For more information on how cognitive computing supports security, read the more recent blog post, “Elementary, My Dear Watson: Identifying and Understanding Malware With Cognitive Security.” 

A few days ago, IBM CEO Ginni Rometty announced the Cognitive Business initiative. This journey is supported by IBM Watson, the cognitive computing system that understands and learns from natural language.

The name Watson is not an homage to Sherlock Holmes’ friend and assistant Dr. John Watson, but rather to Thomas J. Watson, IBM’s first CEO and industrialist. Thomas Watson once said, “Thought has been the father of every advance since time began,” which became the inspiration behind IBM’s THINK trademark.

How Cognitive Computing Will Impact Identity Governance and Management Practices

My own personal view is simple. I’ve been in the identity management space since its inception. And in my personal experience, regardless of the product you use (and I’ve seen many), for every dollar spent on identity governance software today, there are more than $2 spent on consulting and implementation services. And the overall project risk sits at least 60 to 70 percent in the project execution rather than in the identity governance tool the client selects.

In the future, thanks to cognitive computing, I believe this ratio will change dramatically. Every dollar spent on software — in all probability, on software-as-a-service (SaaS) — will maybe be matched up to $1 on consulting and implementation services. As a result of that shift, project risk will also dramatically decrease.

Today, implementing identity governance focuses on getting different stakeholders aligned on the semantics of their own data. Businesspeople speak their specific function or line-of-business language. Security teams talk about security policies; compliance and risk officers talk about regulations; application owners speak mostly of their beloved applications; and finally, IT people speak the cryptic language of OS, databases and so forth.

We’ve All Seen It, Done It and Know It By Heart

Every stakeholder has knowledge somewhere in natural language: documents, process modeling tools, IT service management tools, technical data sheets, etc. Projects are all (or largely) about first getting everyone on the same page, followed by reading existing documentation, matching the semantics, producing additional documentation and then finally moving everything into a new product.

In essence, we’re reinventing the wheel every time, no matter which identity governance and management product is being used. Right now, this is a definite technology limitation.

Can We Simplify This?

Cognitive computing is all about finding natural language patterns among different content. I do believe that in the next three to five years, IBM will see enormous benefits from our cognitive business solutions and could deliver cognitive-enabled identity governance and intelligence to our customers.

It’s not going to be a fast journey, but only a company this size has the intellectual and financial strength to lead this revolution within security and, more specifically, in the identity governance space. For more information on identity and access management, watch the on-demand webinar, “Protect Your Business-Critical Assets: How to Govern and Audit Access for SAP and the Mainframe.”

Now isn’t that elementary, my dear Cognitive Identity Watson?

More from Artificial Intelligence

Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM

Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving and increasing threat landscape Access to and retaining skilled security analysts Learning and managing increasingly complex IT environments and subsequent security tooling The ability to act on the insights from their security tools including security information and event management software…

4 Ways AI Capabilities Transform Security

Many industries have had to tighten belts in the "new normal". In cybersecurity, artificial intelligence (AI) can help.   Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the leading barriers to the effectiveness of their security.   Adding to the dynamics, short-handed teams are overwhelmed with too much data from disparate sources and…

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. New research in this year’s report also reveals for the first time that 83% of organizations in the study have experienced more than one data breach and just 17% said this was their first data breach. And at a time when…

Real Security Concerns Are Scarier Than Doomsday Predictions

The metaverse, artificial intelligence (AI) run amok, the singularity ... many far-out situations have become a dinner-table conversation. Will AI take over the world? Will you one day have a computer chip in your brain? These science fiction ideas may never come to fruition, but some do point to existing security risks. While nobody can predict the future, should we worry about any of these issues? What's the difference between a real threat and hype? The Promise of the Metaverse…