Over the past year, our industry has seen an explosion in artificial intelligence and cognitive solutions to assist with some of the most challenging cybersecurity problems. In some cases, cognitive solutions can increase analytical capability by 50 percent.

With cognitive technology providing such high efficiencies for security teams, people often ask me what is next for the human analyst. Will machines take over our roles in security? Given the estimated 1.8 million cybersecurity job gap by 2022, according to Frost & Sullivan, this topic is top of mind for most organizations.

A Glide Path to Cognitive Security Success

My advice to security professionals is to think about the bigger picture. Instead of a one-to-one replacement of man with machine, consider the cognitive security glide path. This concept shows that cognitive capabilities exist on a spectrum. You must constantly build to fight evolving cyberthreats.

When considering adopting cognitive solutions, security professionals should consider the following factors.

Cognitive Security Is a Journey, Not a Destination

There is a progressive level of capability when it comes to cognitive technology in security. The first function should be automating processes that are particularly manual and labor-intensive for humans.

A cognitive security solution should also scan data sources to look for anomalies, pointing analysts to the signal in the noise where they would not otherwise think to look. Finally, machine automation enables analysts to ask complex questions about the data generated by the cognitive solution to identify fraudsters trying to breach the network.

The Human Factor

The human analyst will continue to be very important in advanced cyber operations. The purpose of machine-driven cognitive capabilities is to automate many labor-intensive and time-consuming steps, essentially providing a high degree of efficiency to add as a multiplier to your cyber force — though it is not a force replacement. When most tier-one or tier-two tasks become automated, this allows room for your current staff to grow into tier-three analysts. This will give your security team the human touch, driving more complex searches of data to discover more advanced threats.

Understand the Kill Chain

The ultimate goal of implementing the cognitive glide path is to defeat the adversary kill chain. This methodology describes the way cybercriminals infiltrate a network in a series of steps, culminating in actions on the objective. At each point along the kill chain, your security organization should be thinking of how it can implement cognitive elements to detect indicators of malicious action, ultimately reducing the adversary dwell time. The faster you can detect threat actors, the more successful you will be at stopping advanced attacks. Cognitive capabilities can greatly accelerate this process.

Empowering Humans With Machine Intelligence

The cognitive glide path can improve the efficacy of a security organization facing a dynamic adversary. Advocates of such a strategy realize that cognitive assets must be rolled out as an iterative process, ultimately empowering the human analyst. This strategic view of the problem will result in more effective methods to control adversary access on your network.

Read the solution brief: Arm security analysts with the power of cognitive security

More from Artificial Intelligence

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Tackling Today’s Attacks and Preparing for Tomorrow’s Threats: A Leader in 2022 Gartner® Magic Quadrant™ for SIEM

Get the latest on IBM Security QRadar SIEM, recognized as a Leader in the 2022 Gartner Magic Quadrant. As I talk to security leaders across the globe, four main themes teams constantly struggle to keep up with are: The ever-evolving and increasing threat landscape Access to and retaining skilled security analysts Learning and managing increasingly complex IT environments and subsequent security tooling The ability to act on the insights from their security tools including security information and event management software…

4 Ways AI Capabilities Transform Security

Many industries have had to tighten belts in the "new normal". In cybersecurity, artificial intelligence (AI) can help.   Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the leading barriers to the effectiveness of their security.   Adding to the dynamics, short-handed teams are overwhelmed with too much data from disparate sources and…

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. New research in this year’s report also reveals for the first time that 83% of organizations in the study have experienced more than one data breach and just 17% said this was their first data breach. And at a time when…