Learning Library

← Back to Library

AI-Driven Secure Application Development

Key Points

  • Sridhar Muppidi predicts AI’s most consequential role in the next 5‑10 years will be in building secure‑by‑default applications.
  • Security teams are overwhelmed by data and skill gaps, and AI can boost detection accuracy, speed investigations, automate responses, and provide proactive threat protection.
  • IBM has heavily invested in AI, embedding it in hundreds of products, with a flagship solution using behavioral‑biometric analysis for continuous user risk verification and adaptive authentication friction.
  • Clients across multiple verticals (e.g., finance, telecom) are already leveraging IBM’s AI‑driven security to improve detection, accelerate investigations, and enhance automated response.
  • The long‑term vision is that AI will reduce vulnerabilities and breaches industry‑wide, while IBM secures applications, data, and infrastructure across hybrid‑cloud environments, enabling confident digital transformation.

Full Transcript

# AI-Driven Secure Application Development **Source:** [https://www.youtube.com/watch?v=rH9-m7AhJhk](https://www.youtube.com/watch?v=rH9-m7AhJhk) **Duration:** 00:03:05 ## Summary - Sridhar Muppidi predicts AI’s most consequential role in the next 5‑10 years will be in building secure‑by‑default applications. - Security teams are overwhelmed by data and skill gaps, and AI can boost detection accuracy, speed investigations, automate responses, and provide proactive threat protection. - IBM has heavily invested in AI, embedding it in hundreds of products, with a flagship solution using behavioral‑biometric analysis for continuous user risk verification and adaptive authentication friction. - Clients across multiple verticals (e.g., finance, telecom) are already leveraging IBM’s AI‑driven security to improve detection, accelerate investigations, and enhance automated response. - The long‑term vision is that AI will reduce vulnerabilities and breaches industry‑wide, while IBM secures applications, data, and infrastructure across hybrid‑cloud environments, enabling confident digital transformation. ## Sections - [00:00:00](https://www.youtube.com/watch?v=rH9-m7AhJhk&t=0s) **AI Transforming Secure Application Development** - IBM Security CTO outlines how AI will reshape cybersecurity in the coming decade by automating detection, accelerating investigations, enabling proactive protection, and continuously verifying user risk through behavioral biometrics. ## Full Transcript
0:00So where do I think AI will be in five to ten years? 0:03While the possibilities are endless I believe the most consequential will be 0:07secure application development name is Sridhar Muppidi, 0:17I'm the CTO for IBM Security. Our clients are going through a digital 0:20transformation journey, they're modernizing applications data 0:24and infrastructure. IBM delivers a number of security 0:27solutions to help our clients protect detect and respond, 0:33but the reality is that security professionals 0:36that use our offerings are inundated with 0:39too many things to do, too much of data, very little time, and too few skills. AI 0:45can have a huge impact on cyber security solutions 0:48and the professionals. Since the inception of AI 0:51we've learned that to make at the right AI system 0:55we need the right data we need to train the AI model 0:59on the right data test it for bias as well as to ensure that it is robust 1:05on the solution side. AI can help us provide accuracy in detection ai can 1:12help in accelerating the investigation and 1:14automating the response it can also help provide proactive 1:19mechanisms of protection so that you're safeguarding against 1:22threats we made a massive investment on AI, 1:25and IBM and 100 of our products use AI my favorite solution is how we use AI 1:32to do a continuous verification of a user based on behavioral biometrics 1:36this helps us evaluate the risk of a specific user for a specific session. 1:41So based on that we're able to subject the user to right amount of friction. 1:46If the risk is low we don't need to subject the user from multiple passwords 1:50on the other hand if the risk is high you may want to prompt 1:54the user for a password or even a second factor authentication. 1:57We're very fortunate to have a large number of our clients using our 2:00solutions across number of different industry verticals. A 2:03few that come to my mind are Wimbledon suggested 2:08as well as RGS Nordic this is exactly where we apply 2:12AI's speed and accuracy to help create proactive protection improve 2:18the accuracy of detection accelerate the investigation 2:23as well as improve the automation in response. We have a lot more to learn 2:28and evolve the maturity of AI in the next 2:32few decades to come. While the possibilities are endless my 2:35vision is for AI to develop secure applications by 2:39default so that they are not as vulnerable and 2:43reduce the number of breaches in the industry I believe IBM is well 2:46poised to not only help with the secure application development, 2:50but also secure data across hybrid cloud as well as secure 2:54infrastructure this ability to secure the journey to hybrid cloud 2:58will help our clients embrace digital transformation 3:01with a lot more confidence.