Contact
QR code for the current URL

Story Box-ID: 926834

HAGER Executive Consulting GmbH Zur Charlottenburg 3 60437 Frankfurt, Germany http://www.hager-consulting.com
Contact Ms Angela Keuneke +49 69 950920

IT security at management level

Fighting cyberattacks with artificial intelligence (AI)?

(PresseBox) (Frankfurt, )
Maintaining IT security poses major challenges for many companies. Cyberattacks are not only becoming more frequent but also more vicious. Many attacks are initially undetected, resulting in even more far-reaching consequences for companies. In order to ward off cyberattacks in advance and to minimize potential damage, a holistic approach is required.

Meanwhile, AI is often used in cybersecurity

Many IT decision-makers see AI as the only ideal way to successfully upgrade against attacks. However, AI is only in its infancy in security technology in order to serve suitable fields of application. With the help of AI, the detection and defence against cyberattacks can be significantly improved and AI will soon play a major role in prevention. However, there are limits and it would be almost negligent to rely solely on artificial intelligence. The algorithms have a narrow focus and work with standardized sets of rules. Clever cybercriminals are able to introduce new scenarios that are completely new to the algorithms in order to break new - not covered - ground. Identified viruses should be classified and examined by humans in order to avoid unnecessary false alarms.

In each case, it is important to check whether AI should only be used as a tool in the corporate IT security strategy or whether it should increasingly cover the security area. If necessary, the entrepreneurial focus must be directed more towards the necessary human resources. From today's view, successful and therefore secure anticipatory action, just like forensic thinking, is still reserved for human intelligence.

In many large companies and corporations, the position of the IT security officer is deliberately located in the management

Hazards and risks are cross-sectoral, all companies are subject to the same attack patterns. But how can companies protect themselves? Security as a tailor-made product from the catalogue does not exist and there are still limits to AI.

Sufficient defence against cyberattacks should normally be the responsibility of the company management. It is essential to set up a functioning IT risk and IT security management system in the company to minimize the attack possibilities for hackers. Security measures must be developed, implemented and executed and also constantly monitored, reviewed and improved.

What skills does a cybersecurity expert need?

Security specialists need to be much broad-based in terms of their qualifications and profiles than mere IT experts. They focus on implementing and executing a sustainable and resilient ISMS along with data protection and physical security measures to achieve comprehensive security solutions and operational risk and crisis management. Effective prevention work and the planning of potential attack scenarios are also standard tasks. Such planning requires - in addition to pure programming languages - several years of relevant professional experience in the area of information security, certification such as CISSP, CISM, CISA as well as very good knowledge in the area of security and network and also cryptography.

In addition to the knowledge in the field of encryption with a mathematical focus and a specialist course such as in economics or MINT, a sound professional experience in IT security (threat response/analysis and intelligence), CERT, conception of intrusion detection and prevention systems is also required. Solid knowledge in the fields of anti-malware software, network administration, IT security or IT forensics and the common scripting and programming languages are just as important prerequisites as a pronounced skill in communication and documentation.

Conclusion:

In the coming years, it will be increasingly important for company managers to understand the topic of cybersecurity as a brand attribute and not just wait for this problem to resolve itself. Responsibilities must be reorganized and established. AI is an option but not the only way to combat cybercrime. Those who acquire the desired and suitable specialists and managers with this knowledge in due time already have a clear competitive advantage.

Author:
Martin Krill has been working for Hager Unternehmensberatung for nearly 20 years and was appointed Managing Director in 2004. He fills senior sales and management positions in the technology industry and in other selected industries.

 

 

 

 

 

Website Promotion

Website Promotion

HAGER Executive Consulting GmbH

Hager Unternehmensberatung is a partner of Horton International and offers customers at over 40 locations in the globally most important economic regions solutions for issues throughout the working life cycle: Employment Lifecycle Solutions®.

These targeted solutions for the working life cycle are mirrored in our individual divisions: in the placement of the right candidates, the evaluation of staff potential, during training to develop the personal skills of employees and supporting individual change processes.

With nearly 100 employees in Germany working in small specialist teams, a fully digital workflow and over 20 years of experience in the technology sector as well as other innovative markets, Hager Unternehmensberatung brings together the performance and process quality of the industry’s big names with the speed and flexibility of a start-up.

Hager Unternehmensberatung is one of the top 15 recruiters in the DACH region and the well-known executive search consultancy for digital transformations.

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.
Important note:

Systematic data storage as well as the use of even parts of this database are only permitted with the written consent of unn | UNITED NEWS NETWORK GmbH.

unn | UNITED NEWS NETWORK GmbH 2002–2024, All rights reserved

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.