target audience: TECH BUYER  Publication date: Mar 2024 - Document type: Tech Buyer Presentation - Doc  Document number: # US51962424

Generative AI Use Case Taxonomy: The Cybersecurity and Trust Function

By: 

  • Christopher Kissel Loading
  • Christopher Rodriguez Loading
  • Michelle Abraham Loading
  • Jennifer Glenn Loading
  • Philip D. Harris, CISSP, CCSK Loading

Content

  • 38 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

On-line Presentation

Abstract


This IDC Tech Buyer Presentation provides a use case taxonomy for cybersecurity and trust.

IDC's Cybersecurity and Trust team understands that generative AI (GenAI) will be a disruptive force in various cybersecurity technologies. IDC also understands that there may be a stair-step adoption of GenAI as there are practical concerns about GenAI that include the exposure of sensitive data, the reliability of conclusions (currently, if there are not well-defined domains, GenAI will "hallucinate"), the expense of GenAI, and the potential for the adversary to poison the data GenAI uses. While GenAI is the bright, shiny toy, we should also realize that user behavior analytics (UBA) has been with us for two decades and various flavors of AI/machine learning are a decade old. GenAI will hyper-accelerate certain technologies, and it may have little to no effect on others.

Admitting that we cannot tell the future, we can at least represent what is trending in the near future. In this presentation, IDC covers GenAI trends in security operations, application security, information security, risk/exposure management, and compliance. We look at various aspects within each segment; explain the risk level and complexity in deployment; share vendor examples when we have them; and map out what is present and what will happen in the next year and then forecast to 2026 (and beyond).

"GenAI does so many things well including pattern matching and creates dynamic content based upon large language models (LLMs)," notes Chris Kissel, vice president, Security & Trust at IDC. "Many of the AI assistant–enabled platforms already help in the collection of artifacts and in natural language processes used to investigate IT and security-related problems. The truth is, though, that we can't quite turn the switch to 'on' as there are security concerns and, candidly, shifts in IT/security culture before we can harness the power of GenAI."



Coverage


Do you have questions about this document
or available subscriptions?