<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>C&amp;ESAR'21: Automation in Cybersecurity (Preface)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gurvan Le Guernic</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>DGA Maîtrise de l'Information</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rennes</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>France</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Univ Rennes</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inria</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>IRISA</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rennes</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>France</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <fpage>3</fpage>
      <lpage>8</lpage>
      <abstract>
        <p>C&amp;ESAR is an educational and scientific conference on cybersecurity whose specific topic changes every year. This year C&amp;ESAR is focused on automation in cybersecurity. Automation is identified as a key enabler to tackle today's challenges in cybersecurity. The main objective for using automation in cybersecurity is not to reduce the work force, but to automate as much as possible in many diferent areas in order to allow experts to focus on tasks requiring more expertise and having more value. C&amp;ESAR 2021 received 32 papers submitted for peer-review. Out of these, 16 papers were accepted for presentation at the conference. After the conference, 14 were short listed for inclusion in this volume.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cybersecurity</kwd>
        <kwd>Automation</kwd>
        <kwd>C&amp;ESAR</kwd>
        <kwd>Conference</kwd>
        <kwd>Preface</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. C&amp;ESAR</title>
      <p>approach allows operational practitioners to learn about and anticipate future
technological inflection points, and for industry and academia to confront research and product
development to operational realities. Every year, C&amp;ESAR explores a diferent topic
within the field of cybersecurity.</p>
      <p>C&amp;ESAR’s 2021 topic is: Automation in Cybersecurity.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Automation in Cybersecurity</title>
      <p>
        Many recent reports and surveys [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] identify automation as a key enabler in cybersecurity
to improve response time and handle the increasing work load associated to limited
resources. This view is shared by many. In a recent study [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] the Ponemon Institute
(https://www.ponemon.org) states that 77% of respondents either use or plan to use
automation for cybersecurity, while the SANS (https://www.sans.org) reports [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] to
have seen an increase of 11.8% in adoption of dedicated automation solutions in the
year preceding its survey, and that less than 2% of respondents do not have a need
for an automation project in the coming year. This is due to the perceived benefit
of automation. Indeed, IBM states [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] that 42% of the respondents (and 55% of the
most cyber resilient organizations, i.e. high performers) claim that automation improves
cyber resilience, and that 70% of the high performers report significant or moderate use
of automation. In another report [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], IBM Security (https://www.ibm.com/security)
evaluates the “savings in average breach costs for companies with fully deployed security
automation versus those without deployed security automation” to $3.58 million.
      </p>
      <p>
        Automation is not restricted to SOC (Security Operations Centers), it can be
applied to many cybersecurity areas. While Osterman Research (https://www.
ostermanresearch.com) identifies [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] low-hanging opportunities like resetting passwords
or managing access rights as employees move across job roles and departments, SANS
lists [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] varying activities that can benefit from automation, such as: vulnerability
management, compliance support (that the Ponemon Institute also sees as one of the
main incentive for automation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]), or security posture assessment with a breach
attack simulation tool. In the same report, SANS also lists tools that deserve integration
in an automated environment, for example: identity management, SSL visibility
(encryption/decryption) at the network boundary, security case management systems, file
integrity monitoring (FIM), or browser and screen-capture tools. Automation can also
be brought to other areas than cyberdefense. The Ponemon Institute [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Deloitte
(https://www.deloitte.com) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] report on automation of cybersecurity practices in the
context of Dev[Sec]Ops and continuous integration and deployment (CI/CD), which is
both an opportunity for automation of security and a threat for the security of
automation as emphasized by the recent Sunburst fiasco [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and explicited in a recent column
of The Register [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Meanwhile, the Ponemon Institute states that 53% of respondents
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] observe an increasing use of automation by attackers themselves.
      </p>
      <p>
        From a societal point of view, automation in cybersecurity is not so much about
replacing IT staf than make them more eficient. Only 5% of respondents to SANS
survey [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] expect automation to result in a reduction in stafing. There is a consensus
among many reports [
        <xref ref-type="bibr" rid="ref10 ref2 ref4">2, 4, 10</xref>
        ] that automation does, on one side, free up time for staf
to focus on higher valued tasks, and in another side, improve staf eficiency on those
more important tasks. The question is not if automated tasks will replace humans, but
how humans will interact with automated tasks. This last point relates to the notion of
Cyber Centaur discussed by Aksela in a blog post [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] of 2018.
