“To function effectively in this knowledge economy, you need to read through trillions of data points. You basically need to go back to school every day to answer the questions that hit your desk. That is the challenge of the knowledge economy. And that is where I believe we can do something different in security with AI and cognitive.” — Marc van Zadelhoff

At IBM InterConnect 2017, Marc van Zadelhoff, general manager of IBM Security, delivered a thought-provoking keynote titled “Watson & Cybersecurity: Bringing AI to the Battle.” With multiple demos and a client panel, the keynote exemplified how IBM is addressing today’s biggest challenges in cybersecurity with innovative cognitive technology.

Addressing Challenges With Cognitive Security

Opening with anecdotes across health care, financial services and law enforcement, Marc painted a picture of the global challenges practitioners face every day around data, insight and skill. His point hit home with the security crowd. When it comes to security analysts, these challenges are not too different, and they are often overlooked.

In a given day, an enterprise might see 200,000 security events. One security analyst might have to investigate as many as 40 incidents, each of which can take hours or days to complete. When you couple this with the industrywide skills gap and the amount of time and money wasted chasing false positives, you begin to see just how difficult the life of a security analyst is. It’s high stakes and high stress — and when a threat hits, people want answers fast.

Thinking Differently About Cybersecurity

As Marc stated, “It’s time to think differently.” During his keynote, he introduced Sandy Bird, chief technology officer (CTO) of IBM Security, and Mike Spisak, IBM master inventor, to show how IBM is thinking differently with Watson for Cyber Security.

Sandy and Mike showcased Watson’s corpus of knowledge, built on the IBM Cloud, ingesting millions of security documents and forming billions of security data elements — always learning and never forgetting. While Sandy played the role of a security analyst investigating a threat actor with IBM QRadar Advisor with Watson, Mike communicated with Project Hayvn, the second-screen application that performs research and generates reports on demand.

In minutes, Sandy and Mike were able to leverage Watson’s massive collection of security knowledge to identify the threat actor’s activity. They also added real-time insight from IBM X-Force Exchange through Hayvn’s natural language application program interfaces (APIs). With artificial intelligence at top of mind, it served as a literal illustration of human and machine working together to deliver unprecedented speed, accuracy and intelligence.

Watson Driving the Future of Cybersecurity

After seeing the art of the possible, the audience listened as three clients discussed with Marc how Watson was delivering real results in the security operations center (SOC). It was a multilayered conversation with clients from Russia, the U.K. and the U.S. covering today’s security challenges, innovations and the importance of minding security basics.

The primary focus was on the next era of cybersecurity and the role of cognitive technology. As Stanislav Kuznetsov, deputy chairman of the executive board at Sberbank, summarized, “I’m sure that cognitive technology like Watson is the new future for every cybersecurity system.”

An Ongoing Journey

With the IBM Security Immune System fully draped behind him, Marc wrapped up the keynote with a final message that the journey to cognitive is just beginning. IBM Security is committed to cognitive innovation, infusing artificial intelligence (AI) capabilities into the world’s largest and broadest security portfolio.

Marc subsequently announced that IBM MaaS360 with Watson, IBM’s unified endpoint management solution, now features cognitive insights. A livestreamed question-and-answer panel was recorded shortly after.

Learn More About Cognitive Security Analytics

More from Intelligence & Analytics

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack. Let’s look at the 13 costliest cyberattacks of the past year and…

What Can We Learn From Recent Cyber History?

The Center for Strategic and International Studies compiled a list of significant cyber incidents dating back to 2003. Compiling attacks on government agencies, defense and high-tech companies or economic crimes with losses of more than a million dollars, this list reveals broader trends in cybersecurity for the past two decades. And, of course, there are the headline breaches and supply chain attacks to consider. Over recent years, what lessons can we learn from our recent history — and what projections…

When Logs Are Out, Enhanced Analytics Stay In

I was talking to an analyst firm the other day. They told me that a lot of organizations purchase a security information and event management (SIEM) solution and then “place it on the shelf.” “Why would they do that?” I asked. I spent the majority of my career in hardware — enterprise hardware, cloud hardware, and just recently made the jump to security software, hence my question. “Because SIEMs are hard to use. A SIEM purchase is just a checked…

4 Most Common Cyberattack Patterns from 2022

As 2022 comes to an end, cybersecurity teams globally are taking the opportunity to reflect on the past 12 months and draw whatever conclusions and insights they can about the threat landscape. It has been a challenging year for security teams. A major conflict in Europe, a persistently remote workforce and a series of large-scale cyberattacks have all but guaranteed that 2022 was far from uneventful. In this article, we’ll round up some of the most common cyberattack patterns we…