Building AI Driven Workflows - Eoin Hinchy (CEO, Tines)
AI Summary
Video Summary: Automation in Security Workflows
Guest: Owen Hinchy, Founder & CEO of Tines
- Discusses the evolution of security operations automation (SOAR) and related workflows.
Key Points:
- AI in Cybersecurity
- Many fear that attackers will leverage AI effectively.
- Reality: Attackers use conventional methods like phishing without needing AI.
- Phishing remains effective; most attackers opt for the path of least resistance.
- Introduction to Tines
- Tines is a platform that automates critical workflows for security teams and other functions.
- Focuses on reducing repetitive operational work and supporting incident response through automation.
- Challenges in Security Automation
- Existing SOAR products often fail to meet the varied needs of different organizations.
- Automation solutions must be adaptable to different workflows and prevent making security teams reliant on a single tool.
- Current Security Automation Landscape
- Still reliant on automation of phishing response, incident alerts, and compliance.
- Organizations are beginning to prioritize onboarding, offboarding, and other operational workflows due to evolving threat landscapes.
- Integrating AI and Automation
- Tines introduced AI features to improve workflow efficiency while ensuring security and privacy.
- Development of AI actions that can assess tasks like email scams while maintaining user control over actions taken.
- Future of Automation
- Continuous evolution expected in how organizations approach automation with AI.
- Emphasis on building trust with automation agents; gradual introduction of AI into security workflows is crucial.
- Company Growth Plans
- Tines plans to expand its features significantly, with 250 new features anticipated.
- Aiming to grow its team significantly over the next year.
Conclusion
- The discussion highlights the importance of adapting automation tools to fit the unique needs of various organizations while leveraging AI responsibly to enhance security operations. Organizations must remain vigilant in their approach to automation, ensuring that systems are reliable and transparent.