      </p>
      <p>
        Still on the societal point of view, this increase of automation raises the concerns of
risk evaluation and acceptation by the general society. Among those are the questions
of privacy (and security in general) of automatically shared information. Indeed, 59%
of respondents to IBM’s survey [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] believe in threat intelligence sharing, and 57% of
organizations already share information with government and/or industry peers about
cyber threats and vulnerabilities. In a federated cybersecurity defense setting, those
processes are likely to be automated.
      </p>
      <p>
        Even if the interest in cybersecurity automation is recognized, its deployment varies
greatly among industries and countries [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. For example, the deployment of automation
in France is notably lower than in similarly developed countries, with nearly half of
respondents working in organizations without deployed automation [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In particular,
only 14% of respondents to the 2021 barometer of CESIN (https://www.cesin.fr) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
declared having a Security Orchestration, Automation and Response (SOAR) system
deployed in their company. It can therefore be expected to see an increase of
automation in cybersecurity, with 1 out of 4 respondents [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] identifying the “lack of advanced
technologies such as automation” as a challenge to improve cyber resilience. However,
it is not only a question of adoption, but also a question of development of new and
improved solutions. This is emphasized by the gap between the lower satisfaction level
of prior automation projects compared to the anticipated satisfaction level of current
projects [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is also driven by the development of new regulations (such as GDPR,
China Internet Security Law and APEC Privacy Framework) which, according to nearly
3 out of 4 respondents [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], influence the adoption of automation.
3. C&amp;ESAR 2021 Call
In this context, C&amp;ESAR solicited submissions presenting clear surveys, innovative
solutions, or insightful experience reports on the subject of “automation in cybersecurity”.
      </p>
      <p>The scope of the call covered:
• all steps of cybersecurity, from DevSecOps to operational cyberdefense or
pentesting;
• all types of products or context, including for example: networks, embedded
systems, industrial systems, IoT, edge computing, …;
• all levels of automation, from partial to full automation (as long as a clear benefit
is provided by the automated part).</p>
      <p>The topics of the call included (without being limited to them) those mentioned in
the previous section as well as, for example:</p>
      <p>• societal impact of automation;
• privacy and intellectual property in an automated context;
• automation in federated processes (cyber intelligence publication and integration,
federated defense and response, …);
• human/machine interaction in a context of partial automation: automatic
preprocessing for manual processes, manual selection of automatic processes, iteration in
human/machine processes, manual inputs to automatic processes, manual
validation of automatic processes, feedback to humans, …;
• verification and validation of automation.</p>
      <p>C&amp;ESAR received 32 submissions. Among those 20 proposals have been selected for
the final round of reviews (63% pre-selection rate); out of those pre-selected proposals,
16 have been selected for presentation at the conference (a 80% acceptation rate for the
ifnal round of reviews, and a 50% overall acceptation rate for the conference). Finally,
14 of the presented papers have been selected for inclusion in the proceedings (an overall
acceptation rate of 44% for the proceedings).</p>
    </sec>
    <sec id="sec-3">
      <title>4. Program committee</title>
      <p>This peer review has been made possible thanks to the dedication of the members of the
following program committee:
• Erwan Abgrall
• José Araujo, Orange Cyberdéfense
• Frédéric Besson, Université de Rennes 1
• Christophe Bidan, CentraleSupélec
• Yves Correc, ARCSI
• Frédéric Cuppens, Polytechnique Montréal
• Herve Debar, Télécom SudParis
• Ivan Fontarensky, Thales
• Julien Francq, Naval Group
• Brittia Guiriec, DGA MI
• Gurvan Le Guernic, DGA MI &amp; Université de Rennes 1
• Frédéric Majorczyk, DGA MI &amp; CentraleSupélec
• Guillaume Meier, Airbus R&amp;D
• Laurence Ogor, DGA MI
• Marc-Oliver Pahl, IMT Atlantique &amp; Chaire Cyber CNI
• Yves-Alexis Perez, ANSSI
• Ludovic Pietre-Cambacedes, EDF
• Olivier Poupel, DGA MI
• Denis Real, DGA MI
• Louis RILLING, DGA MI
• Franck Rousset, DGNum
• Florence Schadle, DGA MI
• Eric Wiatrowski
port CESIN, OpinionWay, 2021. URL: https://www.cesin.fr/
fonds-documentaire-6eme-edition-du-barometre-annuel-du-cesin.html, sponsored
by CESIN.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Cyentia</given-names>
            <surname>Institute</surname>
          </string-name>
          , Cyentia Cybersecurity Research Library, Search results for ”automation”,
          <year>2021</year>
          . URL: https://library.cyentia.com/search.html?q=automation.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Ponemon</given-names>
            <surname>Institute</surname>
          </string-name>
