Indeed, like the entire IT and IT-enabled industry, cybersecurity is undergoing change. And the only reason could be due to the hype around artificial intelligence where GenAI models are presented as a magic wand for every challenge. Cybersecurity researchers believe that AI alone can counter the threat of AI data breaches.
If you think that’s a no-brainer, consider this… A recent survey by Fortinet found that 82% of respondents felt their company would benefit from a cybersecurity certification, and 90% said they believe employees will pay to obtain such certifications. The question here is how the purveyors of knowledge can keep pace with the bad actors who are ahead of their time.
AI in Cybersecurity – Swings and Roundabouts
a Morgan Stanley Report I believe the solution is simple. “There's no need to learn new cybersecurity rules. Instead, review your current cybersecurity protections and make sure you're following best practices in important areas like passwords, data privacy, personal cybersecurity, and especially social engineering.” is needed.”
Of course, the report makes a big deal about AI in cybersecurity, noting that the product market could grow from $15 billion in 2021 to reach $135 billion by 2030 and help prevent cybercrime. This indicates an increasing reliance on AI and traditional tools to In fact, security experts agree that AI has the potential to help in several areas.
These include more accurate cyberattack detection, identifying and flagging suspicious emails and messages, simulating social engineering attacks to identify potential vulnerabilities, and providing insight to security teams across large enterprises. This includes analyzing large amounts of incident-related data to
That's all well and good, but who will do the work on the ground?
In other words, AI can help identify weaknesses in codebases, and insights gleaned from over millions of cases can give cybersecurity companies an edge in preventing future attacks. may bring. This raises the controversial question of how companies themselves should leverage AI. Or who among these companies should use AI?
With the industry complaining of a 75% shortage in the cybersecurity workforce, where can you find the resources to develop use cases using AI? This is where an entry-level cyber certification may come in handy. The nonprofit training consortium ISC2 recently launched such a course in collaboration with IBM.
ISC2 CEO Clare Rosso believes the big change companies should make is eliminating the need to hire cybersecurity professionals with an IT background. Instead, they should hire people from diverse backgrounds, with an emphasis on entry-level knowledge and training.
Of course, ISC2 can help any organization that wants to train its staff on cybersecurity, and those who complete the training will receive benefits such as:Cyber security certification” certificate. In fact, there are several such courses. These include CompTIA Security+, the Certified Ethical Hacker program, Certified Information Systems Auditor, and more.
Certification!But beyond IT professionals
In fact, Fortinet research indicates that business leaders are turning to certifications that help them establish technical competency and gain a deeper understanding of how to apply it.The irony, of course, is that Fortinet itself Struggling with security breaches Thousands of servers are added to the watch list.
The ISC2 Entry-Level Cybersecurity Specialist Professional Certification is available in 22 languages and covers five key areas including security principles, business continuity, disaster recovery and incident response, access control concepts, network security and security operations. Based on.
In fact, Rosso is convinced that the direction ISC2 is currently moving in is the way forward. From helping non-technical people pursue careers in cybersecurity to helping industry address cybersecurity talent shortages. The organization has tracked this workforce gap and identified cloud security, zero trust, and AI/ML as the biggest gaps.
That brings us to the question in the headline, and the answer is best summed up in the words of an article published by Security Intelligence. Improving threat intelligence. ” (You can see how to do that in the following way) Read the full article here)