Explore all the latest packaging trends, all at PACK EXPO International
Discover new packaging and processing solutions from 2,500+ exhibitors, all under one roof at PACK EXPO International, Nov. 3 – 6 in Chicago.

Balancing Digitalization and Security: Key Takeaways from the Cybersecurity Summit in Chicago

Consumer packaged goods companies adopting digital technologies like cloud computing and AI need to understand and protect against the security gaps these tools can create.

Consumer packaged goods companies adopting digital technologies need to be aware and ready to remedy the potential security gaps these technologies present.
Consumer packaged goods companies adopting digital technologies need to be aware and ready to remedy the potential security gaps these technologies present.
Yuichiro Chino via Getty Images

Consumer packaged goods companies can find incredible benefits by adopting emerging digital technologies, but these new tools can also bring unexpected security challenges.

That doesn't mean CPGs should avoid these technologies entirely; doing so can leave them behind the curve as the industry advances. They do need to be aware of the various security challenges that come with digital technologies though, and develop a strategy to fill those gaps for a secure and connected operation.

Presenters at Friday's Cybersecurity Summit in Chicago explored the most popular emerging technologies driving innovation today, and shared insights on how to implement these technologies while remaining secure from bad actors. 

AI as a blessing and a curse for security

Artificial intelligence (AI) security is a double-edged sword of both enhanced protection and extra vulnerabilities, Bob Kalka, global lead at IBM Security, explained at the Cybersecurity Summit. Consumer packaged goods companies can leverage AI to detect and block attacks more effectively than traditional approaches. One example is "behavioral analysis" as an extra layer of security to bolster two-factor authentication.IBM Security's Bob Kalka explains the benefits and drawbacks of AI for security at the Cybersecurity Summit in Chicago.IBM Security's Bob Kalka explains the benefits and drawbacks of AI for security at the Cybersecurity Summit in Chicago.

"Hackers don't break in, they log in," says Kalka, noting that one of the most common methods of hacking is obtaining valid login information. "Once you get the credentials and you log in, especially if it's a privileged account, you can do whatever you want. When does [the company] find out? Eventually through the threat management system, they see some anomaly."

He points to a client whom his company helped achieve a 15x decrease in user friction, or time spent entering passwords and working to log in, associated with multi-factor authentication by incorporating adaptive access and behavioral analysis.

"What is my online behavior? Well, one of my behaviors is connecting from a laptop or a desktop, or my typing rate, or my error rate in my typing. It isn't hard to come up with a profile of you of how you typically interact with your device," Kalka says. "Let's say your credentials get hacked and now you have the hacker logging into your account. The typing radar watches how they're interacting, and you can immediately see it's not the original user and you flag it. That's an example of AI that's in use right now."

After implementing this AI application, Kalka says his client reported lowering login friction to less than 1%, only needing to cause friction when behavior is inconsistent.

But the technology comes with its own security challenges, like model vulnerabilities.

One method hackers use is to "slowly poison the model so it eventually comes to the wrong conclusion," says Kalka, pointing specifically to multi-language support capabilities. "If your AI model supports a language that you don't really know, you can't even tell it's getting poisoned."

Check out new technology from 2,500+ packaging & processing suppliers
PACK EXPO International is where you can discuss real-world problems with experts and land on innovative ideas. Discover every new packaging and processing trend, see machinery in action and learn sustainable solutions from experts.
Read More
Check out new technology from 2,500+ packaging & processing suppliers
New e-book on Multipacking and Case Packing
Read how to extend the life of your case packing equipment and best practices for efficient shrink bundling operation. Plus, learn the differences between wraparound & regular slotted containers.
Read More
New e-book on Multipacking and Case Packing