You are on page 1of 15

The CISO’s Guide

to Generative AI
Opportunities, outcomes, and the urgency of now
© 2024. For information, contact Deloitte Global.
2

True or false? Generative AI can help:


• Unlock new opportunity and value in an organization’s cybersecurity approach.

• Reduce costs and supercharge generation of reporting and intelligence products.

• Rapidly protect against sophisticated phishing attacks.

• Guide organizations in identifying critical information based on past actions.

• Make sense of regulatory and compliance guidance.

• Build a cybersecurity road map for now and the future.

If your answers were all true, then you’re thinking correctly


about this powerful technology.

Read on for more on how Generative AI can help transform


your organization’s cybersecurity approach.

© 2024. For information, contact Deloitte Global.


3

Generative AI is here.
What can it do for you?
The Generative AI (Gen AI) buzz is everywhere. People are
wondering what this new artificial intelligence (AI) can do for their
organizations, their data, and their security. It’s a complex question
that defies an easy answer.

Gen AI is a subset of AI in which machines create But while cyber events have long since eclipsed
new content in the form of text, code, voice, the capabilities of a traditional human security
images, videos, and processes. The technology may operations center, AI is deeply impactful in
truly revolutionize work and life. When it comes enhancements to cyber infrastructure and
to cybersecurity, Gen AI holds promise for both detect-and-respond capabilities. Deep learning
organizations and governments that need to protect models are well suited to detecting attacks.
themselves, create tools to automate reporting and
intelligence, reduce costs, grow more efficiently, sort But cyber leaders may still wonder: While AI has
through the varied and ever-changing regulatory increased our defense capabilities and postures,
atmosphere, and so much more. could Gen AI take us even further? How could
it be used to limit blast radiuses of attacks,
Gen AI can also provide new tools for bad actors protect against data loss, and expand our threat
who want nothing more than to leverage these response capabilities within budget and on time?
powerful technologies for negative outcomes In other words, can it help us get ahead—
and their own gain. Cyberattacks continue to and stay ahead—of attackers?
increase in both volume and tactics: in fact, more
than 90% of respondents to the Deloitte Global
2023 Future of Cyber survey reported at least
one compromise.

© 2024. For information, contact Deloitte Global.


4

GENERATIVE AI IS HERE. WHAT CAN IT DO FOR YOU?

Gen AI can do each of those things—and it holds To unlock the potential of Gen AI, cyber leaders
so much promise for better cyber outcomes for should first understand where it can help, the
organizations seeking out and defending against types of data it needs, and how to develop a plan
breaches. It’s fast and reasoned and can process of action that includes considerations for safety,
more knowledge than any one human can. It resilience, and trustworthiness.
has the potential to reduce costs, supercharge
security investigations, and speed up third-party Two things to remember: This is an evolution
risk assessments. of AI, not a net-new concept, and adoption plans
and risk management constructs can be
While more established AI capabilities (such as evolved accordingly. And like any true evolution,
machine and deep learning) can identify patterns these are long-term transformation efforts.
and make inferences, Gen AI can put it together Adopting Gen AI for cybersecurity is a capability-
while generating human-like responses and building effort. Treat it that way.
working at extraordinarily high speeds.
It can create a new type of threat intelligence that
empowers security analysts with near real-time
incident analysis to identify and help contain
threats before they spread.

Cyber leaders are right to be concerned about


how bad actors may use Gen AI—but they should
be optimistic that, with the right approach
and governance in place, Gen AI can help an This paper will explore how Gen AI can help and what the
organization harden its cyber posture, overcome cyber considerations may be. It’s important to remember
challenges in talent, and build new road maps for
that an organization’s success with using Gen AI to
threat detection and response.
drive better outcomes rests on its ability to imagine a
collaborative intelligence between humans and machines
and to ask the right questions. Trusting that Gen AI can
make a true impact in your organization means first
understanding its power and potential.

