  {"id":14603,"date":"2021-04-15T17:33:27","date_gmt":"2021-04-15T21:33:27","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/"},"modified":"2021-04-15T17:33:27","modified_gmt":"2021-04-15T21:33:27","slug":"darktrace-cybersecurity-of-the-future","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/","title":{"rendered":"Darktrace: Cybersecurity of the Future?"},"content":{"rendered":"<p>In 2013, a group of mathematicians and intelligence experts from the UK got together in Cambridge and envisioned a new way of dealing with the quickly rising and changing cybersecurity threats. They included Alan Wade, former CIO of the CIA and Lord Evans of Weardale KCB, former head of the British internal intelligence service MI5. These individuals went on to create a company called Darktrace which is headquartered in Cambridge and San Francisco. A large portion of the board came from HP autonomy.<\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-14608\" src=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021-1024x683.jpg\" alt=\"\" width=\"640\" height=\"427\" srcset=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021-1024x683.jpg 1024w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021-300x200.jpg 300w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021-768x512.jpg 768w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021-600x400.jpg 600w, https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace-1_darktrace.com_12042021.jpg 1200w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Darktrace is a company that uses artificial intelligence to detect and combat cyber security threats. Their most interesting suite of products are the Enterprise and Industrial Immune Systems. They are aptly named, as just like the immune system in living organisms, they recognize threats by identifying \u201coutlier\u201d behaviors. To do this, the system learns normal behavioral patterns over varied metrics. When it notices significant deviation from the regular behavior, it flags the threat and responds to it. Since it is a continuously learning system, it adjusts the definition of outlier behaviors based on the changing system usage trend. The industrial variant does the same for cyber-physical systems and is hence able to detect and respond to potential industrial accidents before they happen.<\/p>\n<p>What really sets Darktrace apart is the fact that it does not need periodic threat signature updates unlike most other cyber security systems. Rather than learning to identify abnormal behavior, it learns to identify normal behavior. Hence the lack of need for downloading signatures. It classifies anything outside normal behavior as a potential threat and lets system operators decide on how to respond to it. This makes it capable of addressing a wider array of threats. This also enables it to address novel threats before they can cause quantifiable damage. The system relies on no prior knowledge of threats as it does not look for threats in a conventional manner.<\/p>\n<p>The other part of their suite of services is the response which is called Antigena. Antigena is the first ever Autonomous Response system that handles threats detected by the Enterprise Immune System. It does so by slowing down or stopping any services or network connections that have been displaying behavior outside of what is classified as \u201cnormal\u201d. Their users are especially happy with the proactive nature of the platform and how little it requires in the way of human intervention. The main form of human intervention required by Darktrace\u2019s platform is in the \u201cThreat Visualizer\u201d which allows the system administrators to look at all the threats to the system and describes the normal behavior in the network. When the WannaCry ransomware wreaked havoc across the world, Darktrace clients were protected from massive damages as its behavior fell outside the pre-determined \u201cnormal\u201d assessed by the Immune System.<\/p>\n<p>In 2019, Darktrace introduced the Cyber AI analyst which not only assisted in detection and response to threats but also their investigation and reporting which would earlier have consumed too many valuable man hours. It can correlate multiple seemingly dissociated security events to a single incident and help teams reduce triage time by over 90%.<\/p>\n<p>This adaptability and scalability and scalability of their offering is what will help them capture value and the rapid growth in cyber threats is what will create value for them. They are fairly unique as the majority of their value is created from without and not within. But that value creation is guaranteed as it is a byproduct of other entities\u2019, government or private, necessary value creation. They can expand their value capture over time by collecting more training data and adding more capabilities to capture more value in the cyber security space.<\/p>\n<p>An interesting article on the future of cyber security can be found here: <a href=\"https:\/\/fortune.com\/2019\/03\/15\/cybersecurity-ai-darktrace-ceo\/\">Darktrace CEO: the Future of Cybersecurity is A.I. vs. A.I. | Fortune<\/a><\/p>\n<p>The work done by the folks at Darktrace could very well go to define the future of cyber security. This is because conventional cybersecurity methods just cannot handle the scale and diversity of the upcoming cyber threats. Their need to be supervised in their detection and response makes them near impossible to scale. The unsupervised learning provided by Darktrace and companies like it, which are bound to pop up, makes it possible for a system to recognize a threat by itself and respond to it. This is backed by the fact that Darktrace now has over 4,700 clients and currently employees over 1,500 people across the world.<\/p>\n<p>The company seems to have great faith in the value they bring to the market as they have recently filed for an IPO on the London Stock Exchange. It remains to see what the free market values the company at considering how specialized their offering is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cutting edge of cybersecurity comes from AI being able to recognize any behavior that falls outside &#8220;normal&#8221;.<\/p>\n","protected":false},"author":18526,"featured_media":14607,"comment_status":"open","ping_status":"closed","template":"","categories":[1273,235,3003,2692,835],"class_list":["post-14603","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-artificial-intelligence","category-cyber-security","category-darktrace","category-intelligence","category-start-up","hck-taxonomy-organization-darktrace","hck-taxonomy-industry-technology","hck-taxonomy-country-united-kingdom"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-digit\/assignment\/machine-learning\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Darktrace: Cybersecurity of the Future? - Digital Innovation and Transformation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Darktrace: Cybersecurity of the Future? - Digital Innovation and Transformation\" \/>\n<meta property=\"og:description\" content=\"The cutting edge of cybersecurity comes from AI being able to recognize any behavior that falls outside &quot;normal&quot;.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Innovation and Transformation\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace_Logo-2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2700\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/\",\"name\":\"Darktrace: Cybersecurity of the Future? - Digital Innovation and Transformation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Darktrace_Logo-2-scaled.jpg\",\"datePublished\":\"2021-04-15T21:33:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Darktrace_Logo-2-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/04\\\/Darktrace_Logo-2-scaled.jpg\",\"width\":2700,\"height\":452},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/darktrace-cybersecurity-of-the-future\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Darktrace: Cybersecurity of the Future?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/\",\"name\":\"Digital Innovation and Transformation\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-digit\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Darktrace: Cybersecurity of the Future? - Digital Innovation and Transformation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/","og_locale":"en_US","og_type":"article","og_title":"Darktrace: Cybersecurity of the Future? - Digital Innovation and Transformation","og_description":"The cutting edge of cybersecurity comes from AI being able to recognize any behavior that falls outside \"normal\".","og_url":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/","og_site_name":"Digital Innovation and Transformation","og_image":[{"width":2700,"height":452,"url":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace_Logo-2-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/","url":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/","name":"Darktrace: Cybersecurity of the Future? - Digital Innovation and Transformation","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace_Logo-2-scaled.jpg","datePublished":"2021-04-15T21:33:27+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace_Logo-2-scaled.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-digit\/wp-content\/uploads\/sites\/2\/2021\/04\/Darktrace_Logo-2-scaled.jpg","width":2700,"height":452},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/darktrace-cybersecurity-of-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-digit\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-digit\/submission\/"},{"@type":"ListItem","position":3,"name":"Darktrace: Cybersecurity of the Future?"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-digit\/#website","url":"https:\/\/d3.harvard.edu\/platform-digit\/","name":"Digital Innovation and Transformation","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-digit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/14603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/users\/18526"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/comments?post=14603"}],"version-history":[{"count":2,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/14603\/revisions"}],"predecessor-version":[{"id":14609,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/hck-submission\/14603\/revisions\/14609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/media\/14607"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/media?parent=14603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-digit\/wp-json\/wp\/v2\/categories?post=14603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}