Intelligent CIO Middle East Issue 115 | Page 32

AI IS BEING USED FOR BOTH CYBERSECURITY OFFENCE AND DEFENCE. HOW SHOULD REGIONAL CIOS AND CISOS EVALUATE MODERN CYBERSECURITY SOLUTIONS FOR THEIR RESILIENCE AGAINST AI DRIVEN MALWARE AND ADVANCED AI DRIVEN THREATS?
EDITOR’ S QUESTION
AI IS BEING USED FOR BOTH CYBERSECURITY OFFENCE AND DEFENCE. HOW SHOULD REGIONAL CIOS AND CISOS EVALUATE MODERN CYBERSECURITY SOLUTIONS FOR THEIR RESILIENCE AGAINST AI DRIVEN MALWARE AND ADVANCED AI DRIVEN THREATS?
One of the ways to combat AI based cybersecurity threats is to embed AI powered technology that can amplify threat detection and response by leveraging tools such as Machine Learning, automated incidence response or anomaly detection. AI-driven cybersecurity analytics can also help in strengthening predictive analytics, automated forensics and risk scoring models. Executives from Omnix, Cloud Box, SoftServe, Check Point Software, Fortinet, share their answers.
BASSEL KACHFEH, DIGITAL SOLUTIONS MANAGER, OMNIX

Some of the AI driven threats include sophisticated attacks that can include AI generated Phishing, Deepfake Exploits, Adversarial AI and Self-learning Malware. To combat this, CIOs and CISOs require to focus on adopting solutions that are aligned to the risk profiles of each company, and cybersecurity criteria that revolve around solutions and tools that can proactively detect threats in real-time.

One of the ways to combat AI based cybersecurity threats is to embed AI powered technology that can amplify Threat Detection and Response by leveraging tools such as Machine Learning, Automated Incidence Response or Anomaly Detection. AI-Driven Cybersecurity Analytics can also help in strengthening Predictive Analytics, Automated Forensics and Risk Scoring Models.
With organisations making the move to hybrid and multicloud environments, AI driven tools help in tackling the safety of cloud workloads, ensuring container security and supports Zero- Trust architectures.
There is also a serious need to address possible talent gaps especially in the areas of integrating AI into cybersecurity. The shortage needs to be addressed by not only including recruiting new employees with AI expertise but in training current employees on AI.
It also helps in incorporating features that can address recovery in case of attacks. These include automating the recovery of compromised systems with the minimal use of human intervention as well as the automated isolation of infected devices or networks to help contain the spread of the attacks.
The solutions must be tailored in a way that it allows a seamless integration of solutions within the existing tools and that they are financially viable and scalable.
32 INTELLIGENTCIO MIDDLE EAST www. intelligentcio. com