AGC's 13th Annual West Coast Conference Book

Al in Cyber Security

Abstract: Despite increased enterprise security spending and layers of security technology, major breaches remain a seemingly daily occurrence. At the same time, the enterprise IT environment is evolving rapidly as organizations move their sensi- tive data and applications to the cloud, workforces become more mobile, and data analytics drive automated IT sys- tems. To combat the complexity of the modern enterprise threat environment, security companies are racing to stay one step ahead of the competition as well as the cybercriminals they defend against via organic development and inor- ganic acquisitions of so-called next generation technologies. Do we expect to replace some of them with AI? Simultaneously, the lack of skilled security resources employed by enterprises has led organizations and acquirers to place significant emphasis and value on services, analytics and automation. A number of forward leaning companies are leveraging data analytics and developing advanced systems capable of autonomously monitoring, identifying, and blocking malicious activity. During the panel, we will explore the potential of Advanced data analytics and AI, to en- hance the effectiveness of these cybersecurity systems while simultaneously removing the manual legwork required to maintain them. Our panel of experts will explore the question if AI can evolve to replace some of the more traditional technologies in- side solutions for Network Security, Endpoint Security, SaaS Security, User Behavior Analytics and more.

Market Statistics, Sizing/Growth:

 The number of organizations that reported exploits of operational, embedded and consumer systems increased 152% YOY in 2015 (PwC). Theft of “hard” intellectual property increased 56% in 2015  57% of organizations in 2015 said that lack of skilled resources is a main challenge to information security, up from 54% in 2014 (EY)

 On average organizations boosted their information security budgets by 24% in 2015 (PwC)

 91% of organizations use advanced authentication techniques, According to PwC, 59% of organizations leverage big data analytics for cybersecurity. 61% of companies leveraging data-driven cybersecurity reported a better un- derstanding of external threats

Discussion Topics:

 The current scope of AI – assisting humans or replacing them?

 To what extent can we solve more complex problems that were unsolvable before or are we mainly automating existing tasks?  Which manual cybersecurity processes do you foresee becoming automated in the next 3-5 years? What are the most common shortfalls in trying to turn security analytics into action?  How much can we rely on AI today? How much do clients completely entrust their security on artificial intelligence? Can we trust 100% AI modules (by machines) or do we need a person to moderate?

 The role of academia in AI development for Cyber & is this different from “classic” cyber security?

 Do we foresee AI powered hackers? Building sophisticated malware using AI?

 Do we expect AI for finding vulnerabilities and penetration testing / hacking

 How is the proliferation of data & applications to the cloud impacting the enterprise threats & AI ?

 Are we expecting security war game that is actually Machine vs. Machine – AI defenders against AI attackers…

Made with FlippingBook - Online catalogs