© 2024. For information, contact Deloitte Global.


So let’s get started.
5

Gen AI’s immense


Here’s what we mean:

Predict: Analyze asset inventories, security logs, threat intelligence,

value for cybersecurity


etc., to help predict risk scores and recommend preventive measures.

Interpret: Summarize and process large volumes of textual data


into coherent, actionable summaries; alert reception; and parsing.
Machine learning has long been used to detect
Generate logical analysis (inference, deduction, and/or explanation)
Gen AI is a force multiplier of cyber vulnerabilities and perform threat monitoring
given context or knowledge base.
at scale, but it takes a high degree of technical
value because it can do human- proficiency and investment to train an organization’s
like work at hyper speeds that model to understand patterns and detect anomalies Simulate: Extract information from a knowledge base to help generate
in the data. Rules-based AI, in other words, can find responses to natural language questions; create test cases and
no human can match. only known attacks and work in specific use cases. sample scenarios.

But with Gen AI and large language models (LLMs),


the game changes. Gen AI uses foundational neural Automate: Create incident response activities, including triaging
network models that are powered by and trained alerts, correlating events, and guiding incident handlers with
on vast amounts of data, working across data silos response playbooks.
and acting as a bridge between data sets. This can
give analysts a more natural method for identifying,
Detect: Identify connections between alert data and threat intelligence
synthesizing, and summarizing insights.
reports to help determine the impact on infrastructure. Update specific
responses that can guide security analysts in remediation and recovery
activities.

Interact: Analyze governing documents, laws and regulations, data,


and standards to quickly inform actions. Deliver personalized and
targeted threat and crisis response trainings to employees based
on roles, responsibilities, and job requirements.

Create: Generate content by converting it to a new format or style and


for a variety of modalities based on a set of input data, examples, or
specific themes or topics.
© 2024. For information, contact Deloitte Global.
6

Cyber risk management Threat detection Vulnerability management


Others
Looking for and compliance and response and security testing
specifics? Gen AI
Risk scoring and prioritization Actionable and precise Controls testing and automation Role mining
can help transform Analyze asset inventories, security threat intelligence Create test cases/sample scenarios; Use Gen AI to recommend role
cybersecurity logs, and threat intelligence to Generate summarized reports/ expected outcomes; develop assignments based on user attributes
predict risk scores and recommend executive briefings for active threats supporting documentation to ensure adaptive access control
activities like these. preventative measures from historic trends or publicly
available data Secure code generation Data classification and monitoring
Third Party Risk Management Develop application code and Classify and monitor unstructured
Analyze data in vendor submitted Threat correlation and detection relevant supplementary test cases text-based data, which enables better
and external documentation to Identify correlation between alert in line with the latest security protection against exfiltration
evaluate the security posture of data and threat intelligence reports considerations (backward integration
third-party providers to determine impact of secure coding guidelines) Training and awareness
on infrastructure Deliver personalized and targeted
Automated policy Enhanced vulnerability scanning threat/crisis response trainings
review & orchestration Security incident response Correlate vulnerability data (scan to employees based on roles,
Map current policies, standards and Automate incident response activities, data, external information and responsibilities, and job requirements
procedures against standard industry including triaging alerts, correlating remediation plans) to prioritize
and regulatory frameworks to meet events, and guiding incident handlers action plans
compliance requirements with response playbooks
Enhanced systems
Cybersecurity Enhanced recovery design/configuration
maturity assessments and remediation Augment system/security architecture
Self-assess the organization’s cyber Create specific responses that design by drafting preliminary technical
risk maturity; identify gaps in cyber can guide security analysts in specification and/or recommending
strategy and generate relevant remediation and recovery activities optimal configuration
improvement recommendations
Gen AI-enabled phishing detection
Use Gen AI to detect threats and/or
phishing attempts created by LLMs

© 2024. For information, contact Deloitte Global.


