Intelligent CISO Issue 26 | Page 16

latest intelligence APPLYING ARTIFICIAL INTELLIGENCE TO CYBERSECURITY BEYOND THE HYPE PRESENTED BY DOWNLOAD WHITEPAPERS AT: WWW.INTELLIGENTCISO.COM/ WHITEPAPERS rtificial Intelligence (AI) A is a ‘hot’ technology that holds great promise in many fields, including cybersecurity. In fact, many security vendor threat research labs — rich in Big Data and security expertise — have been using it to keep pace with a constantly evolving cyber-threat landscape. More recently, such technologies are being applied to an organization’s own cybersecurity information to detect threats that may have bypassed traditional cyber defenses. In certain cases, AI has even been distributed to the existing inspection points for realtime blocking of threats without global threat intelligence. Assessing the true value of an AI solution requires cutting through the hype and ambiguity. Key considerations include: • Deployment location and model: Is the AI deployed in a global threat lab, organization-specific data lake, or as part of in-line security controls? Which AI models are used to generate threat intelligence? • AI output: Does the threat intelligence block a threat when received, trigger an alert, or trigger an immediate blocking action? • Threat coverage: Which threat classes and cyber kill chain stages are covered by the AI model? No single location, output, or cyber kill chain stage is best to apply AI technologies. Each organization should determine the right mix based on factors such as their risk appetite, budget, staffing, and security maturity level. u 16 Issue 26 | www.intelligentciso.com