Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Preventing Cyber Attacks against Government Agencies Takes an AI Turn

by Peter Jacobs
October 25, 2019
in Cybersecurity
Reading Time: 3 mins read
A A
Preventing Cyber Attacks against Government Agencies Takes an AI Turn
Share on FacebookShare on Twitter

With government agencies under constant assault by nation-state and private hackers, along with the ongoing threats posed by insiders, it’s no wonder that federal CIOs spend a huge percentage of time looking for ways to root out the latest compromises in their networks. However, even though new cyber threats can pose tremendous risks to government systems and data, malware is still the largest attack vector, comprising more than 90 percent of all cyber-attacks, according to data presented in a webinar from Blackberry Cylance. Artificial Intelligence (AI) presents an opportunity to change the model from reactive to preventive.

Watch the Webinar

John Wood, Director of Incident Response, and Brian Winkler, Sr. Federal Solutions Engineer for Blackberry Cylance, described the three main cybersecurity issues faced by government agencies:

  • Mission Impact – Systems and data need to be protected, whether they support military intel or cancer research.
  • Excessive alerts – Even after years of advancement and throwing people at the problem, there are still too many alerts for most IT staffs to handle effectively.
  • Too many tools – Differing technology from separate manufacturers gets in the way of effective monitoring, management, and mitigation.

The risks to agencies are well-known, including loss or corruption of critical data and intellectual property, disruption of operations, and loss of public confidence in the government’s ability to protect personal data. But, with 40,000 new malicious binaries created each hour (not including code that is designed to mutate each time it installs) and five malware events per second, traditional anti-virus strategies are rendered useless.

If detection schemes no longer work, since they depend on knowing what to look for, CIOs and CISOs should a prevention strategy driven by AI, the panelists said.

In a Prevention-based Incident Containment model, Winkler said, every endpoint is assessed. AI is used to find malware, potentially unwanted programs (PUPs), and compromised credentials, allowing containment with a single click. “A large number of breaches start with malicious code. If we can stop execution, these attacks would be less of a burden so we can concentrate on more advanced threats,” he said. In contrast, traditional incident response (IR) is reactive and time consuming; it’s based on tools detecting “something,” alerting personnel who then have to chase down every alert. It can require hardware or appliances in the environment for additional visibility, and increases capital costs.

An AI solution, such as Cylance Protect and Cylance Optics, the panelists explained, predicts the emergence of malware and can block attacks months before they are first detected in the wild. This capacity makes them effective on more than 99% of malware before it can execute. These solutions, which Winkler described as simple to employ and lightweight, work with cloud, hybrid and on-prem environments, and are FedRAMP qualified for cloud and hybrid enterprises.

Still, Wood said, those tasked with cybersecurity for government systems need to use every resource at their disposal. Break-ins are inevitable, through phishing, inadvertent errors, misconfigurations, as well as malicious actors. He explained that intrusive code is “noisiest” when moving laterally through the network, making it the best time to catch an intruder.

Wood advocates a comprehensive approach utilizing multiple strategies and tools. “Everyone understands layered security. There is no panacea out there; you still need all of those other defenses.” An AI-driven suite of tools, the panelists said, offers a much more effective way to prevent intrusions, eliminate active threats, and protect against emerging ones.

Ready to learn more? You can do that here.

Tags: AIArtificial IntelligenceBlackberry CylanceBrian WinklerCIOCISOcybersecurityFederal Agenciesgovernment agenciesincident responseJohn Woodmalware

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5385 shares
    Share 2154 Tweet 1346
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us