Many industries have had to tighten belts in the “new normal”. In cybersecurity, artificial intelligence (AI) can help.
 
Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the leading barriers to the effectiveness of their security.
 
Adding to the dynamics, short-handed teams are overwhelmed with too much data from disparate sources and an abundance of tools, yet a scarcity of insights. These challenges can easily exceed the skills of even the largest, best teams.
 

Source: IBM

In a time of greater challenges and fewer resources, how can security leaders become more effective, minimize their expenses and get the most out of their employees without burning them out? A recent study from the IBM Institute for Business Value (IBV) suggests people are investing in AI and automation to address many of these challenges.

The IBV partnered with APQC (American Productivity and Quality Center) in a survey of 1,000 business leaders to find out how AI is being used to support their operations and to quantify its impact on performance.

AI: Defense in a fast-paced world

The in-depth report contemplates questions that are top-of-mind for today’s leaders. How do AI and automation help? Where in the security life cycle do these tools have the greatest impact? Can pairing AI with automation deliver a higher return on security investment?

There are four primary ways AI technologies are transforming security operations:

  1. Machine learning helps identify patterns, take inventory of new assets and services and refine the performance of AI models.
  1. Reasoning tools help inform data analysis, enhance scenario modeling and foresee new attack vectors.
  1. Natural language processing can be used to mine text data sources, improve threat intelligence and enrich knowledge resources.
  1. Automation can help orchestrate time-intensive tasks, improve response times and reduce the burden for human analysts.

According to survey respondents, adopting AI-powered automation has enabled them to operate faster, with greater flexibility.

How are they doing this? One of the survey’s most compelling findings is that the mix of AI and automation is being used to offload routine triage tasks. It enables skilled analysts to focus on higher-value investigations that require human expertise and judgment.

Register for the AI + Cybersecurity webinar

Practical use of AI

The report offers actionable insights into how security leaders are using AI and automation to support their protection, prevention, detection and response processes. For example:

Source: IBM Security Services based on an analysis of aggregated 2021 performance data. Note: Performance thresholds depicted are expected to improve on a continuing basis. 

Investing in security AI and automation is leading to tangible performance benefits. Compared to non-AI adopters, AI adopters can save more than 14 weeks in threat detection and response:

Source: IBM

Importantly, these organizations are achieving this level of performance while also reducing costs and complexity.

Backed by research

Other IBM security research studies have found similar results. The 2022 Cost of a Data Breach report from IBM and Ponemon Institute found security AI and automation had the greatest positive impact on reducing the overall costs of a data breach. To address emerging threats, the IBM X-Force annual Threat Intelligence Index suggests best practices such as adopting a zero trust approach, automating incident response and deploying extended detection and response.

For security leaders, the key takeaway is that investing in AI and automation enables you to make more of your skilled talent while also improving your overall performance.

Want to dig into the data or get more insights? Read the full report here. Learn more about AI and cybersecurity here.

More from Risk Management

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today