Skip to main content

Machine Learning: Make Cybersecurity a Priority

March 21, 2019

Machine Learning (ML) is well established in cybersecurity, internet search engines, healthcare diagnostics, supply chain optimization and many other use cases. Billions of dollars are being invested in ML by organizations that use it to analyze data to help them figure out how to improve things like decision-making or customer satisfaction. According to a recent survey, 83% of respondents’ companies have achieved moderate or substantial benefits.

Some people think ML is a magic bullet, but that is disputable. You can’t just flip an ML switch to achieve results that increase profitability, accuracy or efficiency. Success with ML relies on the quality of the data fed into an ML system and the methods used to train the system. And the choice of training method – supervised learning, unsupervised learning or reinforcement learning or a combination – depends on specific project variables and goals.

Launching an ML system should not be thought of as a discrete activity. ML projects involve resources and touch many areas of an organization, so they require thoughtful, thorough planning and execution with a clear security strategy embedded in the plan. Strategies to reduce the chances of having large barriers to success include approaches like leveraging current investments whenever possible. Many organizations already have technology that can be used in ML systems. Spark, for example, offers ML libraries, APIs and a developer support community. Open-source tools and platforms also are potential resources.

Another strategy is to build a strong ML team that can set strategy and direction, define use cases, identify realistic goals and oversee the work. A lot of decisions need to be made. Just think about the effort of defining the data strategy, the build strategy (in-house versus outsourcing versus a combination), ML methodologies and ML metrics, not to mention engaging the governance, risk, legal, compliance and IT/security groups and all the cybersecurity implications if not done well and in a comprehensive manner. 

Security should be built in to cover ML systems and connection points from end to end. The stakes are high, given the likely use of sensitive data – think about consumer health information used to improve diagnostic capabilities or customer purchase details used to improve relationships and experience. The bad guys are paying attention and may be using ML themselves. Engaging a cybersecurity provider with a strong understanding of ML implications and connections to other areas of the business is critical to organizational defense.

A good first step with cybersecurity for ML initiatives is to assess your current security strategy and solution to understand how to leverage what’s already in place. In addition, when applying security measures, it is always easier when data is mapped, classified and aligned with data privacy regulations like General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA) during planning stages. While regulations may not always be clear, it’s advisable to adopt, or even go beyond any rigorous standards. 

Learn more about ML training methods, adoption rates, business considerations, security priorities and best practices for implementing ML. Read “Machine Learning: Key Adoption Cybersecurity Considerations.”


    Greg Baker

By: Greg Baker

VP & GM, Cyber Digital

See More

Related Blogs

March 06, 2019

Artificial Intelligence and Cybersecurity

The mention of Artificial Intelligence (AI) brings up different associations for people. Some recall Hal 2001: A Space Odyssey and others may point to...

See Details

March 05, 2019

How Can You Determine the Risk of a Threat Actor?

One of the primary goals of an intelligence team is to prioritize the threats that face an organization. This includes how a particular threat actor o...

See Details

February 26, 2019

Learning the Enemy Perspective

Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.