Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why automation, artificial intelligence and machine learning are becoming increasingly critical for SOC operations

By Daniel Clayton
Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers
September 30, 2021

Across a variety of industries, the adoption of automation and artificial intelligence (AI) initiatives has meant less of a burden and more opportunity for many employees and businesses alike. While security operations have made good progress here, especially in the last four years, there is still a long way to go. Today, it is both common and accurate to point out that warm-bodied, innovative human adversaries will invariably defeat a technology-based defense. But, the path to success requires focused and effective automation technologies like AI and machine learning (ML) to supercharge the expertise and experience of an equally innovative and warm-bodied defender working as part of an enterprise security operations center (SOC) and outsourced services like managed detection and response (MDR).


The Established Need for Human Decision Making

It’s a common misconception that more technology means less need for people. And that’s just not the reality. Automation, AI and ML will likely never entirely replace the need for human decision-making in security operations. The human mind is far too clever and can use abstract thinking to bypass defenses and penetrate a target network that technology tools simply cannot discern. For example, the most sophisticated endpoint detection and response (EDR) solution stands little chance against an employee who is socially engineered to give out an administrative password.  The best chance to counter the unpredictable behavior of a cybercriminal is through human security analysts who can think and act as they do to even the playing field. As an industry, we shouldn’t focus on how AI, ML and automation can replace security analysts, but rather how they can be used to augment (and expedite) informed decision making against complex attacks and then drive response actions selected by an analyst who understands what the attacker is trying to achieve and how he is most likely trying to achieve it.  Automated enrichment that puts all relevant information in front of the analyst must pull from various knowledge bases and research resources to enable analysts to understand the battlespace they are operating in and make informed decisions. 


Where Automation/AI/ML Is Successful Now

Already, several areas across the security landscape are experiencing success from automation, ML and AI initiatives. Essentially, where bad actors are using automation, we can, in turn, also use automation against them. Take, for example, attacks involving credential stuffing, in which cybercriminals use stolen usernames and passwords to try to access multiple accounts elsewhere. With attacks like this, threat intelligence initiatives serve as guides to writing these tools that can detect bad actors (i.e., keystrokes, mouse movements, etc.) and inform security analysts on how best to establish indicators of compromise (IOCs) to monitor for them. On their own, an IOC may not pose a threat, but the sum of multiple related IOCs would warrant cause for a deeper investigation. 


Automation and ML can also be incorporated into technology platforms to predict how malware will evolve and thus, can create a unique signature against malware that wouldn’t normally exist. This ML-generated signature can then drive detection and alert the analysts to run an investigation. 


Another critical area these technologies are being leveraged is through the collection and processing of mountains of security data required to uncover and verify anomalous activities as real threats, finding the proverbial needle in but in a stack of needles. Automating lower-skilled SOC tasks that were often the work of less qualified or less experienced analysts protects the time of the security team and enables them to focus on the higher-skilled, higher-value tasks that protect the enterprise. 


Leveraging the Benefits of AI, Automation and ML Across SOCs  

The sheer speed and pattern recognition capabilities of automation and AI helps SOC operations establish a baseline for security activity and then track against it. By setting parameters for normalcy, these initiatives enable consistent monitoring and will flag activities outside established boundaries. Once a “normal” is established, analysts can catch suspicious activities that stray from the established settings to drive decision-making around what to discard or pursue further. Moreover, these tools enable analysts to proactively gauge how an attack would be executed, where vulnerabilities exist, and what happens next to combat bad actors effectively. 


Equipping the SOC of the Future

For the foreseeable future, AI, ML and automation will not replace analysts but rather automate efficiencies across SOCs and provide analysts with more context in real-time. We can anticipate seeing more AI cases being leveraged not to mimic the analysts but rather using AI-garnered intelligence to mimic bad actors. For example - if we are able to use AI to scan a large-scaled environment, correlate with existing vulnerabilities and then predict the way a bad actor would exploit that environment, this becomes extremely valuable for an analyst because that then provides them with threat hunting intel to harden environments before attacks take place. 


Additionally, we’ll likely start seeing AI and ML specifically used to enable scale. As of now, analysts have limits on the amount of data they can manually collect. Most data platforms work from the promise of big data analytics (the more data you have, the more patterns, relationships and insights you can derive), but the licensing model makes it restrictive to the volume of data permitted within a set budget. The future will ultimately commoditize the concept of infrastructure as a service. Thus, removing storage and data limitations from the equation and providing analysts with the ability to look at data sets in a much more strategic way and hone in on predictive analytics necessary to combat bad actors.


Even further, these tools build a strong - and more sophisticated - baseline for identifying bad actors’ patterns, initiating predictive analytics and acting on them faster than a human could. These initiatives will, over time, help make the SOC analyst more efficient, arming them with intelligence and insights to make more informed decisions.


Moving Forward

With the ever-evolving threat landscape, bad actors are becoming increasingly more sophisticated in their tactics and approaches for evading detection. It is truly a modern-day cat and mouse game. As AI and automation improve and grows in adoption across SOC operations, the speed and accuracy of threat detection will increase as a result. Highly skilled security analysts will spend more time on countermeasures and threat elimination and much less time wading through mountains of data chasing and verifying alerts and false positives. 



KEYWORDS: artificial intelligence (AI) automation cyber security machine learning risk management Security Operation Centers

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Daniel clayton

Daniel Clayton has been responsible for building and delivering global operations for the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), Rackspace and Bitdefender over a 30-year career. As VP of Global Support and Services, he is responsible for Bitdefender’s global operations in support of customers, including the strategy, service delivery and oversight of Services and Support Operations, including the Security Operations Center, Customer Success Operations and associated engineering functions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • On the watch floor of McKesson’s GSOC, three operator workstations

    93% of security operations centers employing AI and machine learning tools to detect advanced threats

    See More
  • 5 mins with Bocek

    5 minutes with Kevin Bocek - Why machine identity management is critical for security

    See More
  • crowd entrance security fp

    How artificial intelligence can transform event venue security operations

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!