Is your network context-aware? Machine learning can help. Credit: Thinkstock What is your number one priority? Imagine if the CIO’s job could be described with that kind of clarity. Well, as a matter of fact, it can be. Corporate boards and the c-suite may not spend too much time thinking about information systems (unless they are an information systems company) but one thing they definitely think about, and indeed fret about, is security breaches and the persistence of cyber threats. Regardless of whether your organization has a chief information security officer (CISO), your top priority as CIO is to protect your organization. What follows is one approach to consider for safeguarding enterprise knowledge. What is your number one priority? Imagine if the CIO’s job could be described with that kind of clarity. Well, as a matter of fact, it can be. Corporate boards and the c-suite may not spend too much time thinking about information systems (unless they are an information systems company) but one thing they definitely think about, and indeed fret about, is security breaches and the persistence of cyber threats. Regardless of whether your organization has a chief information security officer (CISO), your top priority as CIO is to protect your organization. What follows is one approach to consider for safeguarding enterprise knowledge. Playing the gating game in jail A gating game is typically a contest of strategy or adventure in which participants can only proceed by solving a puzzle. Gamers must discover an artifact that unlocks a doorway or solve a riddle that reveals a pathway to the next stage. Gamers often consider this challenge a measure of their intellectual acumen and will spend hours, and indeed days, to overcome the impasse. The idea of partitioning an area of interest and controlling flow with logical, if not physical, gates rings true in security. At the risk of suggesting a callous metaphor, a correctional facility manages the flow of inmates and personnel by granting section access in real time according to perceived conditions. Certain behaviors trigger a sequence of events that confine any possible danger by locking out the appropriate sectors. A smart CIO could combine these two concepts to create a security system based on behavioral awareness and problem solving. It’s not zero trust, it’s zero effort Below is a basic outline of an email system containing a network of senders and receivers along with accompanying client-server pairs. The green boxes represent users, sending and receiving emails. The yellow bidirectional arrows depict the act of authenticating and interacting with the email client. The blue boxes represent the email client-server systems supporting these users and the blue arrows represent the interconnections in that system (note: dark blue delineates network and computing resources at the disposal of the enterprise). Adib C. Ghubril Once past the yellow arrows, a malevolent bot could essentially have its way throughout the network. And that’s what happens within an organization. Virus detection running on servers can zero-in on a problematic client, whereby the user associated with that hardware resource is dutifully informed and trained on the vagaries of social engineering, if not admonished. Creating context-aware systems But can the server develop a behavioral profile for each client and subsequently shut things down judiciously? What if an organization server treats every client as a user and issues authentication requests at some nominal cadence? Conversely, what if every client creates a profile of interactions with its server and with its user. Given the copious amounts of data exchanged, a machine learning algorithm running on both client and server could certainly make informed decisions about the level of cyber threat to the system. Adib C. Ghubril With more decision gates introduced into the network (graded coloring of the dark blue client-server network depicts on-board artificial intelligence), the area in which a virus or antagonist can freely overrun is very much reduced. This is not just a round-about way of suggesting that machine learning algorithms should be introduced in security but, rather, a recommendation to make your system components more aware of the context they operate under to improve their autonomous decision-making, using whatever means at your disposal. Related content brandpost Sponsored by SAP What goes well with Viña Concha y Toro wines? Meat, fish, poultry, and SAP Viña Concha y Toro, a wine producer that distributes to more than 140 countries worldwide, paired its operation with the SAP Business Technology Platform to enhance its operation and product. By Tom Caldecott, SAP Contributor Dec 04, 2023 4 mins Digital Transformation brandpost Sponsored by Azul How to maximize ROI by choosing the right Java partner for your organization Choosing the right Java provider is a critical decision that can have a significant impact on your organization’s success. By asking the right questions and considering the total cost of ownership, you can ensure that you choose the best Java p By Scott Sellers Dec 04, 2023 5 mins Application Management brandpost Sponsored by DataStax Ask yourself: How can genAI put your content to work? Generative AI applications can readily be built against the documents, emails, meeting transcripts, and other content that knowledge workers produce as a matter of course. By Bryan Kirschner Dec 04, 2023 5 mins Machine Learning Artificial Intelligence feature The CIO’s new role: Orchestrator-in-chief CIOs have unique insight into everything that happens in a company. Some are using that insight to take on a more strategic role. By Minda Zetlin Dec 04, 2023 12 mins CIO C-Suite Business IT Alignment Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe