Talisai ACCOUNTABLE AI FOR COMPREHENSIVE INSIDER THREAT RISK MANAGEMENT - SECURITY AUTOMATION

Page created by Clyde Ortega
 
CONTINUE READING
Talisai ACCOUNTABLE AI FOR COMPREHENSIVE INSIDER THREAT RISK MANAGEMENT - SECURITY AUTOMATION
WWW.ENTERPRISESECURITYMAG.COM   ISSN 2691-4034            DECEMBER - 21 - 2020

  SECURITY
 AUTOMATION
    EDITION

Talisai
                                                 JOONHO LEE,
                                                 CO-FOUNDER AND CEO

 ACCOUNTABLE AI
 FOR COMPREHENSIVE
 INSIDER THREAT                                                           $15

 RISK MANAGEMENT
Talisai ACCOUNTABLE AI FOR COMPREHENSIVE INSIDER THREAT RISK MANAGEMENT - SECURITY AUTOMATION
Talisai
                                                                                                                                                                  TOP 10
                                                                                                                                          SECURITY AUTOMATION
                                                                                                                                          SOLUTION PROVIDERS - 2020
S T O R Y

               ACCOUNTABLE AI
C O V E R

               FOR COMPREHENSIVE                                                                                                             JOONHO LEE,
                                                                                                                                             CO-FOUNDER AND CEO

