ChaptersEventsBlog
Prove your skills in Illumiverse Labs’ Breach Containment CTF. Register now to stop attackers.

Download Publication

The State of AI and Security Survey Report
The State of AI and Security Survey Report

The State of AI and Security Survey Report

Release Date: 04/02/2024

Working Group: AI Safety

The advent of artificial intelligence (AI) in cybersecurity marks a transformative era in the realm of digital defense. AI has the potential to be a vital ally for bolstering security defenses, identifying emerging threats, and facilitating swift responses. However, the journey towards integrating AI into security workflows is fraught with obstacles, including the need to mitigate dual-use concerns, bridge skill gaps, and encourage appropriate reliance on automated systems. 

Gaining insight into how industry experts view and are preparing for AI’s evolving role in cybersecurity is essential for navigating this transition. Therefore, Google Cloud commissioned CSA to develop a survey and report to better understand the current state of AI in the industry. The primary objectives were to investigate prevailing AI security challenges, industry familiarity and plans for AI, and the impact of AI on staffing and training. The survey was conducted online by CSA in November 2023 and received 2,486 responses from IT and security professionals. 

Key Findings:
  • A majority of security professionals (63%) believe in AI’s potential to enhance security measures, especially in improving threat detection and response capabilities. 
  • Only a small fraction (12%) of security professionals believe AI will completely replace their role. The majority believe it will help enhance their skill set (30%), support their role generally (28%), or replace large parts of their role (24%), freeing them up for other tasks. 
  • C-suite executives demonstrate a notably higher (52%) self-reported familiarity with AI technologies than their staff (11%).
  • 2024 is set to be a revolutionary year for AI implementation in the security sector. Over half of organizations (55%) are planning to implement generative AI solutions this year. 
Download this Resource

Bookmark
Share
Related resources

Sponsor

Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Secure Use of the Agent Payments Protocol (AP2): A Framework for Trustworthy AI-Driven Transactions
Secure Use of the Agent Payments Protocol (AP2): A Framework for Tr...
Published: 10/06/2025
From Compliance to Culture: What CISOs Need to Know About Evolving SAT
From Compliance to Culture: What CISOs Need to Know About Evolving SAT
Published: 10/02/2025
AI Log Analysis for Event Correlation in Zero Trust
AI Log Analysis for Event Correlation in Zero Trust
Published: 09/26/2025
RiskRubric: A New Compass for Secure and Responsible Model Adoption
RiskRubric: A New Compass for Secure and Responsible Model Adoption
Published: 09/18/2025
Cloudbytes Webinar Series
Cloudbytes Webinar Series
January 1 | Virtual

Acknowledgements

Hillary Baron
Hillary Baron
AVP of Research, CSA

Hillary Baron

AVP of Research, CSA

Marina Bregkou
Marina Bregkou
Principal Research Analyst, Associate VP, CSA

Marina Bregkou

Principal Research Analyst, Associate VP, CSA

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford
Senior Research Analyst, CSA

Ryan Gifford

Senior Research Analyst, CSA

Sean Heide
Sean Heide

Sean Heide

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Chief Scientific Officer, CSA

John Yeoh

Chief Scientific Officer, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training