SlideShare a Scribd company logo
@ema_research
| @ema_research
Securing Tomorrow:
The Role of AI in
Transforming Cybersecurity
Sponsored by:
Ken Buckler, CASP
Research Director
Enterprise Management Associates (EMA)
KBuckler@enterprisemanagement.com
Information Security, Risk, and Compliance Management
@ema_research
| @ema_research 2
Watch the On-Demand Webinar
• Securing Tomorrow: The Role of AI in Transforming Cybersecurity
On-Demand Webinar: https://info.enterprisemanagement.com/the-
role-of-ai-in-transforming-cybersecurity-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
@ema_research
| @ema_research
@ema_research
| @ema_research
Featured Speaker
Ken has over 15 years of industry experience as a noted
information and cybersecurity practitioner, software
developer, author, and presenter, focusing on endpoint
security and Federal Information Security Management Act
(FISMA) and NIST 800-53 compliance. Focusing on strict
federal security standards, Ken has consulted with numerous
federal organizations, including Defense Information Systems
Agency (DISA), Department of Veterans Affairs, and the
Census Bureau.
He was previously board chair of The Mars Generation’s
Student Space Ambassador Leadership Program, an advisory
board made up of students and professional mentors
focused on STEAM learning and advocacy. His technical
career started in the defense sector as a quality assurance
and information assurance engineer contracted with the
DISA Defense Message System (DMS), eventually designing
the top-level architecture of the Host-Based Security System
(HBSS) integration