This is Part 2 of our three-part series on how cognitive security can help organizations protect their critical assets. Be sure to read Part 1 to learn how cognitive tools can help security leaders address the incident response speed gap.

Fill In the Gaps With Cognitive Security

“Security analysts are expensive resources. In many organizations, they are overwhelmed with work. Alerts are triaged so that only the most serious get worked. Many alerts don’t get worked at all. That means that some security incidents are never investigated, leaving gaps in threat detection.” — Joseph Blankenship, Senior Analyst at Forrester Research

According to a recent report by IBM’s Institute for Business Value (IBV) titled “Cybersecurity in the Cognitive Era: Priming Your Digital Immune System,” security leaders hope to employ cognitive solutions to address a speed gap, an intelligence gap and an accuracy gap when it comes to their ability to detect, analyze, respond to and recover from security incidents.

The Intelligence and Accuracy Gaps

The report indicated that security leaders are most concerned about the incident response speed gap. The intelligence and accuracy gaps rank second and third, respectively. Sixty-five percent of respondents identified threat research as the biggest challenge due to resource constraints, while 40 percent cited the struggle to stay current on threats and vulnerabilities.

Security leaders also placed high importance on the ability to optimize the accuracy of alerts to reduce the number of false positives. In fact, 61 percent of respondents pointed to identifying and assessing threats as a key hurdle.

2016 was a big year for IBM in the cognitive security space. IBM is currently teaching its flagship cognitive computing powerhouse, Watson, the language of cybersecurity and ingesting thousands of documents into the machine to build a corpus of knowledge. The idea is to help Watson “recognize and automate connections between millions of pieces of data at a scale and speed like never before.”

“Advances in artificial intelligence and robotics are now making it possible for humans and machines to work side by side,” wrote analyst Joseph Blankenship for Forrester Research. Until now, however, attackers have had all the advantages. “Once Watson learns the language and nuance of cybersecurity, it could become a very intelligent security analyst, giving security teams an advantage against the attackers targeting them,” Blankenship continued.

Analytics 3.0

The September 2016 “McAfee Labs Threats Report” used the term “Analytics 3.0” to describe the analytics process that combines “machine learning with big data, deep learning and cognitive computing” to produce “fast, proactive discovery and insight.”

The IBV survey echoed this optimism. Fifty-seven percent of respondents believe cognitive computing-enhanced security can “significantly slow the efforts of cybercriminals.” In terms of the key benefits, leaders cited improved detection and incident response decision-making capabilities (40 percent), significantly improved incident response time (37 percent), and increased confidence to discriminate between events and true incidents (36 percent).

Join the Revolution

While chief information security officers (CISOs) may have cognitive security on their minds, many top leaders are also excited about what cognitive technologies can do for their organization. According to an IBM study, half of the chief executive officers (CEOs) queried said cognitive computing “will revolutionize their business in the next three to five years.”

This realization is fueling very large investments, in terms of both research and development and mergers and acquisitions, in this technology. In fact, the market is expected to be worth $31 billion in 2019.

A 2016 Accenture Operations report, “Cybersecurity and Digital Trust in 2016: Re-thinking ‘State of the Art’,” mentioned cognitive computing as one of the hottest growth areas. It also predicted a large increase in deployments in the next 12 to 18 months. If cognitive security isn’t already on your radar, it should be.

Security leaders should get ready for questions from their CEOs and board directors about the cybersecurity benefits of cognitive computing. You would be hard pressed to point to a single action item that won’t benefit from cognitive computing. If you don’t feel ready to adopt the technology, you’d better have a great argument prepared instead.

Read the full IBM Report on cybersecurity in the cognitive era

More from Artificial Intelligence

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today