Note: This is not an exhaustive list. Feasibility of some of these use cases must be evaluated based on data availability and other constraints.
7

The power of pairing AI and Gen AI


An organization using Indicators of Co-pilot for
Response process
AI to detect and combat Draft requirements Compromise (IOCs) incident response
automation
cyberthreats is already ahead signature generation and SOC automations
of the game. Layering on Gen
AI can add further complexity
and power to its models. Simplify requirements-gathering phase Classify IoCs (e.g., information about a Detect hidden patterns, harden Automate cyber defense strategies,
Generative AI
Application of

by developing prototypes of complex specific security breach that notifies defenses, and respond to incidents industry notifications, future mitigation
While a traditional AI model applications. Provide more intuitive security teams if an attack has taken faster with triage signals and predictive strategies, etc., as part of the response
can detect threats, adding Gen engagement between the analyst and the place) using distinct signature guidance. Quickly synthesize data from process.
AI could allow it to summarize customer to better inform development. generation. multiple sources to provide actionable
the incident, prepare insights.
documentation, and create a
response action plan.

Gen AI can help an Reduces the risks of Improves visibility of cyber attacks and Introduces robust and reliable approach Improves organizational compliance
miscommunication (i.e., the analyst and streamlines the security team’s response to incident response, threat hunting, and with incident response plans and
Benefits

organization move beyond


customer are able to align on the with expedited identification and triage. security reporting contingency plans through automation.
rules-based analysis and
prototype before proceeding to the In doing so, improves efficacy and
expand into outputs of higher build phase). streamlines execution.
complexity and capabilities.

• Customer engagement • Information gathering • SOC • Cybersecurity SOC


(e.g., review cycles) • Mission expertise/security • Threat detection and response • Threat response
Workforce skills

• Storyboarding clearances

Data science, AI/ML engineering, deep learning, UI/UX design, high performance computing, prompt engineering,
Core AI skills digital operations & delivery, multidisciplinary collaboration, computer vision, NLP

© 2024. For information, contact Deloitte Global.


8

The cyberthreat
considerations for Gen AI
To understand Gen AI’s power, an organization should be fully aware
of the considerations inherent to the technologies.

As we’ve said, Gen AI opens new opportunities for


organizations to prepare for and defend against Growing concerns and global action
cyberattacks. But as with any new technology, Gen AI In the fall of 2023, the Biden administration
comes with risks and the potential to amplify existing announced an executive order on the safe
ones as well. and trustworthy use of AI that will likely create
downstream effects for new regulations and
Earlier AI systems were traceable, and it was standards, further complicating the regulatory
possible to understand certain outputs via its atmosphere.
data. But Gen AI is a different game with multiple Meanwhile, the European Union (EU) is moving
parameters that can make it more challenging to toward stringent rules around AI, even moving
trace output. Gen AI is also trained on much larger to ban its use in some cases. As the use of
data sets than traditional AI, which can make it more Gen AI becomes more prevalent, we expect
difficult to know where and how the data may have governments to take more action to mitigate
been altered or where quality concerns may exist. potential risks.
Constantly evolving risk profiles demand a
new perspective.

© 2024. For information, contact Deloitte Global.


9

There’s a lot to consider.


We’ve broken out some
current cyber risks for Gen AI:
Data breach Reputational risk Don’t just take our word for it.
Sharing sensitive data with external Gen Bad actors can leverage Gen AI tools to The Open Worldwide Application Security Project
AI vendors for model training or through widely and rapidly spread misinformation (OWASP) has published its Top 10 risks for large
prompts may lead to leakage of confidential and deepfakes, which can adversely influence language model applications, including trained
and/or personal information. Adversarial public opinion, trust, and/or security. data poisoning and supply chain vulnerabilities.3
attacks can also be used to deceive the ML
model by changing input data.

