Is Artificial Intelligence The Answer To The Cybersecurity Skills Shortage?

Brought to you by CYRIN

It seems like 2024 is starting off like 2023 with AI one of the hottest topics of 2023, and still a hot topic in 2024. According to Wikipedia, the most viewed article in 2023 was about ChatGPT, more popular even than the Barbie movie or Taylor Swift.

The shortage of skilled cybersecurity workers remains a significant issue, posing a threat to companies, governments, and particularly the military. As we start the new year, can AI assist in meeting these labor demands, potentially providing solutions to the ongoing labor shortfall?

The question that we ask is: how will AI in general address or help the cybersecurity industry? Can it impact one of its most critical issues – the lack of skilled workers in cybersecurity. This amid the backdrop of nation states like China showing an uptick in cyber-attacks on the United States, highlighting the need for this talent gap of skilled workers to be closed as quickly as possible.

Can AI Solve The Growing Cybersecurity Shortage?

While the cybersecurity workforce has significantly increased over the past few years, there is still an alarming shortfall in the number of professionals needed to meet the rising demand. In a study conducted by ISC2, they concluded that “the demand is still outpacing the supply,” even as the estimated global cybersecurity workforce recorded an 8.7% increase from 2022, creating 440,000 new jobs, the highest number historically recorded. Even so, “the cybersecurity workforce gap has reached a record high, with 4 million professionals needed to adequately safeguard digital assets.” In addition, 75% of cybersecurity professionals report that the current threat landscape is the most challenging it has been in the last five years. Only 52% believe their organization has adequate tools and people to respond to cyber incidents over the next two to three years. Perhaps one answer is to combine more skilled workers with secure AI solutions that have been created with carefully crafted guardrails.

According to some prognosticators, AI presents a feasible and cost-efficient answer to labor shortages in the cybersecurity workforce. The cyber landscape is getting more difficult each year. Complications include the rapidly changing threat landscape combined with the labor shortage and the frequency of hackers – especially nation state attackers - which continues to rise. Eitan Worcel, writing for Builtin.com, suggests that no matter how fast the cybersecurity field grows, it can’t keep pace with vulnerabilities that arise daily, and the field needs to increase efficacy and resilience in responses to cyberthreats, including the ability to predict potential threats or vulnerabilities before they happen.

According to Worcel, this is where AI might prove useful: “To effectively secure our digital assets, it’s time we shift our focus from a human-centered approach to one that embraces technology as a partner. This shift is not just necessary; it’s inevitable in our industry.”

He goes on to say that “Rather than viewing technology and automation as substitutes for human expertise, we should see them as complementary tools. The collaboration between humans and machines can leverage the strengths of both — the creativity, intuition, and contextual understanding of humans, coupled with the speed, scalability, and precision of machines. This synergy represents the future of cybersecurity.”

An article on LinkedIn weighed in on the problem with an analysis of the recent Billington Cybersecurity Summit, where government and private sector leaders discussed strategies to address the cybersecurity personnel shortfall. They noted that “analysts are drowning in alerts” – to the point that virtually all of them fear they will overlook a relevant security event because it’s “buried” under alerts. AI, they asserted, is a useful asset, and need not be viewed solely as a threat. IBM research reveals that organizations with extensive automation and AI will identify and contain a data breach 108 days faster than those which do not use the technologies, while reducing the average cost of breaches “by nearly $1 million.” The Linkedin article quoted Mark Gorak from the Defense Department, who indicated at the Billington Summit that as the investment in AI and automation grows, “anyone who thinks AI is going to replace humans in all aspects is wrong. We actually need more humans to work with the AI to make sure that it’s doing what we want it to do.” As the article stressed, it won’t be AI and automated tools by themselves, or more humans that will solve the problem. It will have to be people working to maximize the value of the tools.

Recent Attacks Show What Is At Stake

Simply increasing the number and volume of skilled workers will not alone solve the problem; instead, AI can help optimize the approach to cybersecurity, making it more efficient and resilient in the face of evolving threats from other nation states. With China increasingly going on the offensive in its attacks on the US, and with cybercrime on the rise, the military, as well as the private sector, is looking to use AI to augment its shortage of workers.

