Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why automation, artificial intelligence and machine learning are becoming increasingly critical for SOC operations

By Daniel Clayton
Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers
September 30, 2021

Across a variety of industries, the adoption of automation and artificial intelligence (AI) initiatives has meant less of a burden and more opportunity for many employees and businesses alike. While security operations have made good progress here, especially in the last four years, there is still a long way to go. Today, it is both common and accurate to point out that warm-bodied, innovative human adversaries will invariably defeat a technology-based defense. But, the path to success requires focused and effective automation technologies like AI and machine learning (ML) to supercharge the expertise and experience of an equally innovative and warm-bodied defender working as part of an enterprise security operations center (SOC) and outsourced services like managed detection and response (MDR).


The Established Need for Human Decision Making

It’s a common misconception that more technology means less need for people. And that’s just not the reality. Automation, AI and ML will likely never entirely replace the need for human decision-making in security operations. The human mind is far too clever and can use abstract thinking to bypass defenses and penetrate a target network that technology tools simply cannot discern. For example, the most sophisticated endpoint detection and response (EDR) solution stands little chance against an employee who is socially engineered to give out an administrative password.  The best chance to counter the unpredictable behavior of a cybercriminal is through human security analysts who can think and act as they do to even the playing field. As an industry, we shouldn’t focus on how AI, ML and automation can replace security analysts, but rather how they can be used to augment (and expedite) informed decision making against complex attacks and then drive response actions selected by an analyst who understands what the attacker is trying to achieve and how he is most likely trying to achieve it.  Automated enrichment that puts all relevant information in front of the analyst must pull from various knowledge bases and research resources to enable analysts to understand the battlespace they are operating in and make informed decisions. 


Where Automation/AI/ML Is Successful Now

Already, several areas across the security landscape are experiencing success from automation, ML and AI initiatives. Essentially, where bad actors are using automation, we can, in turn, also use automation against them. Take, for example, attacks involving credential stuffing, in which cybercriminals use stolen usernames and passwords to try to access multiple accounts elsewhere. With attacks like this, threat intelligence initiatives serve as guides to writing these tools that can detect bad actors (i.e., keystrokes, mouse movements, etc.) and inform security analysts on how best to establish indicators of compromise (IOCs) to monitor for them. On their own, an IOC may not pose a threat, but the sum of multiple related IOCs would warrant cause for a deeper investigation. 


Automation and ML can also be incorporated into technology platforms to predict how malware will evolve and thus, can create a unique signature against malware that wouldn’t normally exist. This ML-generated signature can then drive detection and alert the analysts to run an investigation. 


Another critical area these technologies are being leveraged is through the collection and processing of mountains of security data required to uncover and verify anomalous activities as real threats, finding the proverbial needle in but in a stack of needles. Automating lower-skilled SOC tasks that were often the work of less qualified or less experienced analysts protects the time of the security team and enables them to focus on the higher-skilled, higher-value tasks that protect the enterprise. 


Leveraging the Benefits of AI, Automation and ML Across SOCs  

The sheer speed and pattern recognition capabilities of automation and AI helps SOC operations establish a baseline for security activity and then track against it. By setting parameters for normalcy, these initiatives enable consistent monitoring and will flag activities outside established boundaries. Once a “normal” is established, analysts can catch suspicious activities that stray from the established settings to drive decision-making around what to discard or pursue further. Moreover, these tools enable analysts to proactively gauge how an attack would be executed, where vulnerabilities exist, and what happens next to combat bad actors effectively. 


Equipping the SOC of the Future

For the foreseeable future, AI, ML and automation will not replace analysts but rather automate efficiencies across SOCs and provide analysts with more context in real-time. We can anticipate seeing more AI cases being leveraged not to mimic the analysts but rather using AI-garnered intelligence to mimic bad actors. For example - if we are able to use AI to scan a large-scaled environment, correlate with existing vulnerabilities and then predict the way a bad actor would exploit that environment, this becomes extremely valuable for an analyst because that then provides them with threat hunting intel to harden environments before attacks take place. 


Additionally, we’ll likely start seeing AI and ML specifically used to enable scale. As of now, analysts have limits on the amount of data they can manually collect. Most data platforms work from the promise of big data analytics (the more data you have, the more patterns, relationships and insights you can derive), but the licensing model makes it restrictive to the volume of data permitted within a set budget. The future will ultimately commoditize the concept of infrastructure as a service. Thus, removing storage and data limitations from the equation and providing analysts with the ability to look at data sets in a much more strategic way and hone in on predictive analytics necessary to combat bad actors.


Even further, these tools build a strong - and more sophisticated - baseline for identifying bad actors’ patterns, initiating predictive analytics and acting on them faster than a human could. These initiatives will, over time, help make the SOC analyst more efficient, arming them with intelligence and insights to make more informed decisions.


Moving Forward

With the ever-evolving threat landscape, bad actors are becoming increasingly more sophisticated in their tactics and approaches for evading detection. It is truly a modern-day cat and mouse game. As AI and automation improve and grows in adoption across SOC operations, the speed and accuracy of threat detection will increase as a result. Highly skilled security analysts will spend more time on countermeasures and threat elimination and much less time wading through mountains of data chasing and verifying alerts and false positives. 



KEYWORDS: artificial intelligence (AI) automation cyber security machine learning risk management Security Operation Centers

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Daniel clayton

Daniel Clayton has been responsible for building and delivering global operations for the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), Rackspace and Bitdefender over a 30-year career. As VP of Global Support and Services, he is responsible for Bitdefender’s global operations in support of customers, including the strategy, service delivery and oversight of Services and Support Operations, including the Security Operations Center, Customer Success Operations and associated engineering functions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • On the watch floor of McKesson’s GSOC, three operator workstations

    93% of security operations centers employing AI and machine learning tools to detect advanced threats

    See More
  • technology-trends-freepik58673.jpg

    Artificial intelligence, machine learning, cloud computing, 5G will be most important tech in 2022

    See More
  • 5 mins with Bocek

    5 minutes with Kevin Bocek - Why machine identity management is critical for security

    See More

Related Products

See More Products
  • operations center.jpg

    Security Operations Center Guidebook

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing