To me, the one word that best describes the value of cognitive computing is connections. Most of the time, true creative breakthroughs come about from new connections between existing notions, not from out-of-the-blue ideas. To solve the pressing security challenges of today, we need more creative approaches, and the only way to find them is to make new connections.

Cognitive security solutions are beginning to help us make these novel connections. These tools allow us to better explore the combination of structured and unstructured data, be it customer, security, maintenance or financial information. Let’s see if we can make some connections of our own to better understand how the future of security might unfold with cognitive computing.

Making Connections With Cognitive Security

The cognitive security study the IBM Institute for Business Value (IBV) launched at the end of last year looked at the current security landscape and the potential adoption of cognitive security solutions. We asked security leaders what they want cognitive security to help them with and what might be holding them back from adoption.

We learned that security leaders want to improve their incident response speed. They also want to get better threat intelligence and optimize the accuracy of alerts. Many, however, are concerned about whether they have the right skills to deploy cognitive security solutions. Some are wondering how they can communicate the benefits of these new solutions to their stakeholders and get the budget they need to implement them.

Organizations are beginning to adopt cognitive tools, and IBM Security is putting out products to help IT leaders equip their cognitive security operations centers (SOCs). Watson for Cyber Security is powering products such as IBM QRadar Advisor with Watson. We are beginning to see evidence of the transformative power of this emerging technology from our beta clients and others.

One of these primed organizations is Smarttech, a security solutions provider that is leveraging Watson in its SOC. It has taken some time and patience, but Smarttech’s security analysts now have a new trusted partner that has accelerated the development of full incident forensic reports from a week to a few hours.

Learning From Other Industries

There will be many stories like this in the future, but to shed some light on what might be possible, let’s look at some other industries that face the same problems as the security community. It is important to make these connections with professionals in other industries to learn what they have faced in their cognitive journeys.

Intelligence Analysis

Cognitive technologies are being used by intelligence and law enforcement agencies to improve their investigations. Just like in information security, these disciplines have analysts that must sift through tremendous amounts of information, looking for patterns to help them with cases. Agencies have learned that, when properly utilized, cognitive systems can give analysts more time to actually think and enable them to think differently about research and discovery.

Predictive Maintenance

Another parallel use case to security is the early notification of maintenance issues. The Port of Cartagena is using a cognitive platform to combine real-time and historical views of operations. This cognitive system forecasts equipment failures and advises on predictive maintenance. Understanding when you are going to have a problem before it occurs is a challenge for security analysts as well as chief information security officers (CISOs).

Risk Management

In the financial services industry, cognitive technologies are enabling auditors and underwriters to connect the dots quickly. These professionals, just like intelligence and security analysts, have to do tremendous amounts of research and evaluation. At one European life insurance company, IT employees are developing a dashboard to put key patterns and findings from diverse data sources at underwriters’ fingertips. This will speed up the process and allow them to focus on actual risk analysis instead of just collecting data.

Embarking on a Cognitive Journey

We are just at the beginning of the cognitive journey for cybersecurity. Many IT leaders who have used the technology see it as something that can unleash the creativity of their security analysts, freeing them from mundane tasks and allowing them to focus on their unique talents. Much like the invention of writing, the paintbrush or the smartphone, cognitive tools will enable practitioners to explore and expand their craft in new ways. The influx of opportunities to make fresh connections between existing ideas is sure to open the cybersecurity field to new possibilities.

Looking to the future, what can we expect? In security, organizations want to evolve past simply finding problems, no matter how fast, to predicting and preventing them. They want to use intelligence and indicators to take automatic action on potential threats. For more information about the future of the field of artificial intelligence, you can check out a new series of IBM articles and interviews with 30 pioneers in the field.

To solve the pressing security challenges of today and tomorrow, we need more creative approaches. The only way to enable this creativity is by making connections and casting a thousand lines: connections between data, connections between industries and connections between ideas.

Learn more about leading your organization into the future

More from Artificial Intelligence

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

How I got started: Cyber AI/ML engineer

3 min read - As generative AI goes mainstream, it highlights the increasing demand for AI cybersecurity professionals like Maria Pospelova. Pospelova is currently a senior data scientist, and data science team lead at OpenText Cybersecurity. She also worked at Interset, an AI cybersecurity company acquired by MicroFocus and then by OpenText. She continues as part of that team today. Did you go to college? What did you go to school for? Pospelova: I graduated with a bachelor’s degree in computer science and a…

Back to basics: Better security in the AI era

4 min read - The rise of artificial intelligence (AI), large language models (LLM) and IoT solutions has created a new security landscape. From generative AI tools that can be taught to create malicious code to the exploitation of connected devices as a way for attackers to move laterally across networks, enterprise IT teams find themselves constantly running to catch up. According to the Google Cloud Cybersecurity Forecast 2024 report, companies should anticipate a surge in attacks powered by generative AI tools and LLMs…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today