Home Technology peripherals AI Artificial Intelligence will close the cybersecurity skills gap

Artificial Intelligence will close the cybersecurity skills gap

Apr 08, 2024 am 09:20 AM
AI cyber security data lost genai

As we begin to move beyond what GenAI can achieve, a host of real opportunities are emerging to help solve a range of long-term issues plaguing cybersecurity, particularly skills shortages and unsafe human behavior. This year's top predictions clearly lie outside of technology, as the human element continues to receive more attention. Any CISO looking to build an effective and sustainable cybersecurity program must make this effort a priority.

Artificial Intelligence will close the cybersecurity skills gap



By 2028, GenAI adoption is expected to close the small skills gap and 50% of entry-level cybersecurity positions will no longer require specialized education. GenAI enhancements will change the way organizations recruit and train cybersecurity workers with the right competencies and education. Major platforms already offer conversational enhancements, but this will continue to evolve. Gartner recommends that cybersecurity teams focus on internal use cases that support user efforts; work with HR to coordinate and find the right talent for more critical cybersecurity roles.

In 2026, enterprises that combine GenAI with an integrated platform architecture in a Security Behavior and Culture Program (SBCP) will reduce employee-driven cybersecurity incidents by 40%. Organizations are increasingly focusing on personalized engagement as an important component of effective SBCP. GenAI has the potential to generate highly personalized content and training materials that take into account employees’ unique attributes. This will increase the likelihood that employees will adopt safer behaviors in their daily work, thereby reducing cybersecurity incidents.

Portfolios that are not yet using GenAI capabilities should evaluate their current external security awareness partners to understand how to include GenAI as part of their solution roadmap. This ensures that incorporating new technology into an organization does not compromise its existing security defenses.

In 2026, 75% of organizations will exclude unmanaged, traditional and cyber-physical systems from their zero trust strategy. Under a zero trust strategy, users and endpoints are given only the access they need to do their jobs and are monitored against changing rights restrictions. In production or mission-critical environments, these concepts do not apply to unmanaged devices, legacy applications, and cyber-physical systems (CPS). These systems perform specific tasks in unique safety- and reliability-focused environments.

Under the 2027 law, two-thirds of the world's top 100 companies will provide cybersecurity leaders with directors and officers (D&O) insurance to cover personal legal risks. New laws and regulations require cybersecurity leaders to take personal responsibility. The CISO's role and responsibilities need to be updated to allow for relevant reporting and disclosure. Businesses are advised to explore the benefits of purchasing D&O insurance for this role, as well as other insurance and indemnity, to reduce the burden of personal liability, professional risk and legal fees.

By 2028, companies will spend more than $500 billion on combating disinformation, accounting for 50% of marketing and cybersecurity budgets. The combination of artificial intelligence, analytics, behavioral science, social media, the Internet of Things, and other technologies makes creating and spreading highly effective mass-tailored disinformation an elusive challenge. However, with the proper use of these technologies, people can still create and spread efficient and large-scale disinformation.

By 2026, 40% of identity and access management (IAM) leaders will have primary responsibility for reviewing, measuring, and responding to IAM-related breaches. IAM leaders often struggle to articulate security and business value to drive accurate investments and are not involved in security asset and budget discussions. As IAM leaders grow in importance, they will evolve in different directions, each with increased responsibility, visibility, and influence. It is recommended that CISOs break down the traditional IT and security silos and let stakeholders understand the role of IAM by coordinating IAM plans and security plans.

By 2027, 70% of organizations will integrate data loss prevention and internal risk management principles with IAM context to more effectively identify suspicious behavior. Growing interest in integrated controls has led vendors to develop capabilities that represent the overlap of user behavior control and data loss prevention. This introduces a more comprehensive set of capabilities for security teams to create a single policy for a dual approach to data security and internal risk mitigation. Gartner recommends that organizations identify data risks and identity risks and combine them as primary directives for strategic data security.

By 2027, 30% of cybersecurity capabilities will be reimagined for application security, directly usable by non-cyber experts and owned by application owners. The volume, variety and context of applications created by business technical staff and distributed delivery teams means the potential risks are far beyond what a dedicated application security team can handle.


To close the gap, the cybersecurity function must build a minimum level of effective expertise within these teams, combining technology with training to create the autonomy needed to make informed decisions about cyber risk. required abilities.

