By Vinod Vasudevan, Global CTO MDR & Deputy Global CTO – Cybersecurity Services, Atos

The blind spot

The key challenge that SOCs have today is detecting advanced attacks early and responding rapidly.   Advanced attacks use newer techniques or significant variation of an existing one,hence these attacks cannot be detected using previously known signatures. Similarly, threat actors are getting better at camouflaging or launching attacks from compromised systems of a legitimate organization. This defeats threat intelligence-based detection using IoCs including IP/ULR/email IDs/ Usernames. There is a blind spot for conventional security technologies where it is an unknown attack and an unknown threat actor.

The value of AI for detection of blind spots

AI can throw light on this blind spot and enable detection. AI can do this by profiling known good behavior and detecting deviations from these baselines. As an example, using AI we can profile a normal/admin user for systems of allowed access, data size, time of access (time of day, week). An attacker who compromises this user will show different access patterns that can be detected as an anomaly using AI algorithms. Such profiling can be used to detect lateral movement, data exfiltration. AI can also be used to learn from known malicious behavior when enough data samples are available. This is true for detection of malware binaries. Deep learning algorithms can be used to learn from millions of malware samples available to detect malware even if new or hitherto unknown malware.

More effective response capabilities and interconnected SOCs

As we step into the future, AI algorithms can also be used to learn successful response mechanisms used to contain & orchestrate a successful ransomware response. This will lead to autonomous response that can trigger response steps in real time to contain major attacks and ensure that business impact is reduced. AI can also give much better results as we create, interconnect and strengthen national and regional Security Operation Centers (SOCs) of critical infrastructure or functions at national and EU level. Interconnected SOCs can provide more data for AI algorithms to learn from and learning can be transferred across SOCs to democratize the detection and response capabilities.

AI is key to face an ever-evolving threat landscape

Cyber crime syndicates have already started using AI for launching targeted attacks. The use of AI makes it easy to launch personalized attacks at scale. This also means that we cannot depend only on rule based approach to counter AI driven attacks. We cannot afford armies of highly scarce Cyber Security professionals to staff SOCs. The use of AI in SOC will enable automation of human actions, emulate human intelligence in analysis/response and enable the scale required for successful response to such AI driven attacks.

The future is towards using AI for tactical scale in combination with Human Intelligence for strategic actions for combating the ever-evolving complex threat landscape.

You may also like

UK/EU Summit - “Risk to Resilience”
icon External Engagement

UK/EU Summit - “Risk to Resilience”

Detlef Houdeau, Senior Director, Business Development at Infineon Technologies was a speaker at the inaugural UK/EU Summit organized by our newest Associated Partners Shared Assessments.

💡Under the theme “Risk to Resilience” the first event of this series was held in London and brought together professionals from different industries and regions. Detlef participated in the panel about the complex regulatory landscape and emphasized that new legislation like the EU AI Act, DORA and Hashtag#NIS2 continue to push the standard of care on cybersecurity and other risks.

Thanks to Shared Assessments for organizing such an amazing event and inviting the Charter of Trust to participate in this high-class panel alongside Andrew Moyad, CEO at Shared Assessments.
October 08, 2024
36th Cyber Security Day: Working together for more resilience in the digital future
icon External Engagement

36th Cyber Security Day: Working together for more resilience in the digital future

Strong networks and effective cooperation are the key to successfully shaping the digital future in Germany. Cybersecurity is a team effort, and that was again visible last week at the 36th Cyber Security Day in Berlin.

🌐On 26 September 2024, the Bundesamt für Sicherheit in der Informationstechnik (BSI), Alliance for Cyber Security, and the DIHK invited experts, companies, authorities and political decision-makers to jointly strengthen Germany's cyber resilience.

The event was a great mix of policy debate, practical exchange, workshop and networking under the motto ‘Stronger Together: Greater Resilience through Cooperation’.

✨ One of the highlights of the day was the closing panel with Claudia Plattner, President of the BSI, Dr. Stefan Saatmann, Deputy Head Berlin Office at Siemens, Konstantin von Notz, Member of the Bundestag for B90/Greens, and Alexander von Gernler, German Informatics Society, interchanging ideas to foster resilience through collaboration. Initiatives like the CoT baseline requirements and its huge potential for international harmonizing cybersecurity regulations were discussed as well.

Let’s all work together so that closer cooperation between the BSI and businesses bring more tangible effects to increase digital resilience. Special thanks to Nils Hasenau for providing the excellent photos and also to Simon Ulmer and Ralf König for attending the event.
October 01, 2024
Nordic Cyber Summit 2024
icon External Engagement

Nordic Cyber Summit 2024

The Charter of Trust at the Nordic Cyber Summit
What a great opportunity for Morten Kromann, Head of Industrial Security Denmark at Siemens, to present the Charter of Trust perspective on cybersecurity regulations like Hashtag#NIS2 at the Nordic Cyber Summit in Copenhagen.

This year the summit was again a formidable event to engage with top cybersecurity experts, share insights, and discuss strategies to navigate the ever-evolving threat landscape in the Nordic region with the theme “Fortifying the Future: Building Cyber Resilience in a Transformed World”.

A main aspect highlighted by Morten was the discrepancies between the NIS2 directive’s incidents reporting timeframe and related provisions adopted in other legislations. These regulatory overlaps create difficult compliance environments for industry and costly operational pressures which add to the fragmentation of the market instead of harmonizing it. That is why the Charter of Trust emphasizes streamlining reporting requirements stemming from these different legislative frameworks and developing single entry points for reporting on the national level.

These and more points have been discussed during our Security-by-default Webinar on the 29th of October. See the events section on this website to find the recording of the webinar.
September 16, 2024