Improving enterprise cyber resilience entails the adoption of cyber insurance that further acts as a control mechanism for its buyer enterprises to improve enterprise cybersecurity and its management. However, GenAI adds new challenges to scaling the cyber insurance business
Image: Shutterstock
Generative AI (GenAI) enables the processing of vastly large amounts of data than was previously feasible on reasonable computational budgets, and will drive nearly every language, vision, and audio generative machine learning models in the near future. The speed of innovations in GenAI is so high that its governance is a big challenge for regulators and policymakers in the public interest. On the one hand, powerful GenAI models are disruptive from an innovation viewpoint but are also a source of significant risks related to harm and misuse.
The most popular examples of such risks include:
Alternatively, GenAI cost-effectively helps adversaries adapt to evolving defense mechanisms; launch sophisticated cyber threat vectors; and enhances the impact of a cyber-attack on each step of the standard IT/OT Cyber Kill Chain (CKC) as recently documented by MIT researchers.
It is inevitable that GenAI will enable the adversaries to compromise IT/OT systems at a far greater rate, compared to the rate at which defenders can use (Gen)AI to their defense benefits. This fact is traditional in the cybersecurity world and simply extends to cybersecurity in the GenAI world in the presence of evolving dynamics among adversaries, defenders, and (Gen)AI regulators.Â
Hence, every digital enterprise should adopt a new approach to tackling cybersecurity threats that move beyond prevention to building adaptable and robust defence mechanisms. In the context of the standard NIST cybersecurity framework, this boils down to every enterprise having management processes in place to identify, detect, protect, respond, and recover from a cyber incident and simply not focusing on cyber-risk management via identifying, detecting, and protecting the enterprise from such cyber incidents.Â
[This article has been published with permission from IIM Calcutta. www.iimcal.ac.in Views expressed are personal.]