The above is the detailed content of Artificial Intelligence will close the cybersecurity skills gap. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to use sql datetime How to use sql datetime Apr 09, 2025 pm 06:09 PM

The DATETIME data type is used to store high-precision date and time information, ranging from 0001-01-01 00:00:00 to 9999-12-31 23:59:59.99999999, and the syntax is DATETIME(precision), where precision specifies the accuracy after the decimal point (0-7), and the default is 3. It supports sorting, calculation, and time zone conversion functions, but needs to be aware of potential issues when converting precision, range and time zones.

How to add columns in PostgreSQL? How to add columns in PostgreSQL? Apr 09, 2025 pm 12:36 PM

PostgreSQL The method to add columns is to use the ALTER TABLE command and consider the following details: Data type: Select the type that is suitable for the new column to store data, such as INT or VARCHAR. Default: Specify the default value of the new column through the DEFAULT keyword, avoiding the value of NULL. Constraints: Add NOT NULL, UNIQUE, or CHECK constraints as needed. Concurrent operations: Use transactions or other concurrency control mechanisms to handle lock conflicts when adding columns.

Can I retrieve the database password in Navicat? Can I retrieve the database password in Navicat? Apr 08, 2025 pm 09:51 PM

Navicat itself does not store the database password, and can only retrieve the encrypted password. Solution: 1. Check the password manager; 2. Check Navicat's "Remember Password" function; 3. Reset the database password; 4. Contact the database administrator.

How to delete rows that meet certain criteria in SQL How to delete rows that meet certain criteria in SQL Apr 09, 2025 pm 12:24 PM

Use the DELETE statement to delete data from the database and specify the deletion criteria through the WHERE clause. Example syntax: DELETE FROM table_name WHERE condition; Note: Back up data before performing a DELETE operation, verify statements in the test environment, use the LIMIT clause to limit the number of deleted rows, carefully check the WHERE clause to avoid misdeletion, and use indexes to optimize the deletion efficiency of large tables.

How to recover data after SQL deletes rows How to recover data after SQL deletes rows Apr 09, 2025 pm 12:21 PM

Recovering deleted rows directly from the database is usually impossible unless there is a backup or transaction rollback mechanism. Key point: Transaction rollback: Execute ROLLBACK before the transaction is committed to recover data. Backup: Regular backup of the database can be used to quickly restore data. Database snapshot: You can create a read-only copy of the database and restore the data after the data is deleted accidentally. Use DELETE statement with caution: Check the conditions carefully to avoid accidentally deleting data. Use the WHERE clause: explicitly specify the data to be deleted. Use the test environment: Test before performing a DELETE operation.

Navicat's method to view PostgreSQL database password Navicat's method to view PostgreSQL database password Apr 08, 2025 pm 09:57 PM

It is impossible to view PostgreSQL passwords directly from Navicat, because Navicat stores passwords encrypted for security reasons. To confirm the password, try to connect to the database; to modify the password, please use the graphical interface of psql or Navicat; for other purposes, you need to configure connection parameters in the code to avoid hard-coded passwords. To enhance security, it is recommended to use strong passwords, periodic modifications and enable multi-factor authentication.

How to clean all data with redis How to clean all data with redis Apr 10, 2025 pm 05:06 PM

How to clean all Redis data: Redis 2.8 and later: The FLUSHALL command deletes all key-value pairs. Redis 2.6 and earlier: Use the DEL command to delete keys one by one or use the Redis client to delete methods. Alternative: Restart the Redis service (use with caution), or use the Redis client (such as flushall() or flushdb()).

How to create oracle database How to create oracle database How to create oracle database How to create oracle database Apr 11, 2025 pm 02:36 PM

To create an Oracle database, the common method is to use the dbca graphical tool. The steps are as follows: 1. Use the dbca tool to set the dbName to specify the database name; 2. Set sysPassword and systemPassword to strong passwords; 3. Set characterSet and nationalCharacterSet to AL32UTF8; 4. Set memorySize and tablespaceSize to adjust according to actual needs; 5. Specify the logFile path. Advanced methods are created manually using SQL commands, but are more complex and prone to errors. Pay attention to password strength, character set selection, tablespace size and memory

See all articles