When it Comes to Cybersecurity, Wearing the Black Hat Pays Off

When it Comes to Cybersecurity, Wearing the Black Hat Pays Off

What was the first thing I did before entering Black Hat USA in Las Vegas? I toggled off my bluetooth. With more than 20,000 people in attendance, Black Hat is the largest cybersecurity conference in the world. Events like these are a magnet for hackers – the ambitious ones consider them a teaching moment of the highest kind. One minute you could be standing next to a chief information security officer from a Fortune 50 company and the next it could be a cybercriminal learning new ways to exploit infrastructure vulnerabilities to increase revenues.?

?

This is the world we live in. This is why it pays to wear the black hat.

?

The Black Hat Experience

?

First, a little history. If you’ve ever watched a Western from the 1950s, you know the rough and tough bad guys wear the black hat. This was the inspiration behind the Black Hat Briefings founded by hacker and computer security expert Jeff Moss, also known as Dark Tangent, in 1997. The annual event’s purpose is to give computer security professionals highly technical strategies to minimize risk and win the battle against cybercriminals across the information security landscape.?

?

One exhibitor at Black Hat was Splunk , Known globally for its enterprise resilient platform, Splunk was acquired by 思科 in March of 2024 as a way to “Power and Protect the AI Revolution,” according to a CISCO press release. Black Hat wasn’t all serious talk, though. Thanks to Splunk ambassador Katie Kirby, I got my first tattoo featuring the Splunk logo and four aces.?

?

One wall of Splunk’s booth caught my eye as being rather prophetic. The phrase “Me, my friends and AI.” were written across the top of a T-Shirt rack. The inference was a creative and succinct way of saying that AI is fast becoming embedded in our daily lives. AI is, indeed, everywhere.

?

This is one reason I find Splunk to be so relevant. Its technology is transforming the security operations center with a unified approach. Think of it as a fortress of protection with less “blind spots” or visibility gaps as opposed to siloed solutions and tools used to fend off assaults across an organization. Splunk aims to deliver 100% visibility, 10x faster incident detection and investigation, and over 95% automation in incident response tasks. Monitoring security situations in real time is where Splunk shines.

?

The “why” behind Splunk’s approach can be seen in its 38-page State of Cybersecurity 2024: The Race to Harness AI report, which points out that 93% of respondents are already using generative AI (GenAI) in some capacity. While many, according to the report, see it as a “critical point of innovation,” GenAI also creates greater vulnerabilities and opportunities for attacks. If you’re in cybersecurity or you lead an innovation-minded organization, this report is a must-read.?

?

Here are three highlights accompanied by take-action ideas you can put into play.


  1. GenAI’s Implications.

  • According to the report, 91% of security professionals are using GenAI, but 65% don’t understand the implications. I was surprised by the second number, which shows a disparity between GenAI applications and its inherent privacy and accuracy risks. I would have expected security professionals to understand this better. However, I also think GenAI is evolving at warp speed. In my many conversations with security professionals about GenAI, there seems to be two schools of thought. Some are against using it while others are using it to learn new things. Exploring who will benefit the most from GenAI, here again the report reveals a fascinating statistic: 43% choose defenders while 45% choose adversaries. It’s a tight race that cybersecurity leaders must win by understanding GenAI’s risks.
  • WHAT TO DO: Provide guidelines. For example, one guideline might be to simply not put confidential information (think financial numbers, product roadmap, long-term strategy, M&A information) into GenAI prompts.

2.???? Balancing Security and Compliance.

  • A whopping 86% say they will shift budgets to prioritize compliance regulations over security best practices. This puts, as the report states, security professionals between a “metaphorical rock and a hard place.” Underreporting poses penalties and even personal liability while overreporting could negatively impact stock prices and brand trust.
  • WHAT TO DO: Every board should put cybersecurity on the agenda. Cybersecurity starts from the top. Don’t make assumptions, make plans. This will better balance compliance with security best practices as the two are not mutually exclusive. Also, protect the security budget. I’ve worked for companies that have cut the security team or hired people with less experience when budgets got tight.?

3.???? Diversity of Incidents.