Unsecured integration Regulatory risk


Improper integration of Gen AI tools with Organizations using Gen AI may need to meet
other organizational systems may lead to new compliance requirements as growing
potential vulnerabilities (e.g., unsecured data concerns influence new laws, regulations,
channels) and back doors. and guidelines, such as National Institute of
Standards and Technology’s (NIST) proposed
AI Risk Management Framework1 and new EU
regulations for General Purpose AI Systems 2.
(Read more)
© 2024. For information, contact Deloitte Global.
10

A framework for risks and limitations associated with Gen AI


While emerging tech has inherent risks, Deloitte’s Technology Trust Ethics (TTE) framework can be leveraged to build, deploy, and commercialize AI applications

Deloitte’s TTE framework Foundational capabilities Gen AI-specific capabilities

g & Education
AI strategy Management of hallucinations and
Reskillin
• Define and implement an overarching AI strategy misinformation
ECU
RE PRI and management framework • Identify and manage misinformation through
DS VA
TE
E AN
SA
F
• Regulatory compliance—review evolving Gen AI by implementing appropriate governance
ous
Invuln
Us

mechanisms (e.g., workforce upskilling,


ntia

regulatory landscape and prepare for


Autonom
er

erab

l
Pro

fide

na

new requirements structured oversight, ubiquitous documentation)


tio
tec
U

Con
le
se

re

al
tio

TR
rF

su
sc
rie

en

AN
Di

• Regulatory compliance—review evolving


ns
nd

SP
Co
ly
LE

Pre
ble
AR

regulatory landscape and prepare for new


IAB

dic
tab ti fia
ENT

le Jus
AI risk management
REL

le
Con
rpre
tab requirements
AN

siste
Inte
ROBUST AND

nt
D EXPLAINABLE

• Design and implementation of AI controls—design


ce & Controls

Accurate Technology Auditable

and implement controls to address AI-specific Attribution management


Regulatory C

Trust Ethics
e Visible
Adaptabl Framework
risks (e.g., bias) based on regulations and • Assess and validate attributions to the source
ernan

b le
Acc
essib
le
industry standards information while ensuring that the model
era
omp

sw Eq
Gov

An
le In
uit
ab
le • Monitor controls—assess controls effectiveness does not tread across lines of plagiarism and
lian

ab cl
ol
v us
and initiate remediation copyright violations
FA

ce

es iv
e
Un
ip

IR

R
&
E

sh
BL

AN
b
g

Po
ias
ne
er

ddin
focused
Common/
TA

Sustainability
Social Good

D
n

Accountability and explainability


lic
ed
a
Ow
UN

IM
Hum

y
eA

PA
CO

RT
Valu

AC IA

AI technology/cybersecurity for Gen AI


L

RESPONSIBLE • Code assessment and model validation—provide • Focus on providing accessible, non-technical
independent testing of AI explanations of Gen AI, its limits, capabilities,
and associated risks
• Threat monitoring and detection—monitor
Deloitte’s TTE framework may be leveraged for
foundational and Gen AI specific capabilities
for specific technology threats (malicious and • Derive viable methods of accountability, trust,
environmental) that are targeted at AI models and ethics when using Gen AI and underlying
© 2024. For information, contact Deloitte Global.
and underlying technology technology
11

How to prepare Example checklist

• Update policies and controls for new


• Establish secure channels and
mechanisms to transfer data between
enterprise and cloud-hosted Gen AI
types of bias, legal, regulatory, privacy, tools.
intellectual property, and data risks of
• Review third-party controls and
With forethought and deliberation, cyber leaders can ready Gen AI.
establish contractual obligations to help

