Changing the CISO’s mindset on automation

Issue 1 2022 Information Security

Accepting automation in cybersecurity is a critical part of an organisation’s defence in today’s threat landscape. By default, most security teams are risk averse, adopting the mentality that things simply can’t be allowed to go wrong.

Yet, too often, this desire for complete control exposes the business to other significant risks, as they neglect new solutions and face overwhelming workloads as a result. In fact, the pace that today’s cyber criminals work at means CISOs need to do away with this old-fashioned approach – it’s time for a complete change of mindset.

The age of cyber automation is here

Despite the increasing number of daily alerts and threats, too many organisations are still relying on manual processes and controls to manage their security measures and are ignoring the fact automation is now a vital part of modern cybersecurity. They’re failing to recognise just how much machine learning and artificial intelligence (AI) can transform threat monitoring through real-time issue detection and intelligently automated responses.

Offloading a degree of responsibility to machines may seem daunting, but it’s no longer something CISOs can ignore. The sheer number of cybercriminals now making the leap to automation means a shift in mindset is essential to keep up and stay protected.

I’ve identified three key reasons why CISOs are reluctant to give up control to automation:

1. They believe existing measures are enough

Far too many organisations assume their existing cybersecurity measures are protecting them effectively from everyday threats. According to our research, 76% of CISOs rate their organisations’ IT strategy as excellent or good at protecting against cybersecurity threats. But 84% also say their organisation has suffered data loss or a security incident in the last two years. Clearly, something’s not adding up between the CISO’s strategy perceptions and the reality of what’s happening.

2. They have difficulties overcoming the trust barrier

Trust is also a key barrier when it comes to automation because, before they can give control over to automated processes, CISOs need to be sure that:

• Machines making decisions and taking control of security measures won’t make mistakes or interfere with operations.

• They can trust a third-party provider to help them adopt AI successfully.

• Other vendors involved are able to understand the intricacies of their organisation and cybersecurity.

3. They see it as an ‘all-in’ decision

Many CISOs get hung up on the idea that, if they’re going to embrace automation, they’re giving total control to AI. But it’s a myth that automation has to be implemented without human intervention. Generally, every organisation has different requirements and faces industry-specific threats, which means that:

• Automation must be adjusted to create an effective partnership between machine-assisted and human-led decision making.

• From there, AI learns over time from the human so it can deliver better and more intelligent decision making.

• Only then, potentially, will it reach a point where humans no longer need to be involved.

AI can be a game changer in cybersecurity

Letting these barriers hold your organisation back is effectively giving cybercriminals an advantage. With so many modern cyber-attacks now heavily automated, enterprises need to adopt more automation to level the playing field. AI-powered automation can help identify relevant intelligence from the sea of incoming data that threatens to overwhelm the security department, as well as taking on more mundane security tasks.

This frees up staff to focus on urgent and high priority threats, something that’s especially important considering the shortage of cyber skills affecting so many organisations. Then, when a new threat is identified, automation can implement updates and patching to protect networks faster than an attack can spread, minimising any potential impact.

AI can go further, too, predicting malicious behaviours so organisations can proactively prepare for new threats. And, despite popular belief, deploying automation doesn’t require a ‘rip-and-replace’ of existing security investments. Instead, automated solutions can be integrated with the technologies already in place, to optimise capabilities and identify gaps in defences.

Introducing automation is a hard undertaking to tackle alone

The sheer scale and pace of today’s cyber threats means security teams are already pushed to their limits. So, it’s critical CISOs recognise that there are new ways to use automation to gain complete control over their organisation’s security and that the risk of falling behind in the struggle against cyberattacks must outweigh any fear of change. It’s a significant challenge though.

Bringing in a like-minded partner to manage your day-to-day security can unlock your CISO’s time and energies to look again at your cybersecurity strategy and to focus on giving your company an edge. Then, as their use of automation increases, organisations won’t have the burden of managing time-consuming, repetitive tasks, so they can take a more proactive stance towards tackling unpredictable threats.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...
Create order from chaos
Information Security
The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyberthreats are growing in complexity and frequency, demanding sophisticated solutions that not only detect, but also prevent, malicious activities effectively.

Read more...
Trend Micro launches first security solutions for consumer AI PCs
Information Security News & Events
Trend Micro unveiled its first consumer security solutions tailored to safeguard against emerging threats in the era of AI PCs. Trend will bring these advanced capabilities to consumers in late 2024.

Read more...
Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

Read more...
Responsible AI boosts software security
Information Security
While the prevalence of high-severity security flaws in applications has dropped slightly in recent years, the risks posed by software vulnerabilities remain high, and remediating these vulnerabilities could hinder new application development.

Read more...
AI and ransomware: cutting through the hype
AI & Data Analytics Information Security
It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...