Generative AI's Role in Cybersecurity
Generative AI's Role in Cybersecurity
Generative AI
for Cybersecurity:
An Optimistic but
Uncertain Future
Jon Oltsik | Distinguished Analyst and Fellow
ENTERPRISE STRATEGY GROUP
january 2024
Research Objectives
This study sought to:
Since the introduction of ChatGPT in November 2022, generative
AI (GenAI) has been described as everything from a novelty and an • Identify current usage of and plans for generative AI.
economic boon to a threat to humanity. As this debate continued,
GenAI took center stage at the RSA Conference 2023 with the • Establish how generative AI influences the balance of power between
introduction of and subsequent hoopla around Microsoft Security cyber-adversaries and cyber-defenders.
Copilot. Many other vendors have introduced similar capabilities
since. Few would argue against the idea that GenAI (and AI in general) • Determine how organizations are approaching generative AI governance,
will have a profound impact on society and global economics, but in policies, and policy enforcement.
the near term, it introduces new risks as employees connect to GenAI
• Monitor how organizations will apply generative AI for cybersecurity
applications, share data, and build homegrown large language models
use cases.
(LLMs) of their own. These actions will inevitably expand the attack
surface, open new threat vectors, introduce software vulnerabilities,
and lead to data leakage.
Despite these risks, generative AI holds great cybersecurity potential. KEY FINDINGS:
Generative AI could help improve security team productivity,
accelerate threat detection, automate remediation actions, and guide Generative AI Has a Foothold Organizations Anticipate
incident response. These prospective benefits are so compelling that Today and Will Be Pervasive by Generative AI Risks
many CISOs are already experimenting with GenAI or building their the End of 2024
own security LLMs. At the same time, security professionals remain
anxious about how cybercriminals may use GenAI as part of attack PAGE 3 PAGE 8
campaigns, and how they can defend against these advances.
41+59+U
Many Are Already Developing Proprietary LLMs
to Support a Variety of GenAI Use Cases LLMs are already a part of
41% production generative AI applications
The research indicates that 85% of organizations have a proprietary large language model in place,
while another 13% report that they are in the process of developing one. It’s likely that many of
these are early-stage projects based on open models. Nevertheless, this data indicates robust
44+56+U
activity, forecasting rapid development of production applications in 2024.
Which business functions are ripe for GenAI applications? Organizations are well underway toward LLMs are already a part of an
ubiquitous use of GenAI in areas like IT operations, software development, sales, research, and 44% ongoing development project
others. Like “shadow IT” in the past, growing use of GenAI will introduce cyber-risks as multiple
departments and individual employees interact with open GenAI applications, experiment with
13+87+U
open source, and create their own LLMs. CISOs must assess and communicate these risks while
working with executives to create the right governance models and policies for risk mitigation.
Additionally, security professionals must implement compensating controls and monitor users and
We are just getting started
networks for anomalous, suspicious, and malicious behavior.
13% developing our own LLMs
Top five current or planned GenAI use cases.
660+340= 66%
1+99+U
IT operations
We plan to develop our own
Software development 360+640= 36%
1% LLMs in the future
Sales 290+710= 29%
1+99+U
Research 260+740= 26%
We are interested in developing
Product development 250+750= 25%
1% our own LLMs in the future
© 2024 TechTarget, Inc. All Rights Reserved. Back to Contents
Generative AI for Cybersecurity 5
Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree
Biggest risk to LLM and generative AI application development by role. IT professionals with Pure cybersecurity Overall
cybersecurity responsibilities professionals
Data
63% 630+370= 4% 40+960=
General
management 44% 440+560= security risks 1% 10+990=
risks
36% 360+640= 2% 20+980=
Alarmingly, most security professionals believe that cyber-adversaries are already using GenAI and that
adversaries always gain an advantage with new technologies. Respondents also believe that GenAI could
24% 240+760=
lead to an increase in threat volume, as it makes it easier for unskilled cyber-adversaries to develop more
sophisticated attacks. Security and IT pros are also concerned about deep fakes and automated attacks. Security defenders
Top five reasons cyber-adversaries will likely gain the biggest advantage from GenAI technology.
GenAI Broadens the Attack Surface and Expands Social Engineering Tactics
Security professionals already have lots of ideas about how adversaries will use GenAI as a component of cyberattacks. Proprietary and partner-based GenAI systems will expand
their attack surface, leading to unavoidable vulnerabilities and potential exploitation. Adversaries will use GenAI within phishing, business email compromise (BEC), and other types
of deep fakes. There is also a concern about GenAI creating new types of malware (note: researchers have already created polymorphic malware using ChatGPT).
Given the unknown tactics, techniques, and procedures (TTPs), unclear balance of power, and potential GenAI threat vectors, cybersecurity professionals must stay vigilant by
monitoring threat intelligence for signs of GenAI-based adversary TTPs and implementing the right controls for policy enforcement.
42%
Optimistic 42%
43%
41%
Excited
“Given these misgivings, CISOs should 39%
43%
its adoption.”
