Moving IT security from human to machine speed

 

Connecting state and local government leaders

As agencies embrace machine learning-powered solutions, they’ll be able to better thwart threats, lighten the workload of security analysts and keep ahead of other nations.

Cybersecurity is a top priority for federal agencies. Since taking office, President Donald Trump has proposed a cyber funding increase of 4 percent across the government, including significant hikes for the Department of Homeland Security and the Pentagon. There are even larger cyber funding spikes at key agencies, with a 23 percent jump at the Energy Department, a 33 percent jump at the Nuclear Regulatory Commission and a 16 percent hike at the Department of Veterans Affairs.

IT analyst firm Gartner, too, has reported government CIOs will increase spending on cybersecurity. Its  survey showed that CIOs at defense and intelligence agencies see artificial intelligence as a crucial technology investment -- more so than their counterparts in other industries. This highlights the need for AI investment at the government level, as well as an improved approach to defense and intelligence through technology.

We must move IT security from human to machine speed. Cyber criminals have certainly done so with automated tools and tactics. Much has been said about the AI arms race between the U.S., China and Russia, and to keep government secure, agencies must embrace AI and machine learning-powered cybersecurity measures.

For the purposes of this article, AI refers to  “the broader concept of machines being able to carry out tasks in a way that we would consider ‘smart,’” and machine learning as “a current application of AI based around the idea that we should really just be able to give machines access to data and let them learn for themselves,” as defined in this Forbes column.

The data challenges with federal cybersecurity

Federal agencies house reams of sensitive and classified data, making them a high-value target for cyber criminals. But major threats to the security of this data include the lack of visibility IT managers have into their networks and users’ behaviors coupled with the amount of time it takes them to find threat actors using valid credentials inside their IT infrastructure.

That doesn't even account for the threats that originate on the inside. The number of people at the federal level who have access to top-secret information has increased from hundreds of thousands to almost a million across thousands of private companies and public agencies. Government agencies estimate there is one insider threat for every 6,000 to 8,000 employees because it is too difficult to monitor each individual and their behavior online.

Meanwhile, malicious and negligent insider attacks continue to catch organizations unprepared, according a study by Mimecast. In fact, 43 percent of businesses need a month or longer to detect employees accessing unauthorized files, according to a Ponemon Institute study.

The location of sensitive and regulated data, who has access to it and what their behaviors are -- from the outside or from within -- are big blind spots that continue to make government agencies vulnerable to external and insider threats.

Additionally, the staggering talent shortages plaguing cybersecurity as a whole leave fed security teams understaffed, overtaxed and struggling to enact the right strategy to properly address cybersecurity.   In August 2016, the Government Accountability Office reported that federal chief information security officers faced significant challenges in recruiting and retaining personnel with high-demand skills.

Where humans fall short

When it comes to protecting sensitive data, it’s important to keep sight of the ways big data, advanced behavioral analytics and machine learning can help, from detecting and responding to threats, to proactively fighting them. Machine learning enables organizations to apply mathematical models to make sense of copious amounts of data and to automatically take action based on those insights. Machine learning-based behavioral analytics and anomaly detection applied to cybersecurity data can vastly improve and automate the way organizations monitor for unusual behavior, detect threats and handle incident response.

The Chelsea Manning case is a perfect example of how machine learning could have helped prevent a government employee from releasing classified information to the public. As a U.S. Army private and intelligence analyst, Manning released top secret information to WikiLeaks because she wanted to “spark a domestic debate on the role of military and foreign policy.” After the breach, President Barack Obama signed an executive order creating the National Insider Threat Task Force, which impacted nearly every federal department and required federal employees to monitor each other for suspicious activity. While monitoring for suspicious behavior can be effective, it is more efficient when that human effort is supplemented by a machine.  

The role machines play

Machines  can digest huge amounts of an organization's data stored and flag unusual behavior.  The diverse information required to get a complete picture of what's happening and what might happen means gathering network traffic, endpoint data, cloud and identity data and other information from logs, and marrying that with contextual information such as threat intelligence, asset criticality measures and vulnerability data.

Today, security analysts are turning to security data lakes to easily store and access this critical data. Once agencies have  collected the data, they must apply advanced analytics using machine learning algorithms to improve threat detection and reaction time. These tools translate help agencies identify potential threats, prioritize remediation of vulnerabilities and architectural adjustments, and identify and understand attacks already in progress.  

Speed and context matter. For example, most agencies have billions of security-related logs per day, and security analysts must be able to automatically and intelligently parse critical data. When security teams organize their logs and enrich them with important contextual information, they can more accurately and efficiently detect suspicious activity like insider threats and conduct incident investigation. Machine-speed analytics adds another layer of protection to the human effort.

To adequately address today’s (and tomorrow’s) threats, IT teams must augment their efforts. Machine learning-powered cybersecurity solutions can equip security analysts with the tools they need to automate much of their jobs, reducing the number of analysts federal agencies need to hire in the first place.

Cybersecurity will continue to be a huge priority at the federal level. As more agencies embrace machine learning-powered solutions, they can better thwart both external and insider threats, lighten the workload of security analysts, and stay technologically competitive against other nations.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.