               INSIDER THREAT
               RISK MANAGEMENT
               By Russell Thomas

            ”I
                             ’ll be back.” For any sci-fi movie buff, this   errors created by Black Boxes can compound and
                             catchphrase by Arnold Schwarzenegger            ultimately impact ROI alongsidecreating untraceable
                             will always be eternal—immediately              regulatory violations or escalated business risk. Itthen
                             bringing back the memory of The                 becomes crucial for companies to address the lack of
            Terminator movie. Despite the incredible promise                 traceability, visibility, and accountability in ADA and AI
            that Artificial Intelligence (AI) holds, the film opens          with a governance framework that ensures reliable and
            the audience’s eyes to the havoc caused when AI goes             explainable results. While the necessity of “intelligence”
            wrong. Although the idea of a highly-advanced AI                 for artificial intelligence has become crucial, deploying
            robot, with living tissue over a metal endoskeleton,             the same is no easy feat. For long, many companies
            programmed to find and kill somebody might seem                  have been digging deep to find an ideal solution that
            light-years ahead of its time, it makes one wonder               can unlock the Black Box and delve into the rationale of
            and question AI’s accountability. This concern further           AI-based decisions and recommendations. It was not
            becomes paramount today, considering that the                    until recently that an apt solution to this long-standing
            proliferation of AI, machine learning (ML), and Advanced         challenge came to the fore. Founded in 2018, California-
            Data Analytics (ADA) have taken the center-stage in              based Talisai has introduced a game-changing real-time
            global enterprises to generate machine-based/data-               AI and data analytics oversight platform that bridges
            driven decisions.                                                the gap between the promises of AI and its accountable
                While ADA and AI, coupled with large volumes                 execution. “We started the company as we wanted
            of relevant data, are designed to perform discrete               the machine-driven decisions to be accountable. By
            and measurable tasks that benefit organizations, the             blending in the aspect of explainability and transparency
            algorithms themselves are typically opaque “Black                of machine-based decisions, we support our clients to
            Boxes” of complex code that does not translate easily            improve their decision-making processes,” says Joonho
            to business-level understanding. The “unknown”                   Lee and Jonathan Heigel, Co-Founders at Talisai.
Talisai ACCOUNTABLE AI FOR COMPREHENSIVE INSIDER THREAT RISK MANAGEMENT - SECURITY AUTOMATION
The Difference that AI                     and audit ADA/AI models, relationship        The first step to building such a
Accountability Makes                       to data, and business performance. The       program is to understand that the
The core objectives of AI transparency     solution provides oversight through          costliest and most challenging threats
and accountability in Talisai’s platform   a two-pronged approach: bottom-up            come from an unexpected source:
are set with the goal of optimizing        from the data layer and top-down from        trusted yet rogue insiders including
integration between human-driven           the business process layer.                  vendors and contractors. Along the
processes and data-driven intelligence.                                                 same lines, it is crucial to consider that
The platform provides independent,         A Renewed Approach to                        human capital and supply chains are the
real-time supervision of the algorithms,   Insider Threat Prevention                    most significant asset for a company.
data, and business processes as            While AI governance and accountability       Be it risks posed to the people or by
they are developed, integrated, and        hold tremendous potential across             the people, the stakes are really high.
deployed. It empowers enterprises          various sectors, Talisai has distilled its   The ongoing COVID-19 pandemic has
to manage algorithmic and data risk        concept of ADA/AI oversight into the         further aggravated the situation by
with automatic traceability, real-time     domain of insider threat prevention          triggering a fresh wave of
monitoring and alerts, and forensics,      and people risk management. Efficient        cybersecurity threats, making cyber
transforming the Black Box into a core     insider threat mitigation must inculcate     risk management more important
trusted business asset.                    accountability with explainable and          than ever. Throughout the pandemic,
    By offering a vital ADA/AI oversight   retraceable results for further action.      once-trusted employees with physical
framework, systemic replay capability           Companies today need to deploy          security controls succumbed to the
with explanations, Talisai allows its      risk mitigation programs that are as         immense stresses and heightened
clients to dynamically view, understand    sophisticated as the crimes themselves.      anxieties of the moment, leading to
                                                                                        high-profile insider threat situations. As
                                                                                        a matter of fact, the statistics relative
                                                                                        to risks of insider threats are dismal, as
                                                                                        an estimated 75 percent of employees
                                                                                        have stolen at least twice from their
                                                                                        employer, and an estimated 34 percent
                                                                                        of data breaches are orchestrated by         threats posed by rogue insiders with             In addition to AI-monitoring, the
                                                                                        rogue insiders. The costs are too high       their new, state-of-the-art AI tool:         broader suite of Polaris and Talisai’s
                                                                                        to blindly trust the employee base,          “People at Potential Risk,” or PAPR.         offering includes background screenings,        By blending in
                                                                                                                                         Stephen Ward, CEO at Polaris             cyber monitoring and analytics, site
                                                                                        especially when the average data
                                                                                        breach costs $8.19 million.                  Corporate Risk explains, “Often, despite     inspections and assessments, data
                                                                                                                                                                                                                                   the aspect of
                                                                                             Be it good-faith mistakes or sheer      multi-layered security frameworks,           forensics, dark web monitoring, incident      explainability and
                                                                                                                                     companies fail to sharpen their focus        response, and remediation alongside
                                                                                        negligence, the impact on business
                                                                                                                                     on insiders, considering the inherent        investigations.
                                                                                                                                                                                                                                 transparency of
                                                                                        invariably remains the same. As
                                                                                        modern threats integrate all possible        ‘trust’ bias around insider threats, which                                                   machine-based
                                                                                        attack vectors, including insiders,          often leads to ineffective detection and     Adopting a Proactive Approach                    decisions, we
                                                                                        business processes, supply chains,           significant impact.”                         to Mitigating Human Capital
                                                                                        and even cultural aspects, companies             As a cutting-edge AI tool, PAPR          Risk                                          support our clients
                                                                                        need to change the traditional siloed        marries Polaris’ industry-leading            The PAPR solution integrates and               to improve their
                                                                                        approach to risk management for              security and investigative strategies        analyzes surveillance data from
                                                                                        ensuring business continuity and             with Talisai’s revolutionary machine-        five key pillars of enterprise risk:           decision-making
                                                                                        resiliency.                                  learning capabilities to successfully        communications, business transactions,             processes
                                                                                             To this end, Talisai has teamed         identify and mitigate potential threats      corporate records, employees, and
                                                                                        up with Polaris Corporate Risk               with automated evidence chains. With         customers. It then executes a set of
                                                                                        Management—an industry leader                this strategic partnership, Polaris Risk     behavior analytic algorithms against          events. It even provides a full evidence
                                                                                        in the corporate risk management             and Talisai aim to help organizations        this data, resulting in an explainable list   chain, forensically explaining the
                                                                                        space with over 50 years of global           prevent, monitor, and respond to the         of people at potential risk before an         rationale for each individual’s selection.
                                                                                        security and investigations experience.      various forms of insider threats, offering   incident can even occur. Few, if any, risk    Consequently, this drastically improves
  JONATHAN HEIGEL,                                                                      The companies have aligned                   comprehensive services that can be           management solution providers offer           the productivity of cybersecurity
  CO-FOUNDER AND COO                                                                    their investigative, analytical, and         deployed fully or incrementally based on     insider threat tools so proactive, despite    analysts and investigators, as well as
                                                                                        technological expertise to address           an organization’s specific needs.            the inherent urgency of internal threat       compliance and audit personnel.
Talisai ACCOUNTABLE AI FOR COMPREHENSIVE INSIDER THREAT RISK MANAGEMENT - SECURITY AUTOMATION
The solution leverages both
ML-based AI algorithms and analyst-
designed deterministic algorithms to
continually self-monitor, cross-check,
train, and enhance the automated
analysis. This approach strategically
aligns with the corporate shift from                                                                                                   WWW.ENTERPRISESECURITYMAG.COM                                                DECEMBER - 21 - 2020
point-in-time risk assessment to real-
time risk management. It also enables
companies to monitor possible biases,
as well as unexpected data velocity
and volumes that generate unintended
anomalies before its results impacting
                                                                                                                                                                                                                        Talisai
business. Proactivity and prevention                                                                                                                                                                                    TOP
                                                                                                                                                                                                                        SECURITY
have become the primary objective
when managing insider threats. In doing

