Steven Scheurmann, Regional Vice President for ASEAN at Palo Alto Networks, delivers his keynote speech about Cybersecurity in the Age of AI. |
State of Cybersecurity in the Philippines
As one of ASEAN's fastest-growing digital economies, the Philippines faces significant vulnerability to evolving cyberthreats such as ransomware and AI-driven attacks. Palo Alto Networks' recent research revealed manufacturing as the most targeted industry for ransomware attacks in ASEAN, primarily due to limited system visibility and inadequate network monitoring. This trend resonates with Filipino organizations using operations technology systems, where 76.5% experienced attacks in the past year – based on Palo Alto
Networks’ State of OT Security report. Additionally, 70.6% of these organizations are concerned with AI-enabled attacks.
In his keynote address, Steven Scheurmann, Regional Vice President of ASEAN at Palo Alto Networks, touched on the rise of AI and its impact on business transformation. He shared, “2023 is a breakthrough year for AI and it is transforming the enterprise. However, adversaries are also exploiting the power of AI to accelerate, scale and innovate its attacks. With its high Internet penetration rate and use of multi-devices, enterprises in the Philippines are highly susceptible to attacks. To overcome this, Filipino organizations need to build on the strengths of AI to be more secure and provide better visibility and automation into its security processes.”
With the rise of AI-powered threats, Palo Alto Networks has introduced Precision AI™, which incorporates machine learning (ML) and deep learning (DL) with generative AI (GenAI) for real-time applications, to defend against AI-supported threat tactics. Precision AI is integrated across Palo Alto Networks’ platforms Strata™, Prisma®, and Cortex® to provide enhanced capabilities for organizations.
DSWD Partners with Palo Alto Networks for AI-Powered Cybersecurity
In a briefing with local press members, Assistant Secretary Julius Gorospe, CIO of Department of Social Welfare and Development (DSWD), who was also present at the event today, elaborated on how DSWD is safeguarding its digital infrastructure with AI-powered solutions as part of its Digital Transformation (DX) initiative.DSWD faced security challenges with fragmented cybersecurity measures, server outages leading to operational disruption, and absence of comprehensive incident response playbooks. These issues expanded the attack surface for DSWD, having limited visibility in assessing suspicious network activities and increasing the risk of data breaches due to slower incident response times and inadequate planning.
Partnering with Palo Alto Networks, DSWD leveraged its Unit 42 Incident Response (IR) services to evolve its cybersecurity posture and proactively prevent future threats. The organization also leveraged Palo Alto Networks’ AI-driven solutions like Cortex XSIAM and Cortex XDR to enhance protection and efficiency, and empower its security operations to effectively combat threats.
Counter AI Attacks with AI Defence
The role of AI in cyberattacks and defense is expected to grow even further. Threat actors will continue to refine their AI-driven attack techniques, demanding constant innovation in cybersecurity strategies. To stay ahead of AI-driven threats, organizations should prioritize the following recommendations :
• Invest in AI-powered cybersecurity solutions: Organizations should allocate resources to implement AI-powered defense systems that can adapt to evolving threats in real time.
• Collaborate and share threat intelligence: Sharing threat intelligence with industry peers and security communities can enhance collective defense against AI-driven attacks.
• Foster a culture of cybersecurity awareness: Educating employees about the risks and best practices related to AI-driven cyberattacks can strengthen the organization’s overall security posture.
• Stay updated with evolving AI technologies: Organizations should remain informed about emerging AI technologies and their potential applications in both offensive and defensive cybersecurity efforts. (Press Release)
No comments:
Post a Comment