{"id":21989,"date":"2024-10-29T15:53:56","date_gmt":"2024-10-29T15:53:56","guid":{"rendered":"https:\/\/interface.media\/?p=21989"},"modified":"2024-10-29T15:57:14","modified_gmt":"2024-10-29T15:57:14","slug":"harnessing-ai-for-enhanced-organisational-security","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/","title":{"rendered":"Harnessing AI for enhanced organisational security"},"content":{"rendered":"\n<p>Prior to the mainstream AI revolution, which started with the public launch of ChatGPT, organisations were already embedding AI in one form or another into security controls for some time. Historically, security product developers have favoured using Machine Learning (ML) in rheir products, dating back to the millennium when intrusion detection systems began to use complex models to identify unusual network traffic.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-machine-learning-and-security-nbsp\">Machine learning and security&nbsp;<\/h3>\n\n\n\n<p>Since then, developers have employed ML in many categories of security <a href=\"https:\/\/interface.media\/blog\/2024\/09\/26\/from-tfl-to-your-next-cyber-incident-disaster-recovery-plans-for-the-modern-age\/\">products<\/a>, as it excels in organising large data sets.\u00a0<\/p>\n\n\n\n<p>If you <a href=\"https:\/\/interface.media\/blog\/2024\/10\/22\/how-we-trained-the-worlds-biggest-ai-models\/\">show a machine learning model a million pictures of a dog<\/a>, followed by a million pictures of a cat, it can determine with pretty good accuracy whether a new, unseen image is of a dog or a cat.\u00a0<\/p>\n\n\n\n<p>This works the same way with \u2018legitimate\u2019 and \u2018malicious\u2019 data. Today, it would be unusual to find an antivirus product for sale that does not incorporate ML functionality. It works well, and it isn\u2019t easily fooled by slight changes to a virus, for example. This is important with the speed of change in today\u2019s threat landscape.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-llm-security-applications-nbsp\">LLM security applications&nbsp;<\/h3>\n\n\n\n<p>ChatGPT is a type of Artificial Intelligence that falls under the category of a \u2018Large Language Model\u2019 (LLM). LLMs are relatively new to the security market, and there is a rush from vendors to jump on the bandwagon and incorporate this type of AI into their products.&nbsp;<\/p>\n\n\n\n<p>Two areas of greatest value so far include the ability to summarise complex technical information \u2013 such as ingesting the technical details about a security incident and describing it \u2013 and how to remediate it, in an easy-to-understand way.&nbsp;<\/p>\n\n\n\n<p>The reverse is also true, many complex security products which previously required the administrator to learn a complex scripting language to interact with it, can now ask it simple questions in their native language.&nbsp;<\/p>\n\n\n\n<p>The LLM will \u2018translate\u2019 these queries into the specific syntax required by the tool.&nbsp;<\/p>\n\n\n\n<p>This is enabling organisations to get more value from their junior team members, and reducing the time-to-value for new employees. We\u2019re likely to see some of the \u2018heavy lifting\u2019 of repetitive tasks offloaded to AI models.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-llm-ai-integration-requires-organisations-to-keep-both-eyes-open-nbsp\">LLM AI integration requires organisations to keep both eyes open&nbsp;<\/h3>\n\n\n\n<p>When integrating AI security tools, businesses must establish policies and training to ensure staff can leverage these tools effectively. Protecting sensitive training data and understanding privacy policies are crucial to mitigating data privacy risks.&nbsp;<\/p>\n\n\n\n<p>Additionally, businesses should keep informed about the latest developments and updates so they can ensure continuous improvement of their AI tools. This approach ensures AI tools augment security while aligning with ethical standards and organisational policies, maintaining the balance between technology and human expertise.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Finally, organisations must remain vigilant when it comes to developments in regulation. For instance, the <a href=\"https:\/\/artificialintelligenceact.eu\/\">EU Artificial Intelligence Act<\/a>, which will start to take effect over the next 12 months, requires organisations to ensure that their AI systems comply with stringent requirements regarding safety, transparency, and accountability.&nbsp;<\/p>\n\n\n\n<p>This includes conducting risk assessments, ensuring data quality and robustness, providing clear and understandable information to users, and establishing mechanisms for human oversight and control. Businesses must use documentation AI system activity logging Prior to the mainstream AI revolution, which started with the public launch of ChatGPT, AI in some form had been embedded into security controls for some time. Historically, Machine Learning (ML) has been the category of AI used in security products, dating back to the millennium when intrusion detection systems began to use complex models to identify unusual network traffic.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Machine learning and security&nbsp;<\/h3>\n\n\n\n<p>Since then, organisations have used ML in many categories of security products, as it excels in organising large data sets.&nbsp;<\/p>\n\n\n\n<p>If you show a machine learning model a million pictures of a dog, followed by a million pictures of a cat, it can determine with pretty good accuracy whether a new, unseen image is of a dog or a cat.&nbsp;<\/p>\n\n\n\n<p>This works the same way with \u2018legitimate\u2019 and \u2018malicious\u2019 data. Today, it would be unusual to find an antivirus product for sale that does not incorporate ML functionality. It works well, and it isn\u2019t easily fooled by slight changes to a virus, for example. This is important with the speed of change in today\u2019s threat landscape.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">LLM security applications&nbsp;<\/h3>\n\n\n\n<p>ChatGPT is a type of Artificial Intelligence that falls under the category of a \u2018Large Language Model\u2019 (LLM). LLMs are relatively new to the security market, and there is a rush from vendors to jump on the bandwagon and incorporate this type of AI into their products.&nbsp;<\/p>\n\n\n\n<p>Two areas of greatest value so far include the ability to summarise complex technical information \u2013 such as ingesting the technical details about a security incident and describing it \u2013 and how to remediate it, in an easy-to-understand way.&nbsp;<\/p>\n\n\n\n<p>The reverse is also true, many complex security products which previously required the administrator to learn a complex scripting language to interact with it, can now ask it simple questions in their native language.&nbsp;<\/p>\n\n\n\n<p>The LLM will \u2018translate\u2019 these queries into the specific syntax required by the tool.&nbsp;<\/p>\n\n\n\n<p>This is enabling organisations to get more value from their junior team members, and reducing the time-to-value for new employees. We\u2019re likely to see companies offload some of the \u2018heavy lifting\u2019 of repetitive tasks to AI models. This in turn will free up more time for humans to use their expertise for more complex and interesting tasks that aid staff retention. <\/p>\n\n\n\n<p>These models are also prone to \u2018hallucinate&#8217;. Whn this happens, AI models make up information that is completely incorrect. Because of this, it&#8217;s important not to become overly reliant on AI \u2013 using it as an assistant rather than a replacement for expertise, and to avoid becoming exclusively dependent on it.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">LLM AI integration requires organisations to keep both eyes open&nbsp;<\/h3>\n\n\n\n<p>When integrating AI security tools, businesses must establish policies and training to ensure staff can leverage these tools effectively. Protecting sensitive training data and understanding privacy policies are crucial to mitigating data privacy risks.&nbsp;<\/p>\n\n\n\n<p>Additionally, businesses should keep informed about the latest developments and updates so they can ensure continuous improvement of their AI tools. This approach ensures AI tools augment security while aligning with ethical standards and organisational policies, maintaining the balance between technology and human expertise.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Finally, organisations must remain vigilant when it comes to developments in regulation. For instance, the <a href=\"https:\/\/artificialintelligenceact.eu\/\">EU Artificial Intelligence Act<\/a>, which will start to take effect over the next 12 months, requires organisations to ensure that their AI systems comply with stringent requirements regarding safety, transparency, and accountability.&nbsp;<\/p>\n\n\n\n<p>This includes conducting risk assessments, ensuring data quality and robustness, providing clear and understandable information to users, and establishing mechanisms for human oversight and control. Businesses must also maintain thorough documentation and logging of AI system activities to prepare for regular audits and inspections by regulatory authorities.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rob O&#8217;Connor, Technology Lead &#038; CISO (EMEA) at Insight, breaks down how organisations can best leverage a new generation of AI tools to increase their security.  <\/p>\n","protected":false},"author":480,"featured_media":21990,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-10-29T15:54:01Z","apple_news_api_id":"f4bb5557-6e09-4f16-8d09-1ee78d3a5e91","apple_news_api_modified_at":"2024-10-29T15:56:30Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAA==","apple_news_api_share_url":"https:\/\/apple.news\/A9LtVV24JTxaNCR7njTpekQ","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[614],"class_list":["post-21989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-data-ai"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Harnessing AI for enhanced organisational security - Interface<\/title>\n<meta name=\"description\" content=\"Rob O&#039;Connor, Technology Lead &amp; CISO (EMEA) at Insight, breaks down how organisations can best leverage AI tools to increase their security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Harnessing AI for enhanced organisational security\" \/>\n<meta property=\"og:description\" content=\"Rob O&#039;Connor, Technology Lead &amp; CISO (EMEA) at Insight, breaks down how organisations can best leverage AI tools to increase their security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-29T15:53:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-29T15:57:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1365\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/\",\"name\":\"Harnessing AI for enhanced organisational security - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg\",\"datePublished\":\"2024-10-29T15:53:56+00:00\",\"dateModified\":\"2024-10-29T15:57:14+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"Rob O'Connor, Technology Lead & CISO (EMEA) at Insight, breaks down how organisations can best leverage AI tools to increase their security.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg\",\"width\":1365,\"height\":768,\"caption\":\"Bright colorful blocks flying. Abstract illustration, 3d render.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Harnessing AI for enhanced organisational security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Harnessing AI for enhanced organisational security - Interface","description":"Rob O'Connor, Technology Lead & CISO (EMEA) at Insight, breaks down how organisations can best leverage AI tools to increase their security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Harnessing AI for enhanced organisational security","og_description":"Rob O'Connor, Technology Lead & CISO (EMEA) at Insight, breaks down how organisations can best leverage AI tools to increase their security.","og_url":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/","og_site_name":"Interface","article_published_time":"2024-10-29T15:53:56+00:00","article_modified_time":"2024-10-29T15:57:14+00:00","og_image":[{"width":1365,"height":768,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/","url":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/","name":"Harnessing AI for enhanced organisational security - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg","datePublished":"2024-10-29T15:53:56+00:00","dateModified":"2024-10-29T15:57:14+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"Rob O'Connor, Technology Lead & CISO (EMEA) at Insight, breaks down how organisations can best leverage AI tools to increase their security.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/10\/iStock-1500023703.jpg","width":1365,"height":768,"caption":"Bright colorful blocks flying. Abstract illustration, 3d render."},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/10\/29\/harnessing-ai-for-enhanced-organisational-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"Harnessing AI for enhanced organisational security"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=21989"}],"version-history":[{"count":2,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21989\/revisions"}],"predecessor-version":[{"id":21992,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21989\/revisions\/21992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/21990"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=21989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=21989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=21989"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=21989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}