve some of the biggest security challenges today and in the future. As we continue forward, we need to evaluate use cases and determine together how cognitive technologies can integrate into day-to-day security operations to address our security challenges in a new and better way.

Infosecurity:

 

« CyberXchange Conference 2016
Snowden 2.0: Its Déjà Vu All Over Again At The NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

BotGuard

BotGuard

BotGuard provides a service to protect your website from malicious bots, crawlers, scrapers, and hacker attacks.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.