their organizations for the capabilities and risks of Gen AI. • Identify new compliance requirements
and impacts on compliance activities
protect sensitive data shared with Gen
AI vendors.
with existing laws and regulations.
• Monitor for novel attacks (e.g., prompt
Regardless of an organization’s particular The key is to evolve those constructs to answer • Closely evaluate use cases for Gen AI injection) and help ensure appropriate
needs, defining key outcomes and instituting the nuanced risks and threats that may be for the organization to help ensure usage of Gen AI tools to prevent
guardrails can help leaders improve risk targeted toward Gen AI or AI systems. impactful outcomes and overcome any vulnerabilities.
preparedness, promote resilience, and unlock An organization’s specific risks may depend resistance to adoption.
• Define boundaries of where and when
new business opportunities around Gen AI. on what adoption model it chooses, such as
• Implement appropriate contractual Gen AI technologies can be used within
software-as-a-service or private LLMs.
obligations for Gen AI vendors around the organization.
Leaders should recognize that Gen AI requires
security and usage of any information
new approaches to technology, training, and When choosing adoption strategies, an • Integrate secure-by-design
shared, and monitor the data sharing
processes—but that said, this is an evolution of organization should recognize the power and principles during integration of
channels used by them.
existing risks. Gen AI may not require net-new necessity of end-to-end transformation rather Gen AI applications into enterprise
road maps and trainings. An organization’s than automating one or two activities. • Implement privacy and data protection architecture.
risk management and cyber constructs may standards and controls when
• Help protect the organization’s brand
still work. developing and training models for Gen
by monitoring for misinformation,
AI tools.
and define communication strategies
• Enhance existing code review processes to counteract and decrease impact of
to help test code created by Gen AI for disinformation campaigns.
back doors and vulnerabilities.
• Take action immediately on the risks
• Implement access controls and monitor from adversarial and malicious Gen AI
use of Gen AI tools to help limit risks usage.
from inadvertent or inappropriate use.

© 2024. For information, contact Deloitte Global.


12

HOW TO PREPARE

Above all, remember: A road map for Gen AI adoption Adoption of Gen AI by organizations will depend on six factors
should include close, constant collaboration for risk
stakeholders, including cyber leaders, chief resource Cost and efficiency: Ability to assess whether benefits of using Gen AI-
officers, an organization’s legal team, and more, to 1 based systems outweigh the associated expenses, as handling and storing
help understand and anticipate the risks. (And don’t large datasets can result in increased expenses related to infrastructure and
forget to include testing and monitoring.) computational resources.

Knowledge and process-based work: High degree of knowledge and


2
process-based work vs. only field and physical work.

High cloud adoption: Medium-to-high level of cloud adoption, given


3
infrastructure requirements.

Low regulatory and privacy burden: Functions or industries with high


4
regulatory scrutiny, data privacy concerns, or ethics bias.

5 Specialized talent: Strong talent with technical knowledge and new capabilities,
and ability to help transform workforce to adapt quickly.

Intellectual property and licensing and usage agreements: Ability to assess


6 licensing/usage agreements and restrictions, establish and monitor related
compliance requirements, and negotiate customized agreements
with relevant vendors.

© 2024. For information, contact Deloitte Global.


13

Cyberattacks won’t stop.


The good news is, Gen AI
progress won’t either.

Gen AI could accelerate both cyberattacks and


threat response capabilities. Organizations
need to recognize both sides of that equation.

The question is, how can cyber leaders steer their teams and
organizations through the disruption while harnessing the capabilities
of what is, to date, the most powerful artificial intelligence ever created?
Many organizations are so busy fighting today’s battle that it’s hard
to conceive of creating a new Gen AI ecosystem that may require
development, operations, new talent, and evolved processes.