                                                                                                                                                                                                                        AUTOMATION
so, most of today’s solutions face two

                                                                                                                                                                                                                        Solution Providers
     Every second                                                                                                                                                                                                       2020
    matters during                                                                                                                                                                                                      Recognized by
   cyber breach or
                                                STEPHEN WARD,
    leak scenarios,                             CEO, POLARIS CORPORATE RISK
   and through our
 solution, we ensure                        from supply chain, travel procedures to       services and healthcare, leverage
     that no time is                        pandemic response planning. Though            Talisai’sservices today.

                                                                                                                                                           Talisai
 wasted between an                          PAPR is designed to address insider                For example, Talisai has been
                                            threats, it also provides comprehensive       effectively helping its clients in the
  early indication of                       and location-specific travel security         healthcare sector with the explainable
  potential incident                        coverage, international executive             AI analytics during the COVID-19 severity.
                                            protection, improves external threat          With its core AI and data analytics
 and actual incident                        and supply chain risk monitoring, and         oversight platform, Talisai also improves
       detection                            effectively manages foreign facilities        risk management tool for individuals
                                            and situational risk, alongside pandemic      covering weather, social unrest, and
                                            training and contingency plans.               cyber-espionage successfully. The
key barriers: a lack of data transparency                                                 company aims to further build more                                                      TOP
and a lack of analytical expertise—PAPR
offers both. “We offer a probabilistic
                                            Solving Problems at the Core
                                            Talisai offers its services with a range of
                                                                                          vertical data and models to support
                                                                                          large companies focusing on not                                                         SECURITY
risk assessment on an ongoing basis.
Every second matters during cyber
                                            installation options, both on cloud and
                                            on-premise, depending on its customers’
                                                                                          only their individuals but also supply
                                                                                          chains. Not just this, considering that
                                                                                                                                                                                  AUTOMATION
                                                                                                                                                                                  Solution Providers
breach or leak scenarios, and through       needs. Unlike traditional user-behavior       digital banking and digital assets such                                                 2020
our solution, we ensure that no time        analytics products, Talisai’s solution is     as cryptocurrencies are increasingly
                                                                                                                                                                                  Recognized by
is wasted between an early indication       much more pragmatic and provides an           being adopted in the financial services
of potential risk and actual incident       immediate return on investment with           industry, which amplifies the risk of
detection,” says Lee and Ward.              automated governance over AI and data         money laundering, Talisai plans to
     While accounting for rogue insiders
is vital, every facet of a company’s risk
                                                 As a result, companies across a wide
                                            range of market segments, including
                                                                                          expand its platform’s capabilities
                                                                                          to bolster anti-Money Laundering
                                                                                                                                            The annual listing of 10 companies that are at the forefront of providing
profile is affected by its personnel,       highly-regulated industries like financial    measures. ES                                         Security Automation solutions and impacting the marketplace
Talisai ACCOUNTABLE AI FOR COMPREHENSIVE INSIDER THREAT RISK MANAGEMENT - SECURITY AUTOMATION
You can also read