TRENDING of all invested parties. In the long run, the realization that
they’ d much rather deal with a temporary inconvenience versus having personal or proprietary information fall into the wrong hands will likely become the norm.
As this shift takes place, the combined effort between SecOps and ITOps teams to combat threats will require constant communication and organization. Beyond staying informed about emerging threats and techniques, these teams should work together to conduct regular tabletop exercises to simulate attacks, evaluate response readiness, and refine their incident response plans.
Cybersecurity teams will become augmented operators rather than mere responders
We’ ve already seen augmented reality, like Microsoft’ s mixed-reality headsets, enhance physical battlefield awareness by enabling US soldiers to see through smoke, around corners and view 3D terrain maps in their field of vision. While there aren’ t too many people who realistically think technology will fully-replace soldiers on the physical and cyber battlefield in the near term, we all agree that it will help them do their jobs better. responses, will give way to cybernetic detection and response, where AI acts as a powerful force multiplier for security teams.
To fully grasp this shift, organizations must rethink how they deploy cybersecurity personnel. AI can sift through vast amounts of data, highlight high-priority issues and even take predefined automated actions to mitigate threats. For organizations today, it’ s critical to evaluate current AI capabilities and implement tools that can assist with tasks such as threat hunting, phishing detection and log analysis for the most impact.
If we continue treating cyber criminals like superhero villains, they’ ll continue growing more emboldened
Other than state-sponsored threat actors, most cyber criminals are motivated by financial gain and the notoriety that comes along with executing high-profile attacks. As a cybersecurity industry, we’ re doing everything we can to prevent attackers from financial gain, but we’ re not doing much to stop them from their quest for fame which, in turn, earns them the respect of their peers and motivates them even more. In fact, we’ re giving them exactly what they want.
As AI continues to be infused into all cyber operations, it will similarly enhance human efforts by automating routine frontline tasks, providing real-time threat insights, and potentially identifying zero-day vulnerabilities autonomously. Google’ s recent claim that an AI agent discovered a previously unknown vulnerability in real-world code indicates that we’ re closer than we might think to this becoming a widespread reality.
As AI is more deeply embedded in cybersecurity operations, cybersecurity services will adapt. For example, traditional managed detection and response( MDR), which relies on human-led detections and
It’ s no mistake that groups like Qilin, Dark Angels, REvil, CL0P or LockBit sound like superhero villains. It feeds into their egos. If we continue referring to them by these names, or creating other cool-sounding names for them or the malware they deploy, we’ re playing their game, by their rules.
Instead, we need to set the rules. A crucial part of reshaping cybersecurity is not just about defense – it’ s also about how we frame the narrative around cybercrime. Referring to them with a non-descript naming convention, similar to KEVs( Known Exploited Vulnerabilities) helps take notoriety away from these groups, acting almost like kryptonite to them.
24 INTELLIGENTCIO APAC www. intelligentcio. com