Cloud 101CircleEventsBlog
Call for Presentations: Share your expertise at SECtember.ai 2024! Submit your proposals by June 28th.

Download Publication

The State of AI and Security Survey Report
The State of AI and Security Survey Report

The State of AI and Security Survey Report

The advent of artificial intelligence (AI) in cybersecurity marks a transformative era in the realm of digital defense. AI has the potential to be a vital ally for bolstering security defenses, identifying emerging threats, and facilitating swift responses. However, the journey towards integrating AI into security workflows is fraught with obstacles, including the need to mitigate dual-use concerns, bridge skill gaps, and encourage appropriate reliance on automated systems. 

Gaining insight into how industry experts view and are preparing for AI’s evolving role in cybersecurity is essential for navigating this transition. Therefore, Google Cloud commissioned CSA to develop a survey and report to better understand the current state of AI in the industry. The primary objectives were to investigate prevailing AI security challenges, industry familiarity and plans for AI, and the impact of AI on staffing and training. The survey was conducted online by CSA in November 2023 and received 2,486 responses from IT and security professionals. 

Key Findings:
  • A majority of security professionals (63%) believe in AI’s potential to enhance security measures, especially in improving threat detection and response capabilities. 
  • Only a small fraction (12%) of security professionals believe AI will completely replace their role. The majority believe it will help enhance their skill set (30%), support their role generally (28%), or replace large parts of their role (24%), freeing them up for other tasks. 
  • C-suite executives demonstrate a notably higher (52%) self-reported familiarity with AI technologies than their staff (11%).
  • 2024 is set to be a revolutionary year for AI implementation in the security sector. Over half of organizations (55%) are planning to implement generative AI solutions this year. 
Download this Resource

Bookmark
Share
Related resources

Sponsor

CSA Large Language Model (LLM) Threats Taxonomy
CSA Large Language Model (LLM) Threats Taxonomy
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
AI Organizational Responsibilities - Core Security Responsibilities
AI Organizational Responsibilities - Core Secur...
AI Resilience & Diversity
AI Resilience & Diversity
Published: 06/20/2024
EU AI Act Introduces Unique Tiered System for Risks
EU AI Act Introduces Unique Tiered System for Risks
Published: 06/20/2024
5 ChatGPT Jailbreak Prompts Being Used by Cybercriminals
5 ChatGPT Jailbreak Prompts Being Used by Cybercriminals
Published: 06/17/2024
CSA Community Spotlight: Leading Critical Discussions with Vishwas Manral
CSA Community Spotlight: Leading Critical Discussions with Vishwas ...
Published: 06/14/2024
SECtember.ai 2024
SECtember.ai 2024
September 10 | Bellevue, WA

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Marina Bregkou
Marina Bregkou
Senior Research Analyst, CSA EMEA

Marina Bregkou

Senior Research Analyst, CSA EMEA

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford
Research Analyst, CSA

Ryan Gifford

Research Analyst, CSA

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training