Page 98 - Cyber Defense eMagazine February 2024
P. 98

experts and best-practices guidelines that all recommended, “add layer upon layer of defenses”, only to
            watch this tactic often fail to deliver adequate protection. Many believe the only way organizations are
            going to get their arms around the escalation of successful extortion-inspired breaches is to go on the
            offensive, attack themselves with the same tactics, techniques, and procedures (TTPs) attackers are
            using, and finally find the reagents lying in wait within their IT and cloud environments that are enabling
            these attacks to succeed.

            This change in thinking is going to take a new class of security solutions mainstream, especially those
            that  are  offensive  in  nature  and  are  underpinned  with  offensive  AI  capabilities.  These  AI-powered
            offensive solutions will not be used to attack others. Instead, they will be used by organizations to attack
            themselves with AI-based technology that comes as close to mimicking attackers as possible. Therefore,
            offensive focused innovators will likely garner great interest in the security buyer communities.  To be
            clear, this branch of AI has little to do with Large Language Models (LLMs) like ChatGPT and others. It
            has to do with purpose-built, autonomous systems that are capable of doing the exact same things
            attackers do – breach your networks and steal your data. Finally, organizations of all sizes will be able to
            see their own environments through the eyes of an attacker.

            As a result of this change, younger security companies that offer purely defensive-based technologies
            will  likely  have  increasing  difficulty  in  raising  new  capital  to  stay  afloat.  Therefore,  a  significant
            consolidation movement is likely on the horizon this year in the security industry. Smaller security firms
            that  have  consumed  their  cash  faster  than  anyone  expected,  primarily  due  to  customers  delaying
            purchases due to their own economic challenges, will be forced to either go into survival mode, close up
            shop, or sell to the highest bidder. Consolidators will be on the lookout to purchase moderately successful
            companies so they can grow their own customer base through inorganic methods.

            The reason for this awakening is also based upon the change currently happening, especially in terms of
            the  latest  legislative  actions.  In  nearly  every  piece  of  new  and/or  proposed  legislation  (designed  to
            address the current threat landscape of course,) every one of them calls for a new approach to security
            that is now focused on assessments, self-assessments, risk assessments, and so on. And often, these
            words are joined by the notion of “continuous”.

            When searching for those terms in the many pages of any new piece of legislation, you will see them
            peppered throughout these initiatives. This is a tell-tale sign that things are about to shift 180 degrees
            since the term “assessment” really means that organizations will be required to go on the offensive, using
            manual, automated, and autonomous adversarial exercises, and attack themselves so they can find their
            truly exploitable weaknesses before attackers do.


            Since this is the case, we can expect investors will shift their interests too, follow this trend, and place
            their bets on innovative companies that can address the foreknown growing demand for offensive-based,
            continuous self-assessment solutions, especially if they are underpinned by AI and machine learning.
            These assessments are not the run-of-the-mill vulnerability scans or once-per-year pentest. These are
            real-world, ongoing cyber readiness exercises.










            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          98
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   93   94   95   96   97   98   99   100   101   102   103