Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development , Security Operations

Taking an AI-First Approach to Securing Your Organization

Tom Corn of Ontinue on Using AI to Achieve Speed, Scale and Consistency of Security
Taking an AI-First Approach to Securing Your Organization
Tom Corn, chief product officer, Ontinue

This podcast was recorded on May 7, 2024.

Securing an organization often requires making fast decisions, said Tom Corn of the productized managed service company Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. AI helps you understand your environment better so you can prioritize your response to a security incident, he said.

But embracing AI and learning to operationalize an AI-first security approach take time, Corn said. So, he encourages companies to embrace AI as soon as possible, to avoid being left behind.

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Corn also discussed:

  • Limiting the use of Tier 1 and some Tier 2 analysts in the SOC and using Tier 3 analysts to be "the human in the loop" and to "tune and train the models";
  • The need for a "feedback loop for quality on the kinds of responses you're getting from AI";
  • Considering the governance and transparency of your AI program.

Corn drives the vision and development of Ontinue solutions. He oversees product management, product marketing, engineering, and security operations center and manages the advisory and technical account managers. Prior to Ontinue, Corn was the chief product officer at Open Systems. Before that, he was senior vice president in VMware's Security Business Unit and served as general manager of RSA's Data Security Business Unit and as CTO at RSA. He has more than 20 years of experience in cybersecurity.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.