We Aren't Being Replaced....Yet
"Primates evolve over millions of years. I evolve in seconds. And I am here." - Terminator
Automation is everywhere and yet we treat it as something novel in conversations about cybersecurity. Automation is perhaps most prominent on our cyber journey as we approach a higher level of maturity, perhaps level 3 of a CMMI model. But let's get to the nitty gritty. Let's define every use case in cyber for automation.
This is my thought process with the team at Inspira Enterprise. Sit down with me and define every semi-automated and fully-automated use case in cybersecurity. I look forward to them saying, "Scott, this already exists. Let me show you this well-known, well-defined list commonly shared across the industry." Then we all laugh, recognizing the sarcasm of there being a standard for cybersecurity automation.
There is an excellent primer over at Bleuwire? and the folks at Security Boulevard have put together a great article on SOAR to take the journey to the technical realm. And though I am not going to be particularly insightful in this first of many automation blogs to come, I hope you step into this journey with me every Thursday and we come to understand cybersecurity automation potential together.
I have a lot to learn. I am no longer looking at automation as the end of humanity, but I am opening my mind to the possibilities of improving our capabilities, efficiencies, and effectiveness while maintaining human oversight and adaptability.
Healthcare CISO | Educator | Veteran | Entrepreneur | Risk PHD
2 年Shoot I forgot the links and no one said a thing. :(
Bridging Behavioral Science & Cybersecurity | Enhancing Security Leaders’ Decision-Making | Cyber Risk Strategist | Keynote Speaker | Author
2 年Michael Schindler This is a topic near and dear to me. The idea of leveraging automation and AI always seems to cause churn and worry. However, as we have seen with ChatGPT, people love it once it is a reality. I would encourage you and anyone who reads your newsletter to check out my post on this. I am currently doing a multi-part series on this, Part 1 can be accessed at: https://www.dhirubhai.net/pulse/can-computers-think-dustin-s-sachs-mba-cissp/