Augmented Cybersecurity: How to Thrive Amid Complexity

Digital Transformation and Cyber Security are the two sides of the same coin. As we adopt new technologies such as Cloud, RPA, Data Lake, Artificial Intelligence (AI), Smart manufacturing, Industry 4.0 etc., our threat landscape also changes, and we need to be careful about the same. Cyber security programs must be designed to look at every aspect of infrastructure security holistically. With surge of AI usage, Cyber threats have become very complex, and we need to fight AI with AI. AI and Machine Learning will have to complement our current cyber security capability (People, Process, and Technology) to counter new threats. AI & ML has great potential to enable more mature, agile, and adaptive Cyber security controls which is the backbone of Zero trust framework. It can revolutionise the way our current technologies are doing User Behaviour Analysis (UBA), Device posture management, analysis of threat vectors on the fly, better categorization & application of available contextual threat intelligence, Security Incident and Event Management (SIEM) and reduce falls positives.

We need to learn from history, as horse riders used to fight with horse riders, Elephant riders with Elephant riders, similar, we need to fight complex and advanced Cyber threats in the era of AI with AI powered technologies which is backed by strong pillars of Cyber security – people, process & Technology.

A holistic approach is the key strategy for the evolving complex cyber threats, for which NIST’s Five pillars – Identify, Protect, Detect, Respond and Recover is the key. It is a fact that despite doing everything, things may go wrong, hence we must build an appropriate cyber resilience and cyber incident response strategy to manage cyber breach efficiently and effectively.

The below 7- mantras may help in managing the current and future cyber risks holistically –

  1. Reduce attack surface – We must do everything to reduce Cyber exposure.
  2. Protect from known threats – Build capability to detect and protect organization from known threats.
  3. Detect unknown threats – Build capability to detect unknown threats. AI & ML will play major role in enabling such cyber security controls to achieve this.
  4. Protect from Un-known threats – This is the North star for every cyber security professional and entire eco system must build such capability. Optimal usage of AI & ML powers adaptive and augmented cyber security program and application of holistic zero trust framework. This will always be a moving target.
  5. Drive Change Management – A well thought through change management strategy across all levels of organization to ensure smooth adoption, full cooperation, real value realization, open gates of innovation and in the longer-term build an appropriate culture.
  6. Keep the basics strong– Ensure People, Process & Technology completement eachother to get maximum value out of it.
  7. Regular reviews and willingness to improve Cyber security posture every day.

We are at unique juncture of the time where businesses are eager to adopt latest technologies due to various compelling reasons and we have great responsibility to ensure smooth business operation in such a complex, digitally connected environment.

Ambarish Singh
Ambarish Singh
CISO
Godrej & Boyce Mfg. Co, Ltd.
- Advertisement -

Disclaimer: The views expressed in this feature article are of the author. This is not meant to be an advisory to purchase or invest in products, services or solutions of a particular type or, those promoted and sold by a particular company, their legal subsidiary in India or their channel partners. No warranty or any other liability is either expressed or implied.
Reproduction or Copying in part or whole is not permitted unless approved by author.
To explore more insights from CISOs across South Asia, download your copy of the CISO Handbook today.
CISO handbook
CISO handbook – Strategic Cyber Vision, encapsulates point of views of 60+ CISOs and cybersecurity leaders across South Asia, highlighting the best practices, impact of AI and the cybersecurity landscape.
Download Now

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024