KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Similar documents
MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

Building a Threat Intelligence Program

THE CYBERSECURITY LITERACY CONFIDENCE GAP

The 2017 State of Endpoint Security Risk

Best Practices in Securing a Multicloud World

THALES DATA THREAT REPORT

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CYBERSECURITY RESILIENCE

State of Cloud Survey GERMANY FINDINGS

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

PULSE TAKING THE PHYSICIAN S

THALES DATA THREAT REPORT

Webroot Phishing Threat Trends

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry

TechValidate Survey Report: SaaS Application Trends and Challenges

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Background FAST FACTS

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Mastering The Endpoint

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

Reducing Cybersecurity Costs & Risk through Automation Technologies

Corporate IT Survey Messaging and Collaboration, Editor: Sara Radicati, Ph.D

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

Sage Data Security Services Directory

Toward an Automated Future

As Enterprise Mobility Usage Escalates, So Does Security Risk

Corporate IT and Business User Survey,

2018 Cybersecurity: Perceptions & Practices. A Benchmark Survey of Security Professionals in the U.S., U.K., and Asia-Pacific Regions

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

June 2017 intel.com schneider-electric.com

Second International Barometer of Security in SMBs

ACHIEVING FIFTH GENERATION CYBER SECURITY

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Make security part of your client systems refresh

Don t Get Left Behind

Spotlight Report. Information Security. Presented by. Group Partner

Security in India: Enabling a New Connected Era

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

INSIDE. 2 Introduction 15 Conclusion 4 Cyber: A Top-of-Mind Concern A Message From Morrison & Foerster s Global Privacy & Data Security Chair

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

HEALTHCARE IT NETWORK SURVEY REPORT

GDPR COMPLIANCE REPORT

THE POWER OF TECH-SAVVY BOARDS:

BACKUP TO THE FUTURE A SPICEWORKS SURVEY

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

SMB PULSE SURVEY. Findings Overview. Some highlights: A Note on Company Size

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

VIPRE REPORT: Price Reigns Supreme for Small Businesses When Choosing Their Endpoint Security

CLOSING IN FEDERAL ENDPOINT SECURITY

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Modern Database Architectures Demand Modern Data Security Measures

Bring Your Own Device (BYOD)

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

State of the Cyber Training Market January 2018

ForeScout Extended Module for Splunk

WHITE PAPER > AUTOMATING THREAT DEFENSE. Automating Threat Defense: Using Machine Learning to Prevent Modern Cyberattacks

Text Messaging Helps Your Small Business Perform Big

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

GDPR drives compliance to top of security project list for 2018

2018 Mobile Security Report

REPORT. proofpoint.com

Cyber Risk Market Survey 2019 Sneak Preview

COMPANY BROCHURE. About Us. Kinnectiv, LLC. Consulting. Security. Innovation. +1(888)

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

THE STATE OF CLOUD & DATA PROTECTION 2018

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

Mobilizing Your Workforce for Success

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

EDITORIAL CALENDARS. Key topics that will shape our discussions

Panda Security 2010 Page 1

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

The data quality trends report

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Build confidence in the cloud Best practice frameworks for cloud security

Healthcare mobility: selecting the right device for better patient care

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

The power management skills gap

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

The Value of Automated Penetration Testing White Paper

Data Privacy in Your Own Backyard

Security. Made Smarter.

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

2016 Survey: A Pulse on Mobility in Healthcare

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

US 2013 Consumer Data Privacy Study Mobile Edition

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

` 2017 CloudEndure 1

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Transcription:

