CIOReview
| | November - 20176CIOReviewCopyright © 2017 ValleyMedia, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.NOVEMBER - 30 - 2017Mailing AddressCIOReview44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.565.7624, F:510-894-8405 NOVEMBER - 30 - 2017, Vol 06 SE 131 - Published by ValleyMedia, Inc. To subscribe to CIOReviewVisit www.cioreview.com CYBER SECURITY SPECIALCIOReviewEditorial StaffSalesAva Garcia Eva BrownJessica ThomasAlex D'souzaJade Ray Sarah Lauren AndersonSamuel Josephsamuel@cioreview.comT: 510.972.5013VisualizersDave BrownManaging EditorJeevan GeorgeK. Manoj KumarEditorialIn an era when cybersecurity experts and hackers wage an unrelenting war against each other, the perpetrators seemingly follow a specific pattern at a speed and precision that oftentimes evade the intense scrutiny of cyber experts. The lack of visibility across the entire infrastructure stack is the main culprit here, coupled with the inability to sift through the millions of security incident logs that invariably hamper the response timeframe. With the industry facing a dearth of trained cyber experts, the need of the hour is speed in detection and remediation. This can be achieved only through automation where artificial intelligence and machine learning rule the roost. Today, AI is deployed to perform a myriad of security tasks ranging from identifying phishing emails to monitoring the network and zeroing in on any unusual activities of the user. "Any sufficiently advanced technology is indistinguishable from magic." The visionary words of Arthur C. Clarke, the famous science fiction writer, seem to reemphasize AI's prowess in deciphering mountains of data in a fraction of the time to unravel and mitigate security incidents. With AI impacting a host of everyday touch points, cybersecurity proves to be the niche for AI and machine learning to showcase its true potential of intelligent automation. However, the resilience of the AI ecosystem should be further strengthened in the quest to succeed in a cybersecurity breach scenario that leverages the same metal as the shield. AI's proficiency does not necessarily oust humans from the total game plan, instead, human intelligence is vital in deciphering the magnitude of the threat vector and formulating the right response and the solution to effectively thwart the attack. The AI systems can be fed with all relevant attack data and malicious code to further its learning and intelligence. It is a continuous learning and evolving process where the human interaction provides with the right algorithms to stave off false positives. While keeping in mind that the adversary is also on an equal footing, questions still linger on the efficacy of the numerous strategies, technologies, and methodologies in force to overcome the cybersecurity challenges. This special edition provides the much-needed answers and insights in the light of the latest trends and dynamics in the cybersecurity landscape. Let us know your thoughts.Jeevan George Managing Editoreditor@cioreview.comThe Ace of Cybersecurity Defense*Some of the Insights are based on the interviews with respective CIOs and CXOs to our editorial staff
< Page 5 | Page 7 >