Within the age of zero belief, various IT environments and fidelity of assaults, cybersecurity has change into a matter of information evaluation. Endpoints and networks produce steady streams of information, and organizations can’t wait round to manually ferret out what the info tells them.
“When you talk to IT leaders or security leaders, one of the things they will all frequently echo as a common struggle is the amount of time spent de-conflicting, deduplicating and consolidating data,” stated Melissa Bischoping, the senior director of safety and product design analysis at Tanium. “Is it really necessary to be looking at spreadsheets of data and deduping after the fact? Why are we not working off that single source of truth?”
Actually, knowledge consolidation goes hand in hand with rationalizing the units of cybersecurity instruments an company makes use of, every of which produces knowledge, Bischoping stated throughout Federal Information Community’s Trade Trade Cyber 2026.
“Being able to consolidate your tool sets and have that unified viewpoint not only saves you time, but it’s critical to confidence,” she stated. “We don’t have the luxury of looking at one- to two-week-old or one-month-old scans of information and using that to make decisions.”
As synthetic intelligence hastens cybersecurity imperatives, each newness and accuracy of decision-making knowledge change into extra important, Bischoping added.
“You have to be confident that the data is accurate, and the accuracy comes from real-time updates versus knowing what data is stale,” she stated. “When you have that, you’ve now got a source of truth that you can use to make decisions as you mature your organization.”
When the group can trust in its knowledge, Bischoping added, it will likely be capable of “layer in automation and AI workflows on top of that quality data and pair that up with governance so you’ve still got a human in the loop.”
Attaining absolute transformation
Bischoping advocates the thought of autonomous IT operations enabled by AI.
In trendy know-how ecosystems, she stated, “you can’t have the silos of compliance, security and IT ops, and help desk. They really do have to function as a cohesive unit to accomplish the mission.”
Full autonomy remains to be a approach off, Bischoping stated, “but you’ve got real-time data, a single source of truth. You’ve got transparency. You’ve got the right governance. Now you can supercharge your teams to make decisions faster and know that those decisions have confidence behind them.” She known as that state absolute transformation.
“Tanium’s premise,” Bischoping stated, “is having a single view with real-time data, so that you can see every endpoint, see every action, govern and have control over those actions, and then automate some of that mundane to make your teams more efficient and accomplish your mission faster.”
To achieve that standing requires having all three — knowledge, transparency and governance — in place. “When you have those three pieces of information in place with whatever your toolkit is, you actually see success and return on the investment,” she stated.
Bischoping described governance as having management over whether or not to vary one thing and having a course of for approving and monitoring modifications that take impact. Then, it’s essential to have measurable outcomes and workflows.
“You need to actually know what you’re going to accomplish and how you’re going to measure success,” she stated.
Acquiring the mandatory knowledge in flip requires what Bischoping described pretty much as good foundations for understanding your IT operation.
“Foundations still are based on asset visibility; accurate, real-time, inventory; and telemetry,” she stated. These plus detection capabilities “are the foundation of everything we do in security. You can’t do autonomous IT workflows like threat hunting and automated investigations if you don’t have great telemetry and real-time visibility behind it.”
Making use of autonomy to cyber
What does autonomous safety appear to be? For Bischoping, the extra exact query is, “When we talk about autonomous security, we should step back and say, ‘What do we actually need to be automated as security practitioners?’ ”
She stated operations will at all times want some extent of human intervention. Which means probably the most promising space for automation considerations investigation and incident response, Bischoping stated.
“The challenges being faced, especially in investigation and incident response,” she stated, “are the time it takes to rule something a false positive or a false negative, that manual effort of data collection or collecting additional artifacts, as well as just validating [whether] this makes sense in my environment.”
Due to this fact, Bischoping stated, the improvements in knowledge dealing with and evaluation “are going to lead autonomous security to be something that educates the user and takes that bidirectional feedback.” She added that agentic AI methods will amplify the efforts of human technical consultants to reach at programs of motion to protect safety.
“What I expect to see is reduction in the time it takes to resolve an incident,” she stated. The mix of higher and sooner knowledge, agentic AI and human talent will allow earlier identification of adversaries and analysis of forensic knowledge earlier than it goes stale. “I think all of that’s going to get faster, which is going to make us more effective.”
The approaching improve in automation and autonomy may even alter what cybersecurity folks do and the way they do it, Bischoping stated.
Altering the character of cyber work
“One, I think this is going to help a lot of us breathe a sigh of relief,” she stated. That can come from the brand new, AI-powered instruments that minimize by knowledge evaluation quicker than folks can.
“I’ve been in that practitioner’s position,” she stated, “and that’s something I’m mindful of — just the amount of data we ask the average practitioner to consume on a daily basis and make educated, accurate decisions where there’s no room for error.”
Second, when coaching and equipping our cyber groups, “we have to teach the critical thinking and analysis of where AI can be a tool and where it can be a liability,” Bischoping stated. Organizations might want to reply the query of whether or not they have the correct checks and balances “and making our security practitioners aware and educated about how to use AI responsibly as part of their workflows.”
She added that practitioners may even must be taught to use judgement on the accuracy of suggestions generated by autonomous methods.
“Fortunately, a lot of the practitioners I know have that healthy sort of apprehension of not wanting to turn over the keys,” Bischoping stated. “I think security, specifically, will keep the human in the loop for quite some time.”
Uncover extra articles and movies now on our Federal Information Community’s Trade Trade Cyber 2026.
Copyright
© 2026 Federal Information Community. All rights reserved. This web site is just not meant for customers positioned inside the European Financial Space.



