{"id":8224,"date":"2026-05-21T07:00:00","date_gmt":"2026-05-21T07:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=8224"},"modified":"2026-05-21T07:00:00","modified_gmt":"2026-05-21T07:00:00","slug":"ai-becoming-an-soc-imperative-for-curtailing-emerging-cyber-threats","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=8224","title":{"rendered":"AI becoming an SOC imperative for curtailing emerging cyber threats"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>The cybersecurity profession is on the verge of a sea change, and security pros must begin to master AI tools to combat emerging threats by building more autonomous, real-time protections.<\/p>\n<p>Expert panelists at a recent DTX conference session in Manchester, titled \u201c<a href=\"https:\/\/www.dtxevents.io\/manchester-line-up\/agenda#\/seminars\/panel-discussion-bot-vs-bot-surviving-the-era-of-autonomous-cyber-warfare\">Bot vs Bot: Surviving the Era of Autonomous Cyber Warfare<\/a>,\u201d highlighted how bringing AI into the security stack without weakening security fundamentals as become a security operations centre (SOC) essential. They also stressed the importance of maintaining human oversight over such systems.<\/p>\n<p>While powerful, AI technologies are no panacea for immature enterprise security architectures, and they can only be applied successfully after the fundamentals of cyber defence are well covered, multiple security practitioner panellists argued. This ground layer, they said, includes system hardening, patching, access control, monitoring, and the like.<\/p>\n<p>Darren Kimuli, information security lead at reinsurance firm Canopius Group, told delegates that AI deployments need to match the expectations of the business \u2014 including how an organisation meets its regulatory obligations.<\/p>\n<p>\u201cI\u2019m more concerned about what AI fits rather than what it replaces,\u201d Kimuli said.<\/p>\n<h2 class=\"wp-block-heading\">Changing roles<\/h2>\n<p>Divine Uzodinma, cybersecurity analyst at managed services and telecom vendor Radius, said AI systems help security analysts correlate and triage security logs, a traditionally labour-intensive task.<\/p>\n<p>\u201cAI can analyse and correlate logs and triage alerts while analysts continue with their investigation,\u201d Uzodinma said.<\/p>\n<p>Muhammad Khan, head of cybersecurity at Bridgewater Finance Group, added that AI-based security tools minimise alert fatigue \u2014 a <a href=\"https:\/\/www.csoonline.com\/article\/574551\/evolving-cyberattacks-alert-fatigue-creating-dfir-burnout-regulatory-risk.html\">perennial problem in the industry<\/a> and a leading cause of staff burnout.<\/p>\n<p>The more widespread use of AI systems has meant that the role of security analysts has evolved beyond monitoring and response to \u201cvalidating inputs\u201d and assessing the risk of AI model hallucination.<\/p>\n<p>Enterprises need to test the resilience of AI-based security systems against modern attack paths, such as those found waged against applications and the cloud, as well as supplier access and phishing, according to cybersecurity consultancy Secarma.<\/p>\n<p>George Rees, senior cybersecurity consultant at Secarma, noted that AI is already redefining cyber rules in areas such as risk management and resilience.<\/p>\n<h2 class=\"wp-block-heading\">Cyber battle ground redrawn<\/h2>\n<p>The DTX conference panel also discussed how autonomous attacker tooling is changing the threat landscape.<\/p>\n<p>The enterprise threat environment is evolving into a machine-versus-machine battle ground, meaning that CISOs and other security professionals need to drive change across their organizations or risk becoming hopelessly outflanked by adversaries who are making <a href=\"https:\/\/www.csoonline.com\/article\/3819176\/top-5-ways-attackers-use-generative-ai-to-exploit-your-systems.html\">greater use of AI technologies to mount attacks<\/a>.<\/p>\n<p>Moreover, there needs to be clarity on cyber team roles and oversight when automation is used to make decisions.<\/p>\n<p>Cyber job roles must be redefined to ensure humans can interpret and oversee autonomous security decisions, according to the panellists.<\/p>\n<p>These changing roles mean that skills such as prompt engineering and risk analysis are becoming more important for security professionals and hiring managers, according to Rees.<\/p>\n<p>\u201cAI is creating opportunities for more GRC [governance, risk, and compliance] hires\u201d because the skillset is well-suited to the new threat environment, Rees added.<\/p>\n<p>Rees compared the scope and pace of change heralded by AI to the period in the 1970s and 1980s when enterprises moved from reliance on typewriters to running a business using computers.<\/p>\n<p>The discussion was timely because enterprises are increasingly dealing with AI-accelerated reconnaissance, <a href=\"https:\/\/www.csoonline.com\/article\/3850783\/11-ways-cybercriminals-are-making-phishing-more-potent-than-ever.html\">phishing<\/a>, and <a href=\"https:\/\/www.csoonline.com\/article\/4169046\/google-discovers-weaponized-zero-day-exploits-created-with-ai.html\">malware development<\/a> rather than purely human-led attacks.<\/p>\n<p>The debate has moved from whether to use AI in security to how to use it safely without losing oversight and control. Many of the responses by the DTX conference panellists showed an evolution in thinking since CSO <a href=\"https:\/\/www.csoonline.com\/article\/4054301\/cisos-grapple-with-the-realities-of-applying-ai-to-security-functions.html\">polled security practitioners they are applying AI for security functions<\/a> last September.<\/p>\n<h2 class=\"wp-block-heading\">Lessons from Microsoft\u2019s war against scammers<\/h2>\n<p>Kelly Bissell, a former corporate VP of product abuse and risk at Microsoft, who gave a keynote on cyber resilience and AI at the start of the DTX conference, told CSO after the show that an arms race is under way between cybersecurity professionals and attackers.<\/p>\n<p>\u201cEarly adopters \u2014 in general \u2014 have the advantage,\u201d Bissell said.<\/p>\n<p>Here, according to Bissell, cybersecurity attackers gain an upper hand because they can ignore rules and regulations such as privacy laws, but defenders can claw back an edge on other fronts.<\/p>\n<p>\u201cBecause of the scale of data we handled at Microsoft we could use machine learning techniques to see behavioural trends,\u201d Bissell explained.<\/p>\n<p>For example, Microsoft developed a neural network that was capable of identifying <a href=\"https:\/\/www.csoonline.com\/article\/570173\/what-is-typosquatting-a-simple-but-effective-attack-technique.html\">typosquatted domains<\/a> being set up prior to impersonation attacks with very low false positive rates. \u201cOur mission was to apply pressure to bot gangs\u201d and frustrate their activity, Bissell said.<\/p>\n<p>According to Bissell, CISOs fall into one of three camps: compliance-orientated, package-focused, or elite practitioners.<\/p>\n<p>\u201cElite practitioners will love to use AI to improve their operations,\u201d said Bissell, adding that AI technologies should be introduced through a process akin to a software development life cycle with extensive pen testing and guardrails prior to being left anywhere near production systems.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The cybersecurity profession is on the verge of a sea change, and security pros must begin to master AI tools to combat emerging threats by building more autonomous, real-time protections. Expert panelists at a recent DTX conference session in Manchester, titled \u201cBot vs Bot: Surviving the Era of Autonomous Cyber Warfare,\u201d highlighted how bringing AI [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":8225,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-8224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/8224"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8224"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/8224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/8225"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}