Skip to content
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Latest Magazine Topics Podcasts Store The Big Idea Data & Visuals Case Selections HBR Learning HBR Executive Ask AI
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Navigation Menu
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Close menu
CLEAR
  • SUGGESTED TOPICS

Explore HBR

  • Latest
  • The Magazine
  • Podcasts
  • Store
  • Webinars
  • Newsletters

Popular Topics

  • Managing Yourself
  • Leadership
  • Strategy
  • Managing Teams
  • Gender
  • Innovation
  • Work-life Balance
  • All Topics

For Subscribers

  • The Big Idea
  • Data & Visuals
  • Case Selections
  • HBR Learning
  • HBR Executive
  • Subscribe

My Account

  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Log Out
  • Sign In
Subscribe Latest Podcasts The Magazine Store Webinars Newsletters All Topics The Big Idea Data & Visuals Case Selections HBR Learning HBR Executive My Library Account Settings Log Out Sign In

Your Cart

Your Shopping Cart is empty.
Visit Our Store

Guest User

Subscriber
My Library Topic Feeds Orders Account Settings Email Preferences Log Out
Reading List
Reading Lists
SPONSOR CONTENT FROM AWS & TRELLIX

Generative AI for Security: Harnessing Amazon Bedrock for Customer Impact


SPONSOR CONTENT FROM AWS & TRELLIX
AWS

June 10, 2024
  • Post
  • Post
  • Share
  • Annotate
  • Save
  • Print
  • Post
  • Post
  • Share
  • Annotate
  • Save
  • Print

By Martin Holste and Mark Weiss

Cybercriminals have more powerful tools than ever to compromise environments and threaten businesses. They use generative AI (GenAI) to install ransomware faster; deep-fake social engineering; cheap yet advanced spear-phishing attacks; sophisticated coding abilities; and even turnkey ransomware underground storefronts.

Such a range of AI-aided weaponry can leave security operations staff feeling hopeless. Often underfunded and understaffed, security teams must defend against all attacks from all routes, at all times. They need to investigate every alert, no matter how seemingly minor, as a threat. Keeping up means fighting fire with fire: employing GenAI to move quickly and scale a small staff for a big challenge.

To investigate every alert, companies can now use GenAI-powered tools to automate the investigation process by asking the right questions and producing sub-second data retrieval times for the answers. The potential to augment security with GenAI is high: a recent study from Trellix finds 91% of CISOs expressing excitement over the prospects and opportunities GenAI and AI will bring to their organization.

The first step to fighting GenAI cybercrime with GenAI security is to create a defensible environment: an instrumented infrastructure allowing visibility into all critical areas to see significant threats like ransomware.

Building this environment involves three lines of defense: detection, investigation, and response.

Detection

Detection and prevention tools alert security teams to attacks or breaches including endpoint protection, network detection, anti-phishing, and event anomaly detection.

Such security controls may stop an attack before it happens, but a motivated or lucky threat actor may bypass such initial preventive measures. So, using a wide range of security tools that cover as many routes as possible into an environment is critical.

At a minimum, defenders must be able to block malicious files, URLs, and emails. These protections often prevent 99% of attacks. But the other 1% remains a huge problem.

Investigation

After the triggering event, defenders need the right context to prove what has happened. But it can be hard to know in advance what will be valuable in scoping a security incident.

Defenders need as much data from as many sources as possible, including:

• User authentication audit records

• Account permission change audit records

• Network connections

• Proxy and URL records

• Business critical application telemetry

• Cloud infrastructure audit logs

• Directory and personnel information

• Security alerts from all available tools

Having access to this information is not enough. This data needs to be centralized and indexed so it’s intelligible to detection tools and immediately and programmatically available. Preparing this data infrastructure can be daunting, but it’s critical to creating a defensible environment.

Response

Detection needs to lead to action—remediation—to prevent the spread of ransomware. This means programmatically changing the environment to quarantine, seal off, or otherwise contain a threat actor through network firewall policy, endpoint containment actions, login disabling, or identity and access permission changes.

Automating Investigations with Generative AI

To move at the speed of ransomware, detection, investigation, and response must be automated with GenAI powering the bulk of the investigation workload.

How can defenders use this powerful technology to tie these strategic defense components together?

The answer is in using pre-built scaffolding of investigations to ensure that GenAI is grounded in its investigation, with a predefined list of vital questions to ask after experiencing a given security alert.

The answers these questions yield will only be as good as the questions themselves. That’s why it’s so important to have a comprehensive array of security telemetry that can quickly and accurately provide the necessary context for the AI-driven investigation. Without these questions and answers, the AI has little more to investigate than the original alert.

An AI Junior Analyst

Suppose a security information and event management (SIEM) creates an alert for a brute-force attack from an identifiable IP address against an application’s login system:

ALERT: BRUTE FORCE ATTACK AGAINST 192.168.0.1 DETECTED

A standard SIEM might identify a login after the brute-force attempt and raise an alarm. But an AI-driven investigation can go further, acting tactically as a virtual junior analyst that asks questions of the environment based on billions of events:

• What level of access does this user have?

• How often does this user access this environment?

• Were any additional suspicious accounts created during this time?

• Was this user out of the office at the time of the attack?

Even more impressively, this “AI junior analyst” can make inferences as a human would. It can understand that the hostname “prod-iowa-dc” is likely a production domain controller in Iowa and can use this information to consider other data: login patterns, which URLs were accessed, or any other alerts from other security tools.

Using AI for Customer Impact

Cyberuptive, a cybersecurity consulting firm, wanted to scale its Managed Security Service Provider (MSSP) program to acquire more customers using the same number of staff. To do that, it needed to expand its existing human-scaled security program to be more efficient with its threat detection and response.

Recognizing the need for advanced automation in investigations, Cyberuptive sought to streamline the process and achieve quicker and more effective responses to emerging threats.

By using GenAI from Trellix Wise—hyper automation delivered across the Trellix XDR Platform and built on Amazon Bedrock—in the investigation process, the firm reduced response times, increased incident resolution efficiency, and enhanced overall security posture. GenAI empowered Cyberuptive to deliver superior support, efficient response times, and cutting-edge threat intelligence to its customers, setting apart in a competitive market.

Armed with a staff scaled by GenAI to investigate every alert, organizations’ defenders can catch threat actors with the same sophistication—and avoid becoming a victim of cybercrime.


Martin Holste is Field CTO, Cloud & AI at Trellix. 

Mark Weiss is Strategic Initiatives Lead, DevSecOps at Amazon Web Services.

To learn more, please register to attend the webinar Gen AI for Security: Adoption strategies with Amazon Bedrock.

Amazon Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies like AI21 Labs, Anthropic, Cohere, Meta, Mistral AI, Stability AI, and Amazon through a single API, along with a broad set of capabilities you need to build generative AI applications with security, privacy, and responsible AI. 

  • Post
  • Post
  • Share
  • Annotate
  • Save
  • Print
Subscribe
Explore HBR
  • The Latest
  • All Topics
  • Magazine Archive
  • The Big Idea
  • Case Selections
  • Podcasts
  • Webinars
  • Data & Visuals
  • My Library
  • Newsletters
  • HBR Press
HBR Store
  • Article Reprints
  • Books
  • Cases
  • Collections
  • Magazine Issues
  • HBR Guide Series
  • HBR 20-Minute Managers
  • HBR Emotional Intelligence Series
  • HBR Must Reads
  • Tools
About HBR
  • Contact Us
  • Advertise with Us
  • Information for Booksellers/Retailers
  • Masthead
  • Global Editions
  • Media Inquiries
  • Guidelines for Authors
  • HBR Analytic Services
  • Copyright Permissions
  • Accessibility
  • Digital Accessibility
Manage My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Account FAQ
  • Help Center
  • Contact Customer Service
Follow HBR
  • Facebook
  • X Corp.
  • LinkedIn
  • Instagram
  • Your Newsreader
Copyright Policy Privacy Information Returns Policy
Harvard Business Publishing: Higher Education Corporate Learning Harvard Business Review Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.
Copyright Policy Privacy Information Returns Policy
Harvard Business Publishing: Higher Education Corporate Learning Harvard Business Review Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.