Ellen Nakashima, writing for The Washington Post, recently reported that “The Chinese military is ramping up its ability to disrupt key American infrastructure, including power and water utilities as well as communications and transportation systems, according to U.S. officials and industry security officials. Among the recent attacks are a water utility in Hawaii, a major West Coast port and at least one oil and gas pipeline, people familiar with the incidents told The Washington Post. The hackers also attempted to break into the Texas power grid, which operates independently from electrical systems in the rest of the country.” Known as “Volt Typhoon,” this cyber campaign was uncovered a year ago as part of China’s effort to lay the groundwork in the event of future clashes with the US in the Pacific.

In the same Washington Post article, according to Brandon Wales, executive director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), “it is very clear that Chinese attempts to compromise critical infrastructure are in part to pre-position themselves to be able to disrupt or destroy that critical infrastructure in the event of a conflict, to either prevent the United States from being able to project power into Asia or to cause societal chaos inside the United States — to affect our decision-making around a crisis.” This represents “a significant change from Chinese cyber activity from seven to 10 years ago that was focused primarily on political and economic espionage.”

Morgan Adamski, director of the National Security Agency’s Cybersecurity Collaboration Center, sounded this important alarm: “This is a fight for our critical infrastructure. We have to make it harder for them.” NBC News reported similar warnings by Jen Easterly, the director of the U.S. Cybersecurity and Infrastructure, who urged people to take very seriously the threat China poses to critical infrastructure in the U.S.

An article in Politico noted that while Russian cyber-attacks have been in the news due to the war in Ukraine, American officials have been increasingly alarmed by China’s advances, particularly as they may impact Taiwan, an important ally of the US.

Politico notes that “China is viewed as one of the most dangerous nations in cyberspace, and its cyber espionage operations are among some of the U.S. government’s top cyber-related investigations. And the intelligence community’s threats assessments have long warned that China is “almost certainly capable” of launching disruptive and destructive cyberattacks.”

In 2020, FBI Director Christopher Wray stated that his agency opens a new investigation into a Chinese counterintelligence effort every 10 hours, and half of the FBI’s counterintelligence investigations are related to China.

It's clear that AI will be an important player in the future of cybersecurity. It remains to be seen how AI will be utilized to help address the cyber workforce shortage, as well as head off potential malicious threats from nation states and other sources.

How Can CYRIN Help?

It’s clear from this report and others that there are some major concerns in the cybersecurity industry – chief among them being lack of workers and the need to utilize new technology such as AI in a way that helps to alleviate this shortage and harden existing networks against persistent cyber threats. Fortunately, CYRIN can help on both fronts.

For the education market, we consistently work with colleges and universities both large and small to create realistic training to meet the environment students will encounter when they graduate and enter the workforce.

For industry we continue to work with our partners to address major challenges including incident response, ransomware, and phishing and set up realistic scenarios that allow them to train their teams and prepare new hires for the threats they will face. Government agencies have been using CYRIN for years, training their front-line specialists on the real threats faced on their ever-expanding risk surface.

We also work with all our users to create new content which will fit into this rapidly changing cyber landscape. In an increasingly digitized world, training, and experiential training is critical. Unless you get the “hands-on” feel for the tools and attacks and train on incident response in real world scenarios, you just won’t be prepared for when the inevitable happens. A full-blown cyberattack is not something you can prepare for after it hits. The best time to plan and prepare is before the attack.

Our training platform teaches fundamental solutions that integrate actual cyber tools from CYRIN’s labs that allow you to practice 24/7, in the cloud, no special software required. Cyber is a team effort; to see what our team can do for you take a look at our course catalog, or better yet, contact us for further information and your personalized demonstration of CYRIN. Take a test drive and see for yourself!

Image: Studio M1



You Might Also Read: 

What’s The Problem With Open-Source Software & Cybersecurity?:                                                          _______________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Deepfakes Designed To Mislead Voters
Five Security Benefits Of Application Mapping »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Karate Labs

Karate Labs

Karate is an open-source unified test automation platform combining API testing, API performance testing, API mocks & UI testing.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.