Q1. Trend Micro's most recent Cyber Risk Index showed that most organizations expect a successful cyberattack in the coming year, though overall cyber-risk itself has declined. Why do you think that might be the case? What's behind the elevated concerns among organizations over cyberattacks?
The Cyber Risk Index (CRI) uses a variety of factors to determine the overall risk score. In the latest edition, while the global score improved to +0.01 and into the “Moderate” range, some areas continue to be of concern. One of these is the expectation of a breach by respondents – although that, too, has improved from 85% to 78%. Over the past few years, this number has hovered around 80%, likely due to respondents believing that breaches are a matter of “when,” not “if.” Malicious actors have time on their hands and can use numerous tactics to gain access to a target network. This emphasizes the importance of identifying breaches as quickly as possible in order to respond effectively. We hope to see the cyber preparedness index component continue to improve and contribute to greater success in incident detection and response.
Q2. How does Trend Micro plan on leveraging artificial intelligence and machine language in its products? Where do you see the biggest opportunities for AI and ML to make a difference in cybersecurity?
Say hello to Companion! Trend is leveraging generative AI and LLM technology to fundamentally improve the analyst experience. Time is the most valuable currency for defenders. Our approach accelerates daily workflows, improves mean-time-to-understand, and supercharges threat hunting activities to enable analysts to get in front of adversarial activity before a breach can occur.
Users benefit from an always-on assistant, plain-language explanation and exploration of alerts, contextual AI-driven recommendations on mitigation actions, as well as automation of email, help-desk ticketing, and incident reporting communication.
- Transform plain-language search queries into formal syntax to rapidly generate and execute queries and pinpoint threat activity with speed and accuracy.
- Rapidly understand the context and scope of “Living off the Land” attacks with Script Investigation Assist
- Gain visibility and control over employee use of AI tools with data loss detection and AI application visibility and monitoring
Companion provides immediate time-to-value and support to security organizations, but the power of generative AI goes beyond assistants. Custom recommendations and automation of risk remediation and threat response unique to the profile and risk thresholds associated with the customer environment present one of the largest opportunities for AI and ML to make a difference. This is inclusive of predictive and continuously updated modeling to better anticipate risks proactively.
Trend is uniquely positioned to deliver the leading AI experience due to the sophistication, breadth, and leadership of our platform — which is the only offering to combine proactive cyber risk management and quantification with the number one XDR solution on the market today. Our dedication to enabling proactive security strategies means our customers are better protected against existing and new and emerging threat activity, tactics, and campaigns including BEC, data disruption, extortionware, ransomware, and more.
The generative AI innovation Trend is introducing to its Vision One platform in 2023 builds on our near 20-year history of leadership in AI and ML technologies embedded within our protection, detection, and response portfolio including cloud app anti-spam, ransomware detection, data stacking correlation, executive profiling and impersonation, and AI-driven phishing detection.
Q3. If there's one thing you would want customers to take away from Trend Micro's participation at Black Hat USA 2023, what would it be?
We remain committed to staying ahead of threats without leaving customers behind. Our hybrid platform is stronger than ever and protects hundreds of thousands of organizations worldwide across clouds, networks, devices, and endpoints.