latest intelligence
APPLYING ARTIFICIAL
INTELLIGENCE TO
CYBERSECURITY
BEYOND THE HYPE
PRESENTED BY
DOWNLOAD WHITEPAPERS AT:
WWW.INTELLIGENTCISO.COM/
WHITEPAPERS
rtificial Intelligence (AI)
A
is a ‘hot’ technology that
holds great promise in
many fields, including
cybersecurity. In fact, many security
vendor threat research labs — rich in Big
Data and security expertise — have been
using it to keep pace with a constantly
evolving cyber-threat landscape.
More recently, such technologies are
being applied to an organization’s
own cybersecurity information to
detect threats that may have bypassed
traditional cyber defenses. In certain
cases, AI has even been distributed to
the existing inspection points for realtime
blocking of threats without global
threat intelligence.
Assessing the true value of an AI
solution requires cutting through the
hype and ambiguity.
Key considerations include:
• Deployment location and model:
Is the AI deployed in a global threat
lab, organization-specific data
lake, or as part of in-line security
controls? Which AI models are used
to generate threat intelligence?
• AI output: Does the threat
intelligence block a threat when
received, trigger an alert, or trigger
an immediate blocking action?
• Threat coverage: Which threat
classes and cyber kill chain stages
are covered by the AI model?
No single location, output, or cyber
kill chain stage is best to apply AI
technologies. Each organization
should determine the right mix based
on factors such as their risk appetite,
budget, staffing, and security
maturity level. u
16 Issue 26 | www.intelligentciso.com