For any cyber leader, it’s important to start the journey toward Gen AI
with questions specific to the organization. Gen AI is an unprecedented
opportunity for a new kind of collaborative intelligence, one that can
provide increased security and next-level collaboration. So where does
a leader start?
With our deep bench of cyber experience, alliance relationships,
With one question: “What if?” From there, it’s all a new frontier. and pragmatic perspective on the future, Deloitte can help
organizations address their most pressing cybersecurity
challenges—now, and for whatever is around the bend.
© 2024. For information, contact Deloitte Global.
Reach out to learn more.
14

Endnotes
Get started
1. AI Risk Management Framework | NIST

2. https://www.europarl.europa.eu/news/en/press-room/20231206IPR15699/
artificial-intelligence-act-deal-on-comprehensive-rules-for-trustworthy-ai Authors
David Caswell, Sabthagiri Saravanan Chandramohan, Deborshi Dutt, Chris Knackstedt,
3. OWASP Top 10 for LLM Applications Version 1.1, October 16, 2023 Vikram Reddy Kunchala, David Mapgaonkar, Mike Morris, Abdul Rahman,
Kate Fusillo Schmidt, Niels van de Vorle

Contributors
Sanmitra Bhattacharya, Edward Bowen, Ben Bressler, Suzanne Denton,
Eric Dull, Lena La, Sajin Mathew, Nirmala Pudota, Stephanie Salih, Colin Soutar

Contacts

Emily Mossburg Vikram Reddy Kunchala Mike Morris


Global Cyber Leader Cyber & Strategic Risk Solutions Strategy and Innovation Leader,
emossburg@deloitte.com Leader, Deloitte US Deloitte US
+1 571 766 7048 vkunchala@deloitte.com micmorris@deloitte.com
+1 713 982 2807 +1 303 312 4773
Adnan Amjad
Cyber & Strategic Risk Offering David Mapgaonkar Niels van de Vorle
Leader, Deloitte US Cyber & Strategic Risk Industries Cyber Leader, Deloitte North and
aamjad@deloitte.com Leader, Deloitte US South Europe
+1 713 982 4825 dmapgaonkar@deloitte.com nvandevorle@deloitte.nl
+1 408 704 4481 +31 88 2882186
Amir Belkhelladi
Cyber Leader, Deloitte Canada César Martín Lara Peter Wirnsperger
abelkhelladi@deloitte.ca Cyber Leader, Deloitte Spain Cyber Leader,
+1 514 393 7035 cmartinlara@deloitte.es Deloitte Central Europe
+34 91438 1416 pwirnsperger@deloitte.de
Ian Blatchford +49 40 320804675
Cyber Leader, Deloitte Asia Pacific
iblatchford@deloitte.com
+61 474 288 278

© 2024. For information, contact Deloitte Global.


Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (DTTL), its global network of member
firms, and their related entities (collectively, the “Deloitte organization”). DTTL ( also referred to as “Deloitte
Global”) and each of its member firms and related entities are legally separate and independent entities, which
cannot obligate or bind each other in respect of third parties. DTTL and each DTTL member firm and related
entity is liable only for its own acts and omissions, and not those of each other. DTTL does not provide services
to clients. Please see www.deloitte.com/about to learn more.

Deloitte provides industry-leading audit and assurance, tax and legal, consulting, financial advisory, and risk
advisory services to nearly 90% of the Fortune Global 500® and thousands of private companies. Our people
deliver measurable and lasting results that help reinforce public trust in capital markets, enable clients to
transform and thrive, and lead the way toward a stronger economy, a more equitable society, and a sustainable
world. Building on its 175-plus year history, Deloitte spans more than 150 countries and territories. Learn how
Deloitte’s approximately 457,000 people worldwide make an impact that matters at www.deloitte.com.

This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited
(“DTTL”), its global network of member firms or their related entities (collectively, the “Deloitte organization”)
is, by means of this communication, rendering professional advice or services. Before making any decision or
taking any action that may affect your finances or your business, you should consult a qualified professional
adviser. No representations, warranties or undertakings (express or implied) are given as to the accuracy or
completeness of the information in this communication, and none of DTTL, its member firms, related entities,
employees or agents shall be liable or responsible for any loss or damage whatsoever arising directly or
indirectly in connection with any person relying on this communication. DTTL and each of its member firms,
and their related entities, are legally separate and independent entities.

© 2024. For information, contact Deloitte Global.

You might also like