ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Download Publication

The State of AI and Security Survey Report
The State of AI and Security Survey Report

The State of AI and Security Survey Report

Release Date: 04/02/2024

Working Group: AI Safety

The advent of artificial intelligence (AI) in cybersecurity marks a transformative era in the realm of digital defense. AI has the potential to be a vital ally for bolstering security defenses, identifying emerging threats, and facilitating swift responses. However, the journey towards integrating AI into security workflows is fraught with obstacles, including the need to mitigate dual-use concerns, bridge skill gaps, and encourage appropriate reliance on automated systems. 

Gaining insight into how industry experts view and are preparing for AI’s evolving role in cybersecurity is essential for navigating this transition. Therefore, Google Cloud commissioned CSA to develop a survey and report to better understand the current state of AI in the industry. The primary objectives were to investigate prevailing AI security challenges, industry familiarity and plans for AI, and the impact of AI on staffing and training. The survey was conducted online by CSA in November 2023 and received 2,486 responses from IT and security professionals. 

Key Findings:
  • A majority of security professionals (63%) believe in AI’s potential to enhance security measures, especially in improving threat detection and response capabilities. 
  • Only a small fraction (12%) of security professionals believe AI will completely replace their role. The majority believe it will help enhance their skill set (30%), support their role generally (28%), or replace large parts of their role (24%), freeing them up for other tasks. 
  • C-suite executives demonstrate a notably higher (52%) self-reported familiarity with AI technologies than their staff (11%).
  • 2024 is set to be a revolutionary year for AI implementation in the security sector. Over half of organizations (55%) are planning to implement generative AI solutions this year. 
Download this Resource

Bookmark
Share
Related resources

Sponsor

Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Secure Agentic System Design: A Trait-Based Approach
Secure Agentic System Design: A Trait-Based App...
AI Log Analysis for Event Correlation in Zero Trust
AI Log Analysis for Event Correlation in Zero Trust
Published: 09/26/2025
RiskRubric: A New Compass for Secure and Responsible Model Adoption
RiskRubric: A New Compass for Secure and Responsible Model Adoption
Published: 09/18/2025
Fortifying the Agentic Web: A Unified Zero Trust Architecture Against Logic-Layer Threats
Fortifying the Agentic Web: A Unified Zero Trust Architecture Again...
Published: 09/12/2025
The Hidden Security Threats Lurking in Your Machine Learning Pipeline
The Hidden Security Threats Lurking in Your Machine Learning Pipeline
Published: 09/11/2025
Cloudbytes Webinar Series
Cloudbytes Webinar Series
January 1 | Virtual

Acknowledgements

Hillary Baron
Hillary Baron
AVP of Research, CSA

Hillary Baron

AVP of Research, CSA

Marina Bregkou
Marina Bregkou
Principal Research Analyst, Associate VP, CSA

Marina Bregkou

Principal Research Analyst, Associate VP, CSA

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford
Senior Research Analyst, CSA

Ryan Gifford

Senior Research Analyst, CSA

Sean Heide
Sean Heide

Sean Heide

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Chief Scientific Officer, CSA

John Yeoh

Chief Scientific Officer, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training