Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020

Cognitive systems are driving $8 billion in revenue in 2016, and the space, which includes artificial intelligence (AI) and machine learning, is slated to become a $47 billion industry by 2020.

According to the IBM Institute of Business Value (IBV), cognitive solutions are already seeing widespread adoption in other industries. Yet the security community is still in the early stages of pioneering cognitive security systems. Today, only 7% of security professionals claim to be using cognitive technologies, and a lack of internal skills in the area and competency are the main obstacles, both cited by 45% of respondents.

That said, 21% said their organisations plan to use these solutions in the next two to three years, meaning that the use of cognitive security is set to triple within the next few years.

Ironically, the staffing challenge is also a driver: “The 24/7 nature of security operations presents a challenge that is costly for most organizations to staff, which is where the appeal of cognitive-enabled security comes in, it never sleeps or fatigues,” said Michael Pinch, CISO, University of Rochester, in the report.

In terms of where respondents think that cognitive could improve outcomes, nearly 60% of security professionals believe cognitive security solutions can significantly slow down cyber-criminals.

About 40% of respondents believe this technology will improve detection and incident response decision-making capabilities. A full 37% of respondents believe cognitive security solutions will significantly improve incident response time, and 36% of respondents think cognitive security will provide increased confidence to discriminate between innocuous events and true incidents.

“Cognitive security has so much potential, you can meet your labor shortage gap, you can reduce your risk profile, you can increase your efficiency of response,” said David Shipley, director of Strategic Initiatives, Information Technology Services, University of New Brunswick, in the report. “It can help you understand the narrative story. People consume stories—this happened, then this happened, with this impact, by this person. Additionally, cognitive can lower the skills it takes to get involved in cybersecurity. It allows you to bring in new perspectives from non-IT backgrounds into cracking the problem.”

And on a related note, the study revealed that the top challenges in security today are reducing incident response times (45%), optimising accuracy of alerts (41%) and staying current on threat research (40%). Threat research was also the top challenge cited due to insufficient resources, according to 65% of respondents.

“These challenges are, in many ways, intertwined. If security analysts were able to stay current on threats and increase accuracy of alerts, they could also reduce response time. This means there are many scenarios in which cognitive could help,” said Diana Kelley, executive security advisor for IBM Security, in a blog.

She added, “Although it’s not a silver-bullet, automation and cognitive security are part of an evolution necessary to solve some of the biggest security challenges today and in the future. As we continue forward, we need to evaluate use cases and determine together how cognitive technologies can integrate into day-to-day security operations to address our security challenges in a new and better way.

Infosecurity:

 

« CyberXchange Conference 2016
Snowden 2.0: Its Déjà Vu All Over Again At The NSA »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.