The Misunderstood Security Risks of Behavior Analytics, AI & ML

By separating the hype from reality, the risks of relying on AI and ML to identify security threats become clear.

Rita Gurevich, CEO & Founder, SPHERE

August 9, 2021

4 Min Read
Conceptual technology illustration of artificial intelligence
kras99 via Adobe Stock

If you believe the hype, artificial intelligence (AI) and machine learning (ML) already play a vital role in securing the modern IT infrastructure. The truth is these are powerful but often misunderstood tools that, in some cases, can actually compromise a company's data security if not implemented correctly.

In many instances, "AI" is overused marketing jargon that doesn't accurately describe the technology in place, which falls short of true artificial intelligence. So-called "AI platforms" can leave CIOs scratching their heads wondering how it is possible to learn behaviors for each individual customer in a massive and growing customer database, or whether the platform is making educated guesses based on an algorithm. It can be difficult to tell the difference between real AI and standard fixed logic.

With cloud applications like Microsoft Teams, SharePoint, Microsoft 365, Google Drive, and more, end users — rather than an administrator — are allowed to define who can access files and folders. While this is very convenient for end users, it makes it nearly impossible to control access to company data in a standardized way that conforms to policy — because everyone can change permissions. The only way to really manage this problem would be some type of automated solution or crowdsourcing of access reviews across an organization.

Most organizations have such a high volume of data in their environment that many try to use AI as an automated solution to find and review access to only sensitive data. This saves users from being bombarded with reviewing millions of files tied to their permissions; instead, these solutions show only the subset (still possibly thousands) of files where permissions should be controlled. This seems sensible; however, it ignores any data that doesn't follow the patterns the algorithms are looking for and often generates false positives.

Three Problems Using AI for Behavior Analytics
The reality is there is no true AI solution in the current market for behavior analytics. True AI works by creating randomly generated algorithms and testing them against a large set of "correct" answers to find which algorithms work best. This brings up three important issues while using AI for behavior analytics.

1. No company has a large enough set of customer data to train an algorithm on. Even if they did, companies would not want to expose that information, as it would make them a huge attack vector for hackers.

2. Each customer is unique, so even if they could train their algorithms on their customer's data, it wouldn't necessarily work for their specific business.

3. If you train an algorithm on a customer-by-customer basis, you would be training the algorithm on your current system. This is great if you're already in an ideal state; if not, it will perpetuate any existing security issues.

Cloud and Remote Work Add Challenges
From a security perspective, cloud adoption has all sorts of data challenges, increased by employees working from home. They represent a growing base of end users suddenly granted access to increasing amounts of data.

Most employees without specific training are unaware of where the cloud begins and ends, leaving room for unintentional violations of company security policies. This is becoming a very common internal security threat for companies, especially when databases are programmed to use AI to prune data access. If not used properly, there are often serious vulnerabilities in this type of access.

Many companies claim to use AI to monitor and improve their data access. It is not generally used to sort or distribute data, as many assume AI can do. AI is most securely used as access controls for databases.

Blind Trust in AI Is Risky
Governing and securing data is as critical as ever, especially as remote- and hybrid-work trends continue. While AI and ML are powerful tools, companies need to understand whether they are leveraging the true technology or something in a clever wrapper that may not be up to the security task.

These technologies cannot be implemented in a vacuum, and businesses need to take decisive steps to mitigate critical security risks, such as employee training and governed access to ensure their data is secured. At the end of the day, AI is like any other computer program — bad data in, bad data out — where you move data from one place to another. With customer databases as large as they are and security violations unintentionally made by employees, it is critical to have a human component available to check the results, as risks lie in trusting AI blindly.

About the Author(s)

Rita Gurevich

CEO & Founder, SPHERE

Rita Gurevich is the CEO and founder of SPHERE, leading the strategic growth and vision for the organization.

Rita began her career at Lehman Brothers and helped oversee the distribution of technology assets after their bankruptcy in 2008. From this, Rita gained a deep understanding in analyzing identities, data platforms, and overall application and system landscape that had to be distributed across all the buying entities. At the same time, the enhanced regulatory environment focusing on protecting data from misuse, forced large enterprises to manage and control access more proactively across their on-premises and cloud environments.

With this knowledge, Gurevich founded SPHERE, an identity hygiene organization that provides critical discovery, security and compliance solutions centered around identity security and access control problems that organizations face. The company has developed a repeatable and effective approach to automating the discovery, remediation, and management of access controls across any scope. Rita has overseen the growth of SPHERE into a leading software company providing its clients with the only end-to-end identity hygiene solution available today.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights