Mon. May 23rd, 2022
    en flag
    nl flag
    et flag
    fi flag
    fr flag
    de flag
    he flag
    ja flag
    lv flag
    pl flag
    pt flag
    es flag
    uk flag

    Content Assessment: Automating Incident Response? Considering Artificial Intelligence in Cyberspace

    Information - 92%
    Insight - 93%
    Relevance - 91%
    Objectivity - 94%
    Authority - 95%

    93%

    Excellent

    A short percentage-based assessment of the qualitative benefit of the research report from the NATO CCDCOE on the topic of incident response automation.

    Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations, and ComplexDiscovery community members. While ComplexDiscovery regularly highlights this information, it does not assume any responsibility for content assertions.

    To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today.


    Background Note: Shared for the non-commercial educational benefit of cybersecurity, information governance, and eDiscovery professionals, this recently published research report from the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) explores the use of artificial intelligence for incident response.

    Paper from CCDCOE*

    Automated/Autonomous Incident Response

    Vasileios Anastopoulos, PhD and Davide Giovannelli, LL. M.

    Report Introduction

    Artificial intelligence (AI) has existed for a long time in a way that seems to affect every aspect of our lives in a modern society, but it is only recently that its applications have been made known to the public. AI is already present in many fields including education, agriculture, health and medicine, manufacturing and transportation.

    Cyberspace as ‘a global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers’, is omnipresent within everyday activities, but its use for malicious acts has also risen the need for cybersecurity, ‘the ability to protect or defend the use of cyberspace from cyberattacks’. AI applications are already present in cyberspace, used both by the attackers and the defenders. It could render cyber attacks more successful, leveraging, for example, its ability to replicate natural language and thus making phishing emails more successful, or developing autonomous cyber weapons that could attack and self-replicate. It could also help defenders in detecting anomalies and quickly addressing vulnerabilities and misconfiguration. Currently, there is a controversy about the impact of AI in cyberspace, with one study warning that it could drive to more aggressive and destabilizing engagements between nations, while another states that attackers will be less likely to employ AI due to its constraints, flaws and limitations unless they see unique benefits. What is clear, though, is that ‘while the discussion regarding autonomy in the physical world is largely about systems that are not quite yet in operation, in the cyber-world, autonomy is already a reality’.

    According to recent surveys, when an incident response is led by humans it is no longer possible to keep up with the speed, scale and sophistication of automated cyber attacks. The need for more sophisticated technologies is emerging with defenders turning their efforts to guarding against AI-powered attacks and by enabling AI defenses. Every day more and more security teams rely on AI to stop threats from escalating even at the early stages of a compromise. Organizations employing AI in cyber security report benefits from its application with increased return on investment (ROI) being one of them. The use of AI in incident response enables security teams to identify, investigate and remediate threats a lot faster, while the effort required is also reduced. Reacting in a timely manner is crucial for cyber defense and reducing the human effort required to respond to security events, facilitates the security teams to focus on the cybersecurity aspects they wish to.

    Commercial products have already integrated AI technologies to fight against cyber attacks such as spam mail, ransomware and malware. Vendors continue to integrate AI features into their products while new solutions based on AI are on the rise, such as autonomous response to thwart attacks in progress, automation of the investigations process, protection against phishing attacks, endpoint protection and more.

    Read the original post.


    Complete Report: Automated/Autonomous Incident Response (PDF) – Mouseover to Scroll

    Automated:Autonomous Incident Response - CCDCOE

    Read the original paper.

    NATO Cooperative Cyber Defence Center of Excellence – Cyber Defence Library


    Additional Reading

    Source: ComplexDiscovery

     

    Have a Request?

    If you have information or offering requests that you would like to ask us about, please let us know and we will make our response to you a priority.

    ComplexDiscovery is an online publication that highlights cyber, data, and legal discovery insight and intelligence ranging from original research to aggregated news for use by cybersecurity, information governance, and eDiscovery professionals. The highly targeted publication seeks to increase the collective understanding of readers regarding cyber, data, and legal discovery information and issues and to provide an objective resource for considering trends, technologies, and services related to electronically stored information.

    ComplexDiscovery OÜ is a technology marketing firm providing strategic planning and tactical execution expertise in support of cyber, data, and legal discovery organizations. Focused primarily on supporting the ComplexDiscovery publication, the company is registered as a private limited company in the European Union country of Estonia, one of the most digitally advanced countries in the world. The company operates virtually worldwide to deliver marketing consulting and services.

    Challenged by Leaky Forms? A Study of Email and Password Exfiltration

    The report "Leaky Forms: A Study of Email and Password Exfiltration...

    Automating Incident Response? Considering Artificial Intelligence in Cyberspace

    According to the recent research report from the CCDCOE on Automated/Autonomous...

    Russian Cyberattack Activity in Ukraine: A Special Report from Microsoft

    According to an April 27, 2022 report from Microsoft's Digital Security...

    Informing Business Decisions? Cybersecurity Market Analysis Framework from ENISA

    The ENISA Cybersecurity Market Analysis Framework is designed to improve market...

    Smarsh to Acquire TeleMessage

    “As in many other service industries, mobile communication is ubiquitous in...

    A Milestone Quarter? DISCO Announces First Quarter 2022 Financial Results

    According to Kiwi Camara, Co-Founder and CEO of DISCO, “This quarter...

    New from Nuix? Macquarie Australia Conference 2022 Presentation and Trading Update

    From a rebalanced leadership team to three concurrent horizons to drive...

    Strong Growth? KLDiscovery Inc. Announces First Quarter 2022 Financial Results

    According to Christopher Weiler, CEO of KLDiscovery Inc, “The first quarter...

    On the Move? 2022 eDiscovery Market Kinetics: Five Areas of Interest

    Recently ComplexDiscovery was provided an opportunity to share with the eDiscovery...

    Trusting the Process? 2021 eDiscovery Processing Task, Spend, and Cost Data Points

    Based on the complexity of cybersecurity, information governance, and legal discovery,...

    The Year in Review? 2021 eDiscovery Review Task, Spend, and Cost Data Points

    Based on the complexity of cybersecurity, information governance, and legal discovery,...

    A 2021 Look at eDiscovery Collection: Task, Spend, and Cost Data Points

    Based on the complexity of cybersecurity, information governance, and legal discovery,...

    Five Great Reads on Cyber, Data, and Legal Discovery for May 2022

    From eDiscovery pricing and buyers to cyberattacks and incident response, the...

    Five Great Reads on Cyber, Data, and Legal Discovery for April 2022

    From cyber attack statistics and frameworks to eDiscovery investments and providers,...

    Five Great Reads on Cyber, Data, and Legal Discovery for March 2022

    From new privacy frameworks and disinformation to business confidence and the...

    Five Great Reads on Cyber, Data, and Legal Discovery for February 2022

    From biometric recognition and artificial intelligence to data embassies and processing...

    Feeding the Frenzy? Summer 2022 eDiscovery Pricing Survey Results

    Initiated in the winter of 2019 and conducted eight times with...

    Surge or Splurge? Eighteen Observations on eDiscovery Business Confidence in the Spring of 2022

    In the spring of 2022, 63.5% of survey respondents felt that...

    Types and Shadows? Issues Impacting eDiscovery Business Performance: A Spring 2022 Overview

    In the spring of 2022, 36.5% of respondents viewed increasing types...

    The Tide is In? eDiscovery Operational Metrics in the Spring of 2022

    In the spring of 2022, 46 eDiscovery Business Confidence Survey participants...