Intelligent CISO Issue 05 | Page 39

FEATURE
To protect endpoints more effectively CISOs must complement traditional preventive controls with the ability to detect and respond to inevitable breaches as quickly as possible . How quickly you detect the breach – and what actions you take to contain the damage – can make the difference between an inconvenience and a disaster . The news is full of examples where attackers were able to spend weeks , or even months , moving throughout a network undetected . In order to truly secure endpoints CISOs must ensure that they can detect and respond to a breach coming from one .
Vincent Bieri , Co-Founder of Nexthink
For CISOs this means that they must truly understand what is happening on each and every endpoint at any given time . The best way to obtain this critical information is through an end-user analytics platform that enables CISOs and their teams to detect unusual system and application behavior across all endpoints . Behaviours such as a spike in network traffic , connection with suspicious websites or unknown files executing are red flags and indicators of potential danger , and security teams can recognise them before even the enduser themselves .
Additionally , an end-user experience platform can validate that protective measures are enforced , including employee awareness and supporting the business without degrading performance and usability . With this transparent end-user behaviour and endpoint performance information ,
CISOs and their teams can retrain users or strengthen technical controls before a breach occurs . For CISOs , a balance between preventative controls and breach detection and response through end-user management is the key to a strong endpoint security posture .
How is AI and Machine Learning revolutionising endpoint security ?
Dr DR Anton ANTON Grashion GRASHION , Manager , – Security MANAGER Practice – SECURITY at Cylance
PRACTICE AT CYLANCE
It ’ s an easy question to answer . One of the key difficulties associated with endpoint security and , in fact , cybersecurity in general , is the presence and effect of ‘ unknown unknowns ’. When assessing risks to an organisation , it is these unknown unknowns that can lead to the underestimation of risk .
As an example , we can ’ t be sure what the next malware threat will look like , which is why signatures have to be propped up with all manner of other , mostly reactive , technologies . For the same reason , organisations require skilled operatives to sift through the large volumes of alerts that their EDR systems generate . What we have created is a huge number of barking dogs and not all alerts are worthy of exploration .
How AI and ML reverse this situation is made possible by the progress that researchers have made in algorithmic science , as well as the rise of Big Data analytic processing capabilities .
With the centralised analysis of hundreds of millions of file binaries ( both known ‘ good ’ and ‘ bad ’ samples ) collected from public and private malware repositories , the solution then extracts millions of features from each of these files and applies Artificial Intelligence and Machine Learning techniques to build highly accurate mathematical models . The models identify what are statistically good and bad features or combinations of features and are deployed to the endpoint in an extremely lightweight client .
When placed at the heart of a solution – as opposed to being an afterthought bolted on to legacy technology – AI and Machine Learning deliver predictive prevention and allow us to get ahead of the threat curve , especially for zero-day attacks , for the first time . This is a true revolution in endpoint security .
No longer do we need a first victim in order to craft , all too slowly , a signature . No longer do we need to allow the threat to detonate and then track indicators of compromise , chasing complexity into the network . Instead we can assess the threat in milliseconds , pre-execution and stop it before it creates cascading and correlated issues to the security teams .
This not only revolutionises endpoint security but also completely re-maps the economics of cybersecurity by liberating expensive and scarce human resources from their detect and respond duties to those problems that are best solved by human expertise .
Deploying an advanced ML / AI endpoint solution also reduces the number of help
Dr Anton Grashion , Manager – Security Practice at Cylance
desk tickets and improves productivity by being extremely lightweight in terms of resource usage ( 1 % to 2 % CPU 40 to 40MB of memory ).
Add to this the benefit of not requiring a cloud connection , enabling work in airgapped environments and not needing time-wasting daily updates , it is clear that AI and ML can truly revolutionise endpoint security . u www . intelligentciso . com | Issue 05
39