  • The top four most frequent incidents experienced by respondents in the last two years are data breaches (52%), business email compromise (49%), system compromise (49%) and cyber extortion (48%). There are, however, a host of other diverse security incidents that are cited. One thing I learned is that while adversaries are getting smarter, so are defenders. Look at this statistic: Fewer respondents lost productivity and the number of respondents that spent significant time and personnel to handle incidents dropped by 13% to 44% compared to 2023. We’re becoming more resilient.
  • WHAT TO DO: What gets measured, gets done. Know your strengths and vulnerabilities. Integrate a cybersecurity framework (the National Institute of Standards and Technology has a good guideline to start with). Create a culture of cybersecurity. Include education for suppliers, contractors, employees and new employees. For example, test vulnerabilities by sending a fake phishing email to see how people respond. Train for real-world circumstances. Doing so creates better habits, educates on cybersecurity guidelines in a realistic setting and, ultimately, reduces the risks of human error. Proactive simulation exercises, such as tabletops, keep people, data and the fortress around your network safer.

?

AI is the New “Cellphone”

?

According to Pew Research, 97% of Americans own a cellphone today. This is about double the number compared to just 10 years ago. Similarly, GenAI is the new reality, a sun that is quickly rising for many industries and people. Like the cellphone has become part of our lives without us even thinking about it – from giving us our running pace to sending birthday wishes to interacting with brands through apps – GenAI is starting to become embedded into our personal and work lives.?

?

GenAI is not a threat; it’s a game-changer for innovation as long as we are prepared for the worst. How do we operate if our system is compromised? Are we measuring our security strengths and vulnerabilities on all fronts? How resilient are we if attacked? How will we continue business as usual if our system comes to a halt??

?

It all comes down to prioritizing cybersecurity. This is where wearing the black hat truly pays off.?

AI is quickly becoming a cornerstone in cybersecurity, and Splunk's insights at Black Hat USA highlight just how embedded it is in every aspect of the field. The message is clear: we’re no longer just building a stack of tools, but fortresses to defend against evolving threats. Splunk’s report shows that 93% of organizations are already using GenAI, but with innovation comes new vulnerabilities. Staying ahead means understanding these risks while harnessing the power of AI.

回复
Chelsea Larson-Andrews

TechMode.io Co-Founder, Tech Enthusiast, B2B Marketer, Content Creator, and Social Media Super User. Follow me on X @Chels_LA

1 个月

Great resource with significant findings, thanks for sharing Helen Yu ??

回复
Eunice Omoruyi

Driving Visibility and brand growth for Service-based brands using customized strategies + tailored content | Account Manager & Social Media Strategist |

1 个月

One additional insight: integrating AI with human expertise can significantly enhance threat detection and response times. It's not just about technology but the synergy between AI and skilled professionals.

Tracie Rivers

Founder & CEO of Rivers Growth Solutions | SEO Specialist | Lead Generation | Transforming small businesses into Local Search Leaders with High-Value Client Acquisition.

1 个月

Helen, I couldn’t agree more! The phrase “Me, my friends and AI” perfectly sums up where we’re headed. But here's a thought: what if we start seeing AI as not just another tool but as an active team member? Imagine collaborating with AI systems that not only detect threats but also suggest countermeasures in real-time. It’s like having an extra set of eyes that never sleep!

Robert Lienhard

Human-centric Talent Attraction Maestro with a focus on SAP??Enthusiast for Humanity & EI in AI??Advocate for Servant & Agile Leadership??Convinced Humanist & Libertarian??LinkedIn Top Voice

1 个月

Very informative, Helen Yu! Your take on artificial intelligence's role in cybersecurity is timely and crucial. As AI becomes deeply embedded in our systems, it’s transforming the way we defend against cyber threats—but also creating new vulnerabilities. Splunk’s approach to a unified security strategy emphasizes that in today’s landscape, a mere stack of tools isn’t enough; we need a fortress. The fact that 93% of respondents in Splunk’s report are already using GenAI underscores how quickly this technology is becoming essential. But with this rapid adoption comes the responsibility to address the new risks it introduces.? Your blog, "When it Comes to Cybersecurity, Wearing the Black Hat Pays Off," offers valuable insights and actionable steps that are essential for anyone looking to stay ahead in this evolving field. Thanks for shedding light on these critical developments!

要查看或添加评论,请登录

Helen Yu的更多文章