Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020

Cognitive systems are driving $8 billion in revenue in 2016, and the space, which includes artificial intelligence (AI) and machine learning, is slated to become a $47 billion industry by 2020.

According to the IBM Institute of Business Value (IBV), cognitive solutions are already seeing widespread adoption in other industries. Yet the security community is still in the early stages of pioneering cognitive security systems. Today, only 7% of security professionals claim to be using cognitive technologies, and a lack of internal skills in the area and competency are the main obstacles, both cited by 45% of respondents.

That said, 21% said their organisations plan to use these solutions in the next two to three years, meaning that the use of cognitive security is set to triple within the next few years.

Ironically, the staffing challenge is also a driver: “The 24/7 nature of security operations presents a challenge that is costly for most organizations to staff, which is where the appeal of cognitive-enabled security comes in, it never sleeps or fatigues,” said Michael Pinch, CISO, University of Rochester, in the report.

In terms of where respondents think that cognitive could improve outcomes, nearly 60% of security professionals believe cognitive security solutions can significantly slow down cyber-criminals.

About 40% of respondents believe this technology will improve detection and incident response decision-making capabilities. A full 37% of respondents believe cognitive security solutions will significantly improve incident response time, and 36% of respondents think cognitive security will provide increased confidence to discriminate between innocuous events and true incidents.

“Cognitive security has so much potential, you can meet your labor shortage gap, you can reduce your risk profile, you can increase your efficiency of response,” said David Shipley, director of Strategic Initiatives, Information Technology Services, University of New Brunswick, in the report. “It can help you understand the narrative story. People consume stories—this happened, then this happened, with this impact, by this person. Additionally, cognitive can lower the skills it takes to get involved in cybersecurity. It allows you to bring in new perspectives from non-IT backgrounds into cracking the problem.”

And on a related note, the study revealed that the top challenges in security today are reducing incident response times (45%), optimising accuracy of alerts (41%) and staying current on threat research (40%). Threat research was also the top challenge cited due to insufficient resources, according to 65% of respondents.

“These challenges are, in many ways, intertwined. If security analysts were able to stay current on threats and increase accuracy of alerts, they could also reduce response time. This means there are many scenarios in which cognitive could help,” said Diana Kelley, executive security advisor for IBM Security, in a blog.

She added, “Although it’s not a silver-bullet, automation and cognitive security are part of an evolution necessary to solve some of the biggest security challenges today and in the future. As we continue forward, we need to evaluate use cases and determine together how cognitive technologies can integrate into day-to-day security operations to address our security challenges in a new and better way.

Infosecurity:

 

« CyberXchange Conference 2016
Snowden 2.0: Its Déjà Vu All Over Again At The NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.