By Vinod Vasudevan, Global CTO MDR & Deputy Global CTO – Cybersecurity Services, Atos

The blind spot

The key challenge that SOCs have today is detecting advanced attacks early and responding rapidly.   Advanced attacks use newer techniques or significant variation of an existing one,hence these attacks cannot be detected using previously known signatures. Similarly, threat actors are getting better at camouflaging or launching attacks from compromised systems of a legitimate organization. This defeats threat intelligence-based detection using IoCs including IP/ULR/email IDs/ Usernames. There is a blind spot for conventional security technologies where it is an unknown attack and an unknown threat actor.

The value of AI for detection of blind spots

AI can throw light on this blind spot and enable detection. AI can do this by profiling known good behavior and detecting deviations from these baselines. As an example, using AI we can profile a normal/admin user for systems of allowed access, data size, time of access (time of day, week). An attacker who compromises this user will show different access patterns that can be detected as an anomaly using AI algorithms. Such profiling can be used to detect lateral movement, data exfiltration. AI can also be used to learn from known malicious behavior when enough data samples are available. This is true for detection of malware binaries. Deep learning algorithms can be used to learn from millions of malware samples available to detect malware even if new or hitherto unknown malware.

More effective response capabilities and interconnected SOCs

As we step into the future, AI algorithms can also be used to learn successful response mechanisms used to contain & orchestrate a successful ransomware response. This will lead to autonomous response that can trigger response steps in real time to contain major attacks and ensure that business impact is reduced. AI can also give much better results as we create, interconnect and strengthen national and regional Security Operation Centers (SOCs) of critical infrastructure or functions at national and EU level. Interconnected SOCs can provide more data for AI algorithms to learn from and learning can be transferred across SOCs to democratize the detection and response capabilities.

AI is key to face an ever-evolving threat landscape

Cyber crime syndicates have already started using AI for launching targeted attacks. The use of AI makes it easy to launch personalized attacks at scale. This also means that we cannot depend only on rule based approach to counter AI driven attacks. We cannot afford armies of highly scarce Cyber Security professionals to staff SOCs. The use of AI in SOC will enable automation of human actions, emulate human intelligence in analysis/response and enable the scale required for successful response to such AI driven attacks.

The future is towards using AI for tactical scale in combination with Human Intelligence for strategic actions for combating the ever-evolving complex threat landscape.

You may also like

Contribution to the EU Commission Public Consultation on the revision of the Cybersecurity Act
icon External Engagement

Contribution to the EU Commission Public Consultation on the revision of the Cybersecurity Act

The Charter of Trust welcomes the opportunity to participate in the European Commission’s public consultation on the revision of the Cybersecurity Act. As a coalition united by the goal of strengthening digital trust, we are pleased to share our consolidated response and recommendations.

We support Policy Option 2, which focuses on targeted regulatory measures that address key challenges without creating unnecessary complexity. In this context, we emphasize the need to enhance the role and resources of ENISA, to ensure effective implementation of both current legislation and the European Cybersecurity Certification Framework (ECCF).

Our recommendations aim to improve transparency, collaboration, and efficiency across the EU’s cybersecurity landscape. These include:

- Introducing clear timelines for the development of certification schemes.

- Enhancing stakeholder engagement throughout the process.

- Establishing more structured communication channels between ENISA, the Stakeholder Cybersecurity Certification Group (SCCG), and sectoral ISACs (Information Sharing and Analysis Centers).

We call for a stronger ECCF, one that is transparent, inclusive, and aligned with international standards to foster global interoperability and ease compliance for organizations across borders. Equally critical is the harmonization of certification practices across EU member states and the mutual recognition of certifications to minimize regulatory fragmentation.

The Charter of Trust advocates for technically robust, standards-based certification schemes, with well-defined roles and responsibilities. We also stress the need for clarity on the interplay between voluntary and mandatory certifications, particularly in relation to the upcoming Cyber Resilience Act (CRA).

To streamline compliance and reduce administrative burden, we propose a unified, risk-based incident reporting regime that consolidates requirements under regulations such as NIS2, CRA, GDPR, and DORA. This would not only simplify reporting for organizations but also enhance the EU’s overall cyber resilience. In addition, we recommend incorporating liability protections and grace periods for incident disclosure.

Finally, we urge the Commission to strengthen supply chain security by adopting a risk-based classification approach and establishing baseline cybersecurity requirements for ICT suppliers.

The Charter of Trust remains fully committed to supporting the European Commission in shaping a secure, resilient, and trusted digital future for Europe. We look forward to continued collaboration in building a cybersecurity framework that meets the needs of all stakeholders, today and in the years to come.
June 19, 2025
Advancing Regulatory Alignment at RSA Conference 2025
icon External Engagement

Advancing Regulatory Alignment at RSA Conference 2025

In the face of rising global cyber threats, over 50 CISOs have called for greater international alignment of cybersecurity regulations to strengthen defenses and reduce fragmentation. This message was echoed at RSAC 2025, where experts from the OECD, European Commission, academia, and industry emphasized the need for principle-based collaboration. The Charter of Trust, a long-time advocate for regulatory harmonization, continues to support coordinated, effective approaches that prioritize clarity over complexity.
May 01, 2025
Richards Skalt takes over the Advocacy Workstream
icon External Engagement

Richards Skalt takes over the Advocacy Workstream

We are delighted to welcome Richard Skalt, Advocacy Manager at TÜV SÜD, as the new Leader of the Advocacy Workstream at the Charter of Trust. Richard steps into the role following María del Pino González-Junco, who recently assumed the position of Chair of the Global External Engagement Working Group.

With a strong background in advocacy and a forward-looking vision, Richard brings renewed energy to our mission of shaping a secure digital future. As he puts it:

“My motivation is to preserve and build upon the strong foundation of advocacy activities we’ve developed over the past years. At the same time, I’m committed to ensuring we’re in a position to shape the policies that will define how our business model and operations evolve in the future – including the cybersecurity of products and systems, the use, deployment, and distribution of robust AI solutions, as well as cloud security and secure datacenters.”

In a world defined by accelerating digital transformation and increasingly complex regulatory challenges, principled leadership and effective collaboration are more vital than ever. Under Richard’s leadership, the Advocacy Workstream will continue to engage policymakers, raise public awareness, and strengthen education around key issues such as cybersecurity, AI governance, and secure digital infrastructures.
April 29, 2025