Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020

Cognitive systems are driving $8 billion in revenue in 2016, and the space, which includes artificial intelligence (AI) and machine learning, is slated to become a $47 billion industry by 2020.

According to the IBM Institute of Business Value (IBV), cognitive solutions are already seeing widespread adoption in other industries. Yet the security community is still in the early stages of pioneering cognitive security systems. Today, only 7% of security professionals claim to be using cognitive technologies, and a lack of internal skills in the area and competency are the main obstacles, both cited by 45% of respondents.

That said, 21% said their organisations plan to use these solutions in the next two to three years, meaning that the use of cognitive security is set to triple within the next few years.

Ironically, the staffing challenge is also a driver: “The 24/7 nature of security operations presents a challenge that is costly for most organizations to staff, which is where the appeal of cognitive-enabled security comes in, it never sleeps or fatigues,” said Michael Pinch, CISO, University of Rochester, in the report.

In terms of where respondents think that cognitive could improve outcomes, nearly 60% of security professionals believe cognitive security solutions can significantly slow down cyber-criminals.

About 40% of respondents believe this technology will improve detection and incident response decision-making capabilities. A full 37% of respondents believe cognitive security solutions will significantly improve incident response time, and 36% of respondents think cognitive security will provide increased confidence to discriminate between innocuous events and true incidents.

“Cognitive security has so much potential, you can meet your labor shortage gap, you can reduce your risk profile, you can increase your efficiency of response,” said David Shipley, director of Strategic Initiatives, Information Technology Services, University of New Brunswick, in the report. “It can help you understand the narrative story. People consume stories—this happened, then this happened, with this impact, by this person. Additionally, cognitive can lower the skills it takes to get involved in cybersecurity. It allows you to bring in new perspectives from non-IT backgrounds into cracking the problem.”

And on a related note, the study revealed that the top challenges in security today are reducing incident response times (45%), optimising accuracy of alerts (41%) and staying current on threat research (40%). Threat research was also the top challenge cited due to insufficient resources, according to 65% of respondents.

“These challenges are, in many ways, intertwined. If security analysts were able to stay current on threats and increase accuracy of alerts, they could also reduce response time. This means there are many scenarios in which cognitive could help,” said Diana Kelley, executive security advisor for IBM Security, in a blog.

She added, “Although it’s not a silver-bullet, automation and cognitive security are part of an evolution necessary to solve some of the biggest security challenges today and in the future. As we continue forward, we need to evaluate use cases and determine together how cognitive technologies can integrate into day-to-day security operations to address our security challenges in a new and better way.

Infosecurity:

 

« CyberXchange Conference 2016
Snowden 2.0: Its Déjà Vu All Over Again At The NSA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.

Cylerian

Cylerian

Cylerian is a Next Generation SaaS Security Platform - One unified cloud platform to achieve your security, compliance, and operational objectives.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.