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals

Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity tools continues to grow. In 2017, we discovered that approximately 74% of businesses across the United States and had already begun using some form of AI or ML to protect their organizations. 1 When we checked back in with organizations in both regions at the end of 2018, 73% of respondents we surveyed reported they plan to use even more AI/ML tools in 2019. Although AI and ML cybersecurity tools are popular among IT professionals, many respondents claimed they don t fully understand the benefits of said tools. The overwhelming majority (72%) agree that, as long as their protection keeps them safe from cybercriminals, they do not care whether it uses AI or machine learning. And over half (5) say that, while they know some of their tools use AI or ML, they re not entirely sure what that means. Further education on how these tools work and what value they bring would be beneficial to IT professionals across the globe, particularly since many plan to increase their cybersecurity spend in the coming months. Interestingly, this survey revealed that IT professionals whose organizations experienced a damaging cybersecurity attack within the last 12 months have not lost faith in AI and ML tools. Additionally, 84% of respondents believe cybercriminals are also using AI and ML to in their attacks. When considered together, these two figures indicate a strong belief that AI/MLbased cybersecurity is no longer simply nice to have; it s crucial to stop modern cyberattacks. 1 Webroot. Game Changers: AI and Machine Learning in Cybersecurity; a U.S./ Comparison. (Dec 2017) 1

GLOBAL FINDINGS 73% plan to use more AI/ML tools in 2019. report their organization has experienced a damaging cyberattack in the last 12 months. 72% 84% agree that as long as their protection keeps them safe from cybercriminals, they do not care if it uses AI/ML. believe cybercriminals are using AI/ML to attack organizations. 6 7 say it is very important that cybersecurity advertising mention use of AI/ML. think their organization has everything it needs to defend against AI/ML-based cyberattacks. 8 report they understand how AI/ML is deployed in cybersecurity. are completely certain where their cybersecurity vendors source their threat data. 2

The Current State of Cyberattacks on Businesses The number of cyberattacks on businesses isn t dropping off. In fact, over one-third () of survey respondents in the U.S. and indicated their organizations had experienced a damaging security breach or attack within the last 12 months. What might come as a surprise is these attacks happened despite the organizations increased spending on AI/ML-based cybersecurity tools, and a high level of confidence (76%) that their organization is safer because of their investment. 32% Figure 1: Has your organization experienced a damaging cybersecurity attack within the last 12 months, despite using AI/ML cybersecurity tools? * 66% 64% 6 7 70% U.S. 73% U.S. 74% 6 67% Figure 2: Number of organizations that spend more on AI/ ML cybersecurity tools than they did two years ago Figure 3: IT professionals who feel they spend enough to get all the tools needed to protect their organizations 3

76% U.S. 7 82% Figure 4: Respondents who believe using AI/ML-based cybersecurity makes their organizations safer The Importance of AI and ML Artificial intelligence and machine learning are hot topics, even buzz words, in cybersecurity today, offering benefits that range from improved productivity and efficiency to faster threat detection and fewer false positives. But do individuals truly understand their complexity? When choosing a new cybersecurity tool, 3 of IT professionals consider AI or ML to be at least somewhat important in their decision-making process, and 6 consider these technologies a necessity. But, while 82% report a very or extremely high level of comfort with AI/ ML, more than half (5) are still not sure what it really means, and many don t know how their cybersecurity vendors source or update their threat data. Very Important 6 70% 60% Moderately Important 30% 2 Slightly Important 4% t Important Figure 5: When choosing a new cybersecurity tool, is it important that it advertise its use of AI/ML? * 37% U.S. 30% 44% Figure 6: Respondents who feel their teams must fully understand a security solution before adopting it 4

Extremely Comfortable 3 4 30% Very comfortable 43% 42% 44% Somewhat comfortable 13% 17% t at all comfortable 6% Figure 7: Self-reported level of comfort with AI/ML* 1 7 7 70% 2 26% 23% 3% 7% Figure 8: Do you know how often your cybersecurity vendor updates their AI/ML algorithms? * I m 100% certain where that threat data comes from. 3 33% I m fairly certain I know where the threat data comes from, but not 100% sure. 5 5 5 I only know a little about where the threat data comes from. 10% I have no idea where the threat data comes from. 2% 7% Figure 9: Do you know where your cybersecurity vendor sources its threat data? * Strongly agree 27% 2 26% Somewhat agree 32% 2 3 Neither agree nor disagree 20% 1 2 Somewhat disagree 1 13% Strongly disagree 12% 14% 10% Figure 10: I know some of our tools say they use AI/ML, but I m not sure what that means. * 5