24%
Reserved 28%
19%
23%
Skeptical 24%
21%
Clearly, opinions vary widely, even between IT and security Overall
respondents. For example, security professionals tended to 23%
Neutral 20%
be more reserved (28% versus 19% for IT pros), fearful (23% 26%
versus 15% for IT pros), and pessimistic (20% versus 12% Pure cybersecurity professionals
19%
for IT pros). Alternatively, IT pros were more neutral than Fearful 23%
their security colleagues (26% versus 20% for security pros). 15% IT professionals with
Given these misgivings, CISOs should champion GenAI for cybersecurity responsibilities
16%
cybersecurity efforts while remaining judicious in its adoption. Pessimistic 20%
12%
13%
Dismissive 13%
13%
12%
Disillusioned 12%
11%
Level of agreement with statements related to machine learning and cybersecurity technologies.
Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree
ML has improved the efficacy and efficiency of cybersecurity technologies 50% 42% 8% 1%
Security technologies including ML often require customization for our industry, region, and/or IT environment 50% 43% 6% 1%
My organization’s experiences with ML will influence how we approach generative AI for cybersecurity 47% 46% 6% 1%
Machine learning algorithms generate excessive false positive alerts 47% 33% 9% 7% 4%
Security technologies including ML can be buggy, requiring lots of hands-on support from vendors 44% 40% 13% 2% 1%
Security technologies including ML often require tuning to improve alert accuracy 43% 49% 6% 1%
It took many years for security technology vendors to deliver ML that truly delivered incremental value 42% 49% 8% 1% 1%
My organization had to remove/replace one or several security technologies including ML because they never
42% 42% 5% 8% 2%
lived up to their promise
Looking back, the hype around machine learning for cybersecurity was excessive 42% 41% 6% 6% 5%
My organization had to remove/replace one or several security technologies including ML because the vendor
38% 43% 10% 6% 3%
was acquired, impacting the quality of the product
0% 20% 40% 60% 80% 100%
Areas in which GenAI is believed to hold the most promise for cybersecurity.
Areas in which security operations process automation supported by GenAI would be most helpful.
Generative AI
Will Become
a Purchasing
Consideration,
Though Plans Are
Still Developing
© 2024 TechTarget, Inc. All Rights Reserved. Back to Contents
Generative AI for Cybersecurity 21
Impact of security solutions with GenAI capabilities on security budget. Priorities for spending on GenAI over the next 12-24 months.
78+22+U 73+27+U
21% We will increase spending
27% Adding generative AI
for security solutions with products and/or features
generative AI capabilities to security technologies
Generative AI and Security Vendor Selection Likely strategy for augmenting security tools
with generative AI products and/or features.
54+46+U
At this point, more than half (54%) of organizations are leaning toward choosing a single vendor and technology for generative AI
security tools, but this strategy may change with time and rapid technology innovation. In fact, 31% of organizations will choose a
primary GenAI vendor/technology but selectively use others, and 15% will use GenAI capabilities across numerous or a few select
vendors/technologies.
Since GenAI-based security technologies are in their genesis phase, organizations will have to learn how to evaluate products and 54% Choose a single vendor/
technology for generative AI
capabilities as part of their RFI/RFP processes. As of now, the top purchasing considerations include vendors having a formal
documented process for data security/privacy as part of development and operations, capabilities built on top of multiple LLMs
(including open source versions), an open architecture, and lots of experience with AI/ML-based products. As previously stated,
31+69+U
CISOs will likely use the lessons learned from their previous experiences with machine learning to evaluate tools and set the right
expectations within the organization.
Choose a primary vendor/
Most important considerations for GenAI capabilities offered by security vendors.
31% technology for generative
AI but selectively use other
vendors/technologies
38% 36% 34% 33%
8+92+U
380+620= 360+640= 340+660= 330+670=
A formal documented process Capabilities built on top of An open architecture that A long history of offering
Use generative AI capabilities
8%
for data security/privacy multiple LLMs, including can accomodate data from products based on AI/ML
as part of development open source versions other security vendors as across numerous vendors/
and operations part of the LLM technologies
7+93+U
290+710= 290+710= 280+720= 280+720= Use generative AI capabilities
Capabilities built on top of
existing LLMs like GPT 4
Capabilities offered by one of
the vendors my organization
An LLM based on security
content (i.e., threat intelligence,
All LLM data being stored
within my country’s borders
7% equally across a few select
vendors/technologies
currently works with CVEs, malware analysis, etc.)
Despite these preferences, GenAI pricing is likely to be a quagmire for the foreseeable future as the market develops. Security and purchasing managers should monitor different
pricing models and compare notes with other organizations in their industry as they negotiate with vendors.
Most appropriate pricing models for security technologies that include GenAI capabilities.
ABOUT
Check Point Software Technologies Ltd. is a leading AI-powered, cloud-delivered cyber security platform provider
protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber
security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat
anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies
consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point
Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
LEARN MORE
To gather data for this report, TechTarget’s Enterprise Strategy Group conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-
sector organizations in North America between November 6, 2023 and November 21, 2023. To qualify for this survey, respondents were required to be involved with supporting and
securing, as well as using, generative AI technologies. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents.
After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, we were left
with a final total sample of 370 IT and cybersecurity professionals.
Technology 7%
5 to 10
years, 67% Healthcare 3%
2,500 to Other 5%
4,999, 23%
This publication is copyrighted by TechTarget, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express
consent of TechTarget, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact Client Relations at [email protected].
Enterprise Strategy Group is an integrated technology analysis, research, and strategy firm providing market intelligence,
actionable insight, and go-to-market content services to the global technology community.
© 2024 TechTarget, Inc. All Rights Reserved.