HomeTechnology and Security, CIO

Cybersecurity in the cognitive era


Priming your digital immune system

Download the full reportDownload the infographic

Security leaders are working to address three gaps in their current capabilities — in intelligence, speed and accuracy. Some organizations are beginning to explore the potential of cognitive security solutions to address these gaps and get ahead of their risks and threats. There are a lot of expectations for this technology. Fifty-seven percent of the security leaders we surveyed believe that it can significantly slow the efforts of cybercriminals. The 22 percent of respondents who we call “Primed” have started their journey into the cognitive era of cybersecurity — they believe they have the familiarity, the maturity and the resources they need. To begin the journey, it is important to explore your weaknesses, determine how you want to augment your capabilities with cognitive solutions and think about building education and investment plans for your stakeholders.

Download the full report

How can IBM help you?

Defend your business, maintain availability and recover quickly in the event of disruption

Learn more

We confront the world's most challenging cybersecurity problems

See how IBM Security confidently faces cybersecurity threats, so you can confidently face your customers


Bookmark this Report  



Download the infographic


Meet the author:

Carl Nordman

Connect with author:


, Director, Global C-suite Study Program, and CFO Research Lead, IBM Institute for Business Value

Related reports
Fundamental IIoT cyber hygiene, augmented with automation and AI, is critical to continuity of operations and service delivery for utilities.
Electronics companies need contextual, cognitive and adaptive security to identify and mitigate IoT-related risk
Automotive companies need improved cybersecurity capabilities to support and protect their Industrial Internet of Things (IIoT) technologies.
Enterprises should begin implementing cybersecurity solutions that protect against classical and quantum-based computing attacks.