Strongly agree 3 Somewhat agree 3 40% Neither agree nor disagree 14% 1 17% Somewhat disagree Strongly disagree Figure 11: As long as the tools we license help protect us against cybercriminals, I don t care if it uses AI/machine learning. * 6% The takeaways from the previous figures, especially Figure 11, are surprising. A full 72% of respondents are relatively indifferent to AI and ML as long as their organizations stay safe, yet, when it comes to advertising a new cybersecurity tool, most (6) say it is very important that it mentions its use of AI or ML. What the Future Holds Cybersecurity budgets continue to increase, with 7 of today s organizations reporting they spend more on AI/ML than they did two years ago. Although the majority of IT professionals in the U.S. (74%) and (67%) feel their organizations are spending enough to protect their businesses from cyberattacks, 26% and 2, respectively, believe they could still be doing more. More 73% 7 7 About the same 2 2 23% Fewer 0% 0% 2% 2% 2% Figure 12: Does your organization plan to use more or fewer AI/ML cybersecurity tools in 2019? * 8 84% 7 Figure 13: Do you believe your organization s current set of cybersecurity tools will help stop all cyber threats your organization faces? * 14% 6% 12% 16% 7% 6

84% 86% 82% 7% 10% Figure 14: Do you think cybercriminals use AI/ML tools to attack public and private organizations? * 7 83% 72% Figure 15: Respondents who think their organization has everything it needs to successfully defend against AI/ML-based cyberattacks* 1 3% 14% 3% 24% 4% Increased AI or machine learning adoption 47% 54% 4 Training IT staff on new solutions 46% 53% 40% New threat monitoring techniques/services 42% 43% 40% Identifying and onboarding new technologies 3 43% 3 Training of general employees on compliance with internal cybersecurity rules 3 43% 3 Regulatory compliance (GDPR, HIPAA, etc.) 37% 4 33% Threat attribution 32% 3 Ransomware 30% 33% 2 Nation state attacks 27% 2 33% Figure 16: What are the biggest cybersecurity areas you plan to focus on in 2019? * 7

Conclusion This year s survey yielded a number of surprising results. While IT professionals in the U.S. reported significantly higher levels of comfort using artificial intelligence and machine learning technology than their ese counterparts (9 and 74%, respectively), both groups expressed a nearly equal amount of uncertainty around what AI/ML means in terms of the tools they use. ese respondents placed more importance on fully understanding tools before they implement them, while their American peers attached greater significance to cybersecurity vendors mentioning their use of AI or ML in advertising. It s clear there are knowledge gaps around how artificial intelligence and machine learning tools work to secure businesses and streamline operations. With the majority of respondents planning to increase spending on AI/ML technologies in 2019, businesses will need to improve their understanding of these tools to see maximum value. Partnering with cybersecurity vendors who have long-standing experience using and developing AI/ML, and who can provide expert guidance, will help businesses achieve the highest levels of security and efficiency possible without draining resources. Methodology Survey respondents were provided by Branded Research Inc., which has an active proprietary global panel of over 2 million respondents. The survey was conducted by LEWIS between vember 26 and December 5, 2018, and consisted of an online survey of 37 questions total, requiring approximately 10 minutes. For all survey respondents, LEWIS partners with Imperium to only work with companies who implement their quality control services on their sampling services. Imperium is solely focused on helping companies guarantee data integrity and comply with industry regulations. Survey responses were received from 400 full-time IT professionals at the IT director level and above; 200 of which were from the United States, and 200 from. Respondents represented organizations that had 250 employees or more, and 87% were the primary decision makers for cybersecurity tools purchased within their organization. The overall margin of error was at a 9 confidence interval. About Webroot Webroot was the first to harness the cloud and artificial intelligence to protect businesses and individuals against cyber threats. We provide the number one security solution for managed service providers and small businesses, who rely on Webroot for endpoint protection, network protection, and security awareness training. Webroot BrightCloud Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, Palo Alto Networks, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. Headquartered in Colorado, Webroot operates globally across rth America, Europe, and Asia. Discover Smarter Cybersecurity solutions at webroot.com. 385 Interlocken Crescent Suite 800 Broomfield, Colorado 800.870.8102 webroot.com 2019 Webroot Inc. All rights reserved. Webroot, BrightCloud, and Smarter Cybersecurity are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. All other trademarks are the properties of their respective owners.