Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

The State of AI and Security Survey Report
The State of AI and Security Survey Report

The State of AI and Security Survey Report

The advent of artificial intelligence (AI) in cybersecurity marks a transformative era in the realm of digital defense. AI has the potential to be a vital ally for bolstering security defenses, identifying emerging threats, and facilitating swift responses. However, the journey towards integrating AI into security workflows is fraught with obstacles, including the need to mitigate dual-use concerns, bridge skill gaps, and encourage appropriate reliance on automated systems. 

Gaining insight into how industry experts view and are preparing for AI’s evolving role in cybersecurity is essential for navigating this transition. Therefore, Google Cloud commissioned CSA to develop a survey and report to better understand the current state of AI in the industry. The primary objectives were to investigate prevailing AI security challenges, industry familiarity and plans for AI, and the impact of AI on staffing and training. The survey was conducted online by CSA in November 2023 and received 2,486 responses from IT and security professionals. 

Key Findings:
  • A majority of security professionals (63%) believe in AI’s potential to enhance security measures, especially in improving threat detection and response capabilities. 
  • Only a small fraction (12%) of security professionals believe AI will completely replace their role. The majority believe it will help enhance their skill set (30%), support their role generally (28%), or replace large parts of their role (24%), freeing them up for other tasks. 
  • C-suite executives demonstrate a notably higher (52%) self-reported familiarity with AI technologies than their staff (11%).
  • 2024 is set to be a revolutionary year for AI implementation in the security sector. Over half of organizations (55%) are planning to implement generative AI solutions this year. 
Download this Resource

Bookmark
Share
Related resources

Sponsor

CSA Large Language Model (LLM) Threats Taxonomy
CSA Large Language Model (LLM) Threats Taxonomy
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
AI Organizational Responsibilities - Core Security Responsibilities
AI Organizational Responsibilities - Core Secur...
Enhancing AI Reliability: Introducing the LLM Observability & Trust API
Enhancing AI Reliability: Introducing the LLM Observability & Trust...
Published: 07/19/2024
Revamping Third Party Vendor Assessments for the Age of Large Language Models
Revamping Third Party Vendor Assessments for the Age of Large Langu...
Published: 07/10/2024
Supremacy of AI in Compliance Services: The Dawn of a New Era
Supremacy of AI in Compliance Services: The Dawn of a New Era
Published: 07/02/2024
And now for something completely different… a Cloud Security Alliance RFI
And now for something completely different… a Cloud Security Allian...
Published: 07/01/2024
SECtember.ai 2024
SECtember.ai 2024
September 10 | Bellevue, WA

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Marina Bregkou
Marina Bregkou
Senior Research Analyst, CSA EMEA

Marina Bregkou

Senior Research Analyst, CSA EMEA

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford
Research Analyst, CSA

Ryan Gifford

Research Analyst, CSA

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training