  {"id":36824,"date":"2018-11-14T00:39:02","date_gmt":"2018-11-14T05:39:02","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/"},"modified":"2018-11-14T00:40:37","modified_gmt":"2018-11-14T05:40:37","slug":"can-machine-learning-solve-the-cyber-security-threat","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/","title":{"rendered":"Can machine learning solve the cyber security threat?"},"content":{"rendered":"<p>Imagine the consequences if tomorrow 10% of the UK\u2019s power supply were to disappear in an instance. That could happen if Drax Power Station, the largest power supplier in the UK, was hacked in an attack that paralyzed the station\u2019s IT system. Drax is facing a common challenge in any digitalized organization today: The number of cyber attacks is increasing while there is a shortage of skilled cyber security experts capable of stopping such attacks. Drax found their solution in cyber security vendor Darktrace that seeks to address their issue through unsupervised machine learning.<\/p>\n<p>As our society is digitized we are achieving magnificent benefits both in terms of productivity and convenience, but investments in digitalization have not been matched by investment in cyber security. Estimated spend on IT of 3.7T in 2018 dwarfs the estimated 114B spent on cyber security<sup>1<\/sup>. It is estimated that cyber security attacks will cost $400 billion each year as a consequence of several billion breached data sets with an average time of ~100 days to discover covered attacks<sup>2<\/sup>. Increasing threat of cyber security attacks is expected to drive demand for cyber security professionals 12x faster than the total job market, leading to an estimated expected shortage of 1.5m cyber security professionals by 2020<sup>3<\/sup>.<\/p>\n<p>The increasing skills gap and growing threat level is why using machine learning is so important to the Darktrace product development. The company\u2019s Cyber AI platform is built on unsupervised machine learning, performing billions of probability-based calculations to teach itself what network traffic in an organization\u2019s IT infrastructure is normal and what traffic should be flagged as a threat<sup>5<\/sup>. The company compares their technology to the human immune system, able to identify a virus and start fighting back in real time without having previous experience. In the short term, the Darktrace management team believes their technology can be used by any organization to flag potential threats in real time without much human interaction. In the medium term, the management team envisions that cyber criminals will increasingly deploy machine learning in their attack strategies. Darktrace therefore believes using machine learning is the only way to defend against these types of cyber attacks in the future, as humans will simply not be able to keep up with the pace of machines<sup>5<\/sup>.<\/p>\n<p>While the Darktrace approach to cyber security defense has shown early promise and been highly successful against recent ransomware attacks such as WannaCry, the approach using machine learning does have it\u2019s drawbacks. The largest issue Darktrace faces is to educate users. Customers that have not implemented the technology correctly have reported that it produces too many false negatives, leading IT teams to ignore the generated threat alerts. Other customers might be unable to attract the required skills to analyze threat information generated by the technology<sup>6<\/sup>. Meanwhile, Darktrace senior management seem set on not providing much help to their customers, proclaiming that they are \u201cnot a consulting firm\u201d and only provides limited support services to customers<sup>6<\/sup>.<\/p>\n<p>In order to better address the cyber security threat and skills gap in the near term, I recommend the Darktrace management team focus on building a services organization to support customers with implementation and provide \u201cexpertise as service\u201d on a subscription basis. These services could be built faster if Darktrace partner with IT services organizations to provide external parties that can handle first and second line support to customers as the cyber security services industry shifts to rely more heavily on outsourced service providers<sup>7<\/sup>. In medium term, I would recommend the management team address the user friendliness of the product they are selling. If Darktrace is able to simplify the user interface and installation of the product it would greatly increase the value proposition of the product to customers struggling to attract skilled cyber security professionals.<\/p>\n<p>Cyber security will likely be one of the most challenging issues of our time, but with a growing skills gap how can the challenge be solved? Darktrace and their approach using unsupervised machine learning in cyber security product development is likely a large step in the right direction, helping organizations leverage their IT employees and resources more efficiently through automated identification cyber security threats. However, the Darktrace technology will need to support from human judgment in the short-term and will only bridge the skills gap in the medium term if it can be translated into a user friendly platform. If Darktrace can do both of these effectively in the short and medium term, their approach to cyber security might be what enables us to protect our infrastructure from an ever-increasing sophistication from cyber criminals employing machine learning in their attacks. However, if we increasingly rely on unsupervised machine learning to protect our infrastructure, can we live with increasingly not understanding how cyber security technology works to protects us from cyber attacks? (799 words)<\/p>\n<p><strong>Sources <\/strong><\/p>\n<p><strong>\u00a0<\/strong><sup>1<\/sup>Gartner Global IT spend, Gartner, Inc., accessed November 2018.