To me, the one word that best describes the value of cognitive computing is connections. Most of the time, true creative breakthroughs come about from new connections between existing notions, not from out-of-the-blue ideas. To solve the pressing security challenges of today, we need more creative approaches, and the only way to find them is to make new connections.

Cognitive security solutions are beginning to help us make these novel connections. These tools allow us to better explore the combination of structured and unstructured data, be it customer, security, maintenance or financial information. Let’s see if we can make some connections of our own to better understand how the future of security might unfold with cognitive computing.

Making Connections With Cognitive Security

The cognitive security study the IBM Institute for Business Value (IBV) launched at the end of last year looked at the current security landscape and the potential adoption of cognitive security solutions. We asked security leaders what they want cognitive security to help them with and what might be holding them back from adoption.

We learned that security leaders want to improve their incident response speed. They also want to get better threat intelligence and optimize the accuracy of alerts. Many, however, are concerned about whether they have the right skills to deploy cognitive security solutions. Some are wondering how they can communicate the benefits of these new solutions to their stakeholders and get the budget they need to implement them.

Organizations are beginning to adopt cognitive tools, and IBM Security is putting out products to help IT leaders equip their cognitive security operations centers (SOCs). Watson for Cyber Security is powering products such as IBM QRadar Advisor with Watson. We are beginning to see evidence of the transformative power of this emerging technology from our beta clients and others.

One of these primed organizations is Smarttech, a security solutions provider that is leveraging Watson in its SOC. It has taken some time and patience, but Smarttech’s security analysts now have a new trusted partner that has accelerated the development of full incident forensic reports from a week to a few hours.

Learning From Other Industries

There will be many stories like this in the future, but to shed some light on what might be possible, let’s look at some other industries that face the same problems as the security community. It is important to make these connections with professionals in other industries to learn what they have faced in their cognitive journeys.

Intelligence Analysis

Cognitive technologies are being used by intelligence and law enforcement agencies to improve their investigations. Just like in information security, these disciplines have analysts that must sift through tremendous amounts of information, looking for patterns to help them with cases. Agencies have learned that, when properly utilized, cognitive systems can give analysts more time to actually think and enable them to think differently about research and discovery.

Predictive Maintenance

Another parallel use case to security is the early notification of maintenance issues. The Port of Cartagena is using a cognitive platform to combine real-time and historical views of operations. This cognitive system forecasts equipment failures and advises on predictive maintenance. Understanding when you are going to have a problem before it occurs is a challenge for security analysts as well as chief information security officers (CISOs).

Risk Management

In the financial services industry, cognitive technologies are enabling auditors and underwriters to connect the dots quickly. These professionals, just like intelligence and security analysts, have to do tremendous amounts of research and evaluation. At one European life insurance company, IT employees are developing a dashboard to put key patterns and findings from diverse data sources at underwriters’ fingertips. This will speed up the process and allow them to focus on actual risk analysis instead of just collecting data.

Embarking on a Cognitive Journey

We are just at the beginning of the cognitive journey for cybersecurity. Many IT leaders who have used the technology see it as something that can unleash the creativity of their security analysts, freeing them from mundane tasks and allowing them to focus on their unique talents. Much like the invention of writing, the paintbrush or the smartphone, cognitive tools will enable practitioners to explore and expand their craft in new ways. The influx of opportunities to make fresh connections between existing ideas is sure to open the cybersecurity field to new possibilities.

Looking to the future, what can we expect? In security, organizations want to evolve past simply finding problems, no matter how fast, to predicting and preventing them. They want to use intelligence and indicators to take automatic action on potential threats. For more information about the future of the field of artificial intelligence, you can check out a new series of IBM articles and interviews with 30 pioneers in the field.

To solve the pressing security challenges of today and tomorrow, we need more creative approaches. The only way to enable this creativity is by making connections and casting a thousand lines: connections between data, connections between industries and connections between ideas.

Learn more about leading your organization into the future

More from Artificial Intelligence

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should an AI ethics governance framework look like?

4 min read - While the race to achieve generative AI intensifies, the ethical debate surrounding the technology also continues to heat up. And the stakes keep getting higher.As per Gartner, “Organizations are responsible for ensuring that AI projects they develop, deploy or use do not have negative ethical consequences.” Meanwhile, 79% of executives say AI ethics is important to their enterprise-wide AI approach, but less than 25% have operationalized ethics governance principles.AI is also high on the list of United States government concerns.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today