          ,
          <article-title>The 2020 Study on Stafing the IT Security Function in the Age of Automation: United States</article-title>
          and
          <string-name>
            <given-names>United</given-names>
            <surname>Kingdom</surname>
          </string-name>
          ,
          <source>Technical Report</source>
          , Ponemon Institute,
          <year>2020</year>
          . URL: https://www.domaintools.com/resources/survey-reports/
          <year>2020</year>
          <article-title>-ponemon-survey-report-staffing-the-it-security-function, sponsored by DomainTools</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>SANS</given-names>
            <surname>Institute</surname>
          </string-name>
          ,
          <source>2020 SANS Automation and Integration Survey</source>
          ,
          <source>Technical Report, SANS Institute</source>
          ,
          <year>2020</year>
          . URL: https://www.sans.org/reading-room/whitepapers/ analyst/2020-automation-integration-survey-
          <volume>39575</volume>
          , sponsored by Swimlane.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>IBM</given-names>
            <surname>Security</surname>
          </string-name>
          ,
          <source>Cyber Resilient Organization Report, Technical Report, IBM Corporation</source>
          ,
          <year>2020</year>
          . URL: https://www.ibm.com/account/reg/us-en/subscribe?formid= urx
          <article-title>-45839, produced jointly between Ponemon Institute and IBM Security: the research is conducted independently by Ponemon Institute and results are sponsored, analyzed, reported and published by IBM Security</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>IBM</given-names>
            <surname>Security</surname>
          </string-name>
          ,
          <source>Cost of a Data Breach Report, Technical Report, IBM Corporation</source>
          ,
          <year>2020</year>
          . URL: https://www.ibm.com/security/data-breach,
          <article-title>produced jointly between Ponemon Institute and IBM Security: the research is conducted independently by Ponemon Institute, and the results are sponsored, analyzed, reported and published by IBM Security</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Osterman</given-names>
            <surname>Research</surname>
          </string-name>
          ,
          <article-title>How to Minimize the Impact of the Cybersecurity Skills Shortage</article-title>
          , White Paper, Osterman Research,
          <year>2020</year>
          . URL: https://www.trustwave.com/en-us/resources/library/documents/ how-to
          <article-title>-minimize-the-impact-of-the-cybersecurity-skills-shortage/, sponsored by Trustwave</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Deloitte</surname>
          </string-name>
          ,
          <source>The future of cyber survey</source>
          <year>2019</year>
          ,
          <string-name>
            <surname>Technical</surname>
            <given-names>Report</given-names>
          </string-name>
          , Deloitte,
          <year>2019</year>
          . URL: https://www2.deloitte.com/us/en/pages/advisory/articles/future
          <article-title>-of-cyber-survey</article-title>
          .
          <source>html.</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Claburn</surname>
          </string-name>
          ,
          <article-title>We're not saying this is how solarwinds was backdoored, but its FTP password 'leaked on github in plaintext'</article-title>
          , in: The Register®
          <article-title>- Biting the hand that feeds IT</article-title>
          , Situation Publishing,
          <year>2020</year>
          . URL: https://www.theregister.com/
          <year>2020</year>
          /12/ 16/solarwinds_github_password/.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Goodwins</surname>
          </string-name>
          ,
          <article-title>Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again</article-title>
          , in: The Register ®
          <article-title>- Biting the hand that feeds IT</article-title>
          , Situation Publishing,
          <year>2020</year>
          . URL: https://www.theregister.com/
          <year>2020</year>
          /12/ 21/solarwinds_sunburst_evolve/.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Deloitte</surname>
          </string-name>
          , Future of cyber,
          <source>Technical Report, Deloitte</source>
          ,
          <year>2020</year>
          . URL: https://www2. deloitte.com/global/en/pages/about
          <article-title>-deloitte/articles/gx-future-of-cyber</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Aksela</surname>
          </string-name>
          ,
          <article-title>How to Build a Cyber Centaur, in:</article-title>
          <string-name>
            <surname>F-Secure</surname>
            <given-names>Life</given-names>
          </string-name>
          ,
          <source>FSecure Corporation</source>
          ,
          <year>2018</year>
          . URL: https://www.https://blog.f
          <article-title>-secure.com/ how-to-build-a-cyber-centaur/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>OpinionWay</surname>
          </string-name>
          , Baromètre de la cyber
          <article-title>-sécurité des entreprises</article-title>
          , Rap-
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>