<\/p>\n<p><strong>\u00a0<\/strong><sup>2<\/sup> McKinsey, \u201cDigital and Risk: A new Posture for Cyber Security in a Networked World, March 2018, https:\/\/www.mckinsey.com\/de\/~\/media\/mckinsey\/locations\/europe%20and%20middle%20east\/deutschland\/publikationen\/2018%20compendium\/a%20new%20posture%20for%20cybersecurity%20in%20a%20networked%20world\/kompendium_03_cyberrisk-2.ashx, accessed November 2018.<strong>\u00a0<\/strong><\/p>\n<p><sup>3<\/sup> Rebecca Vogel, \u201cClosing the cyber security skills gap\u201d Salus Journal, volume 4 issue 2, (2016): 3, via Google Scholar, accessed November 2018.<\/p>\n<p><sup>4<\/sup> Cathrine Clifford, \u201cHow billion dollar start-up Darktrace is fighting cybercrime with AI\u201d CNBC, Augsut 7, 2018, [https:\/\/www.cnbc.com\/2018\/08\/07\/billion-dollar-start-up-darktrace-is-fighting-cybercrime-with-ai.html], accessed November 2018.<\/p>\n<p><sup>5 <\/sup>Darktrace, \u201cTechnology\u201d https:\/\/www.darktrace.com\/en\/technology\/#machine-learning, accessed November 2018.<\/p>\n<p><sup>6<\/sup> Ally Ram, \u201cInside Darktrace, the UK\u2019s $1.65bn cyber security start-up\u201d Financial Times, October 9, 2018, [https:\/\/www.ft.com\/content\/2fa5bade-cb09-11e8-9fe5-24ad351828ab, accessed November 2018.<\/p>\n<p><sup>7<\/sup> Guide for Managed Detection and Response Services, Gartner, Inc., accessed November 2018.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cyber security attacks growing in frequency and impact as more and more of our infrastructure is digitalized, how will we be able to secure our digital assets when there is also a growing shortage of skilled cyber security professionals? Darktrace seeks address the issue as the first company to take an unsuperviced machine learning approach to product development in cyber security by developing a defence system modelled after the human body&#8217;s immune system. <\/p>\n","protected":false},"author":11141,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","categories":[],"class_list":["post-36824","hck-submission","type-hck-submission","status-publish","hentry"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2018\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Can machine learning solve the cyber security threat? - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can machine learning solve the cyber security threat? - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"With cyber security attacks growing in frequency and impact as more and more of our infrastructure is digitalized, how will we be able to secure our digital assets when there is also a growing shortage of skilled cyber security professionals? Darktrace seeks address the issue as the first company to take an unsuperviced machine learning approach to product development in cyber security by developing a defence system modelled after the human body&#039;s immune system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-14T05:40:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/can-machine-learning-solve-the-cyber-security-threat\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/can-machine-learning-solve-the-cyber-security-threat\\\/\",\"name\":\"Can machine learning solve the cyber security threat? - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"datePublished\":\"2018-11-14T05:39:02+00:00\",\"dateModified\":\"2018-11-14T05:40:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/can-machine-learning-solve-the-cyber-security-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/can-machine-learning-solve-the-cyber-security-threat\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/can-machine-learning-solve-the-cyber-security-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Can machine learning solve the cyber security threat?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can machine learning solve the cyber security threat? - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/","og_locale":"en_US","og_type":"article","og_title":"Can machine learning solve the cyber security threat? - Technology and Operations Management","og_description":"With cyber security attacks growing in frequency and impact as more and more of our infrastructure is digitalized, how will we be able to secure our digital assets when there is also a growing shortage of skilled cyber security professionals? Darktrace seeks address the issue as the first company to take an unsuperviced machine learning approach to product development in cyber security by developing a defence system modelled after the human body's immune system.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/","og_site_name":"Technology and Operations Management","article_modified_time":"2018-11-14T05:40:37+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/","name":"Can machine learning solve the cyber security threat? - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"datePublished":"2018-11-14T05:39:02+00:00","dateModified":"2018-11-14T05:40:37+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/can-machine-learning-solve-the-cyber-security-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Can machine learning solve the cyber security threat?"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/36824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/11141"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=36824"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/36824\/revisions"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=36824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=36824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}