{"id":39331,"date":"2019-07-23T09:38:26","date_gmt":"2019-07-23T09:38:26","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2019\/jul\/23\/capgemini-why-ai-is-the-future-of-cybersecurity\/"},"modified":"2019-07-23T09:38:26","modified_gmt":"2019-07-23T09:38:26","slug":"capgemini-report-shows-why-ai-is-the-future-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/capgemini-report-shows-why-ai-is-the-future-of-cybersecurity\/","title":{"rendered":"Capgemini report shows why AI is the future of cybersecurity"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/digital-security-concept-picture-id961628368.jpg\"><\/p>\n<ul>\n<li>61% of enterprises say they cannot detect breach attempts today without the use of AI technologies<\/li>\n<li>48% say their budgets for AI in cybersecurity will increase by an average of 29% in Fiscal Year (FY) 2020<\/li>\n<li>Breach attempts are proliferating with&nbsp;<a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2019\/\" rel=\"noopener noreferrer\" >Cisco reporting that in 2018, they blocked seven trillion threats on behalf of their customers<\/a><\/li>\n<\/ul>\n<p>These and many other insights are from&nbsp;<a href=\"https:\/\/www.capgemini.com\/research\/reinventing-cybersecurity-with-artificial-intelligence\/\" rel=\"noopener noreferrer\" >Capgemini&rsquo;s Reinventing Cybersecurity with Artificial Intelligence Report<\/a>&nbsp;published this week.&nbsp;<a href=\"https:\/\/www.capgemini.com\/research\/reinventing-cybersecurity-with-artificial-intelligence\/\" rel=\"noopener noreferrer\" >You can download the report here<\/a>&nbsp;(28 pp., PDF, free, no opt-in). Capgemini Research Institute surveyed 850 senior executives from seven industries, including consumer products, retail, banking, insurance, automotive, utilities, and telecom. 20% of the executive respondents are CIOs, and 10% are CISOs. Enterprises headquartered in France, Germany, the UK, the US, Australia, the Netherlands, India, Italy, Spain, and Sweden are included in the report.&nbsp;<a href=\"https:\/\/www.capgemini.com\/research\/reinventing-cybersecurity-with-artificial-intelligence\/\" rel=\"noopener noreferrer\" >Please see page 21 of the report<\/a>&nbsp;for a description of the methodology.<\/p>\n<p>Capgemini found that as digital businesses grow, their risk of cyberattacks exponentially increases. 21% said their organization experienced a cybersecurity breach leading to unauthorized access in 2018.<\/p>\n<p>Enterprises are paying a heavy price for cybersecurity breaches: 20% report losses of more than $50 million.&nbsp;<a href=\"https:\/\/www.centrify.com\/\" rel=\"noopener noreferrer\" >Centrify&rsquo;s<\/a>&nbsp;most recent survey,&nbsp;<a href=\"https:\/\/www.centrify.com\/resources\/industry-research\/pam-survey\/\" rel=\"noopener noreferrer\" >Privileged Access Management in the Modern Threatscape<\/a>, found that&nbsp;<a href=\"https:\/\/www.centrify.com\/resources\/industry-research\/pam-survey\/\" rel=\"noopener noreferrer\" >74% of all breaches involved access to a privileged account<\/a>. Privileged access credentials are hackers&rsquo; most popular technique for initiating a breach to&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/08\/21\/protecting-your-company-when-your-privileged-credentials-are-for-sale\/#7da78ea3c804\" rel=\"noopener noreferrer\" >exfiltrate valuable data from enterprise systems and sell it on the Dark Web<\/a>.<\/p>\n<p>Key insights include the following:<\/p>\n<h3><strong>69% of enterprises believe AI will be necessary to respond to cyberattacks<\/strong><\/h3>\n<p>The majority of telecom companies (80%) say they are counting on AI to help identify threats and thwart attacks. Capgemini found the telecom industry has the highest reported incidence of losses exceeding $50M, making AI a priority for thwarting costly breaches in that industry.<\/p>\n<p>It&rsquo;s understandable by Consumer Products (78%), and Banking (75%) are second&nbsp;and third&nbsp;given each of these industry&rsquo;s growing reliance on digitally-based business models. U.S.-based enterprises are placing the highest priority on AI-based cybersecurity applications and platforms, 15% higher than the global average when measured on a country basis.<\/p>\n<p><a href=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-1-AI-in-Cybersecurity.jpg\"><img decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-16631\" src=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-1-AI-in-Cybersecurity.jpg\" style=\"height:100%; object-fit:contain; width:100%\" \/><\/a><\/p>\n<h3><strong>73% of enterprises are testing use cases for AI for cybersecurity across their organisations today with network security leading all categories<\/strong><\/h3>\n<p>Endpoint security the third-highest priority for investing in AI-based cybersecurity solutions given the&nbsp;<a href=\"https:\/\/www.cio.in\/media-releases\/top-10-strategic-iot-technologies-and-trends-gartner\" rel=\"noopener noreferrer\" >proliferation of endpoint devices, which are expected to increase to over 25B by 2021<\/a>. Internet of Things (IoT) and Industrial Internet of Things (IIoT) sensors and systems they enable are exponentially increasing the number of endpoints and threat surfaces an enterprise needs to protect.<\/p>\n<p>The old &ldquo;trust but verify&rdquo; approach to enterprise security can&rsquo;t keep up with the pace and scale of threatscape growth today. Identities are the new security perimeter, and they require a&nbsp;<a href=\"https:\/\/go.forrester.com\/blogs\/what-ztx-means-for-vendors-and-users\/\" rel=\"noopener noreferrer\" >Zero Trust Security framework<\/a>&nbsp;to be secure. Be sure to follow&nbsp;<a href=\"https:\/\/go.forrester.com\/blogs\/author\/chase_cunningham\/\" rel=\"noopener noreferrer\" >Chase Cunningham of Forrester<\/a>, Principal Analyst, and the leading authority on Zero Trust Security to keep current on this rapidly changing area.&nbsp;<a href=\"https:\/\/go.forrester.com\/blogs\/author\/chase_cunningham\/\" rel=\"noopener noreferrer\" >You can find his blog here<\/a>.<\/p>\n<p><a href=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-2-Breaches-1.jpg\"><img decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-16638\" src=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-2-Breaches-1.jpg\" style=\"height:100%; object-fit:contain; width:100%\" \/><\/a><\/p>\n<h3><strong>51% of executives are making extensive AI for cyber threat detection, outpacing prediction, and response by a wide margin<\/strong><\/h3>\n<p>Enterprise executives are concentrating their budgets and time on detecting cyber threats using AI above predicting and responding. As enterprises mature in their use and adoption of AI as part of their cybersecurity efforts, prediction and response will correspondingly increase. &ldquo;AI tools are also getting better at drawing on data sets of wildly different types, allowing the &ldquo;bigger picture&rdquo; to be put together from, say, static configuration data, historic local logs, global threat landscapes, and contemporaneous event streams,&rdquo; said&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/nickovansomeren\/\" rel=\"noopener noreferrer\" >Nicko van Someren, Chief Technology Officer<\/a>&nbsp;at&nbsp;<a href=\"https:\/\/www.absolute.com\/\" rel=\"noopener noreferrer\" >Absolute Software<\/a>.<\/p>\n<p><a href=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-3-AI-Detection-Prediction-Response.jpg\"><img decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-16633\" src=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-3-AI-Detection-Prediction-Response.jpg\" style=\"height:100%; object-fit:contain; width:100%\" \/><\/a><\/p>\n<h3><strong>64% say that AI lowers the cost to detect and respond to breaches and reduces the overall time taken to detect threats and breaches up to 12%<\/strong><\/h3>\n<p>The reduction in cost for a majority of enterprises ranges from 1% &ndash; 15% (with an average of 12%). With AI, the overall time taken to detect threats and breaches is reduced by up to 12%. Dwell time &ndash; the amount of time threat actors remain undetected &ndash; drops by 11% with the use of AI. This time reduction is achieved by continuously scanning for known or unknown anomalies that show threat patterns.&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-technology-is-saving-petsmart-millions-by-eliminating-sales-fraud\/\" rel=\"noopener noreferrer\" >PetSmart, a US-based specialty retailer, was able to save up to $12M<\/a>&nbsp;by using AI in fraud detection from&nbsp;<a href=\"https:\/\/www.kount.com\/\" rel=\"noopener noreferrer\" >Kount<\/a>. By partnering with Kount, PetSmart was able to implement an AI\/Machine Learning technology that aggregates millions of transactions and their outcomes.<\/p>\n<p>The technology determines the legitimacy of each transaction by comparing it against all other transactions received. As fraudulent orders were identified, they were canceled, saving the company money and avoiding damage to the brand.&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/07\/09\/top-9-ways-artificial-intelligence-prevents-fraud\/#2e553f8f14b4\" rel=\"noopener noreferrer\" >The top 9 ways Artificial Intelligence prevents fraud<\/a>&nbsp;provides insights into how Kount&rsquo;s approach to unsupervised and supervised machine learning stops fraud.<\/p>\n<p><a href=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-4-Cost-and-time-of-breaches.png\"><img decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-16634\" src=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-4-Cost-and-time-of-breaches.png\" style=\"height:100%; object-fit:contain; width:100%\" \/><\/a><\/p>\n<h3><strong>Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user\/machine behavioral analysis are the five highest AI use cases for improving cybersecurity<\/strong><\/h3>\n<p>Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction).<\/p>\n<p>Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity.<\/p>\n<p><a href=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-5-Use-Cases-for-AI-in-Cybersecurity.jpg\"><img decoding=\"async\" alt=\"\" class=\"aligncenter size-full wp-image-16635\" src=\"https:\/\/blogs.forbes.com\/louiscolumbus\/files\/2019\/07\/Figure-5-Use-Cases-for-AI-in-Cybersecurity.jpg\" style=\"height:100%; object-fit:contain; width:100%\" \/><\/a><\/p>\n<h3><strong>56% of senior execs say their cybersecurity analysts are overwhelmed and close to a quarter (23%) are not able to successfully investigate all identified incidents<\/strong><\/h3>\n<p>Capgemini found that hacking organizations are successfully using algorithms to send &lsquo;spear phishing&rsquo; tweets (personalized tweets sent to targeted users to trick them into sharing sensitive information). AI can send the tweets six times faster than a human and with twice the success. &ldquo;It&rsquo;s no surprise that Capgemini&rsquo;s data shows that security analysts are overwhelmed. The cybersecurity skills shortage has been growing for some time, and so have the number and complexity of attacks; using machine learning to augment the few available skilled people can help ease this. What&rsquo;s exciting about the state of the industry right now is that recent advances in Machine Learning methods are poised to make their way into deployable products,&rdquo; said&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/nickovansomeren\/\" rel=\"noopener noreferrer\" >van Someren<\/a>.<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>AI and machine learning are redefining every aspect of cybersecurity today. From improving organizations&rsquo; ability to anticipate and thwart breaches, protecting the proliferating number of threat surfaces with Zero Trust Security frameworks to making passwords obsolete, AI and machine learning are essential to securing the perimeters of any business.&nbsp;<\/p>\n<p>One of the most vulnerable and fastest-growing threat surfaces are mobile phones. The two recent research reports from&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\" rel=\"noopener noreferrer\" >MobileIron<\/a>,&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\/resources-library\/whitepapers\/say-goodbye-to-passwords\" rel=\"noopener noreferrer\" >Say Goodbye to Passwords<\/a>&nbsp;(4 pp., PDF, opt-in) in collaboration with&nbsp;<a href=\"https:\/\/www.idg.com\/\" rel=\"noopener noreferrer\" >IDG<\/a>,&nbsp;and&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\/resources-library\/whitepapers\/passwordless-authentication-bridging-the-gap-between-high-security-and-low-friction-identity-management\" rel=\"noopener noreferrer\" >Passwordless Authentication: Bridging the Gap Between High-Security and Low-Friction Identity Management<\/a>&nbsp;(34 pp., PDF, opt-in) by&nbsp;<a href=\"https:\/\/www.enterprisemanagement.com\/\" rel=\"noopener noreferrer\" >Enterprise Management Associates (EMA)<\/a>&nbsp;provide fascinating insights into the passwordless future. They reflect and quantify how ready enterprises are to abandon passwords for more proven authentication techniques including biometrics and&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\/solutions\/zero-trust\" rel=\"noopener noreferrer\" >mobile-centric Zero Trust Security platform.<\/a><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\"><span style=\"color:blue\"><img decoding=\"async\" alt=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" src=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" style=\"height:59px; width:272px\" \/><\/span><\/a><strong>Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases<\/strong>? Attend the <a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\">Cyber Security &amp; Cloud Expo World Series<\/a> with upcoming events in Silicon Valley, London and Amsterdam to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>61% of enterprises say they cannot detect breach attempts today without the use of AI technologies<br \/>\n48% say their budgets for AI in cybersecurity will increase by an average of 29% in Fiscal Year (FY) 2020<br \/>\nBreach attempts are proliferating with&nbsp;Ci&#8230;<\/p>\n","protected":false},"author":56,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-39331","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=39331"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39331\/revisions"}],"predecessor-version":[{"id":39332,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39331\/revisions\/39332"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=39331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=39331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=39331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}