Monday, January 13, 2025
HomeBlogCrowdStrike survey - Cybersecurity Professionals Seek Safer, Specialist GenAI Tools

CrowdStrike survey – Cybersecurity Professionals Seek Safer, Specialist GenAI Tools

CrowdStrike survey – Cybersecurity Professionals Seek Safer, Specialist GenAI Tools

A recent CrowdStrike survey of over 1,000 cybersecurity professionals highlights the evolving role of generative AI (GenAI) in combating cyber threats. While GenAI’s potential to strengthen security defenses is clear, concerns about data exposure and system vulnerabilities remain central.


Key Insights from CrowdStrike’s GenAI Survey

The study sheds light on how cybersecurity experts view GenAI, emphasizing the need for secure, specialized, and integrated solutions. Below are the five major findings:


1. Preference for Platform-Based GenAI

  • Integrated Solutions Over Standalone Tools:
    • 80% of respondents prefer GenAI delivered through cohesive cybersecurity platforms that integrate with existing systems.
    • Seamless integration reduces complexity and improves usability.
  • Industry Shift Towards Unified Platforms:
    • 63% of professionals expressed a willingness to switch vendors for better GenAI capabilities.
    • Unified platforms streamline operations and reduce the burden of managing disparate tools.

2. Demand for Cybersecurity-Specific GenAI

  • Expertise Matters:
    • 83% of respondents distrust general-purpose GenAI tools for security purposes.
    • Tools must be designed specifically for cybersecurity to provide reliable guidance.
  • Focus on Breach Prevention:
    • With 74% of organizations experiencing breaches within 18 months, preventing future incidents is a top priority.
    • Vendors with deep expertise in threat intelligence and incident response are preferred over those with generic AI capabilities.

3. Augmentation, Not Replacement

  • Empowering Analysts:
    • GenAI is seen as a tool to assist cybersecurity professionals, not replace them.
    • Respondents highlighted its potential to:
      • Automate repetitive tasks.
      • Reduce burnout.
      • Accelerate onboarding.
      • Enhance decision-making.
  • Top Use Cases:
    • Threat intelligence analysis.
    • Investigation support.
    • Automated response mechanisms.

4. ROI Takes Precedence Over Cost

  • Focus on Tangible Benefits:
    • ROI ranks higher than licensing costs in organizational priorities.
    • Expected returns include:
      • 31% from cost optimization and efficient tools.
      • 30% from fewer incidents.
      • 26% from reduced management time.
  • Streamlined Investments:
    • Organizations see platform-based deployments as more cost-effective due to reduced training time and simplified tool management.

5. Safety and Privacy Are Non-Negotiable

  • Guardrails for GenAI Use:
    • 87% of organizations are creating or implementing policies to oversee GenAI usage.
    • Concerns include:
      • Data exposure to large language models (LLMs).
      • Vulnerability to adversarial attacks.
  • Balancing Risks and Rewards:
    • Only 39% believe GenAI’s rewards outweigh its risks.
    • 40% view the risks and rewards as evenly matched, underscoring the importance of robust safety features.

Current State of GenAI in Cybersecurity

  • Growing Adoption:
    • 64% of organizations are exploring or have invested in GenAI tools.
    • 69% of those evaluating tools plan to adopt within the year.
  • Driving Factors:
    • Improving attack detection and response.
    • Enhancing operational efficiency.
    • Addressing staff shortages.
  • Economic Considerations:
    • ROI remains the top concern as leaders seek measurable benefits from GenAI adoption.

The Path Forward: Integrated and Safe GenAI Solutions

CrowdStrike’s research emphasizes that the future of GenAI in cybersecurity hinges on tools that:

  • Seamlessly integrate with existing systems.
  • Prioritize safety and privacy.
  • Deliver measurable benefits like faster response times and reduced risks.

The report concludes that while GenAI isn’t a “silver bullet,” it holds immense potential to transform cybersecurity. Its responsible adoption, driven by specialized tools and robust safety measures, will be key to enabling security teams to operate more efficiently in the face of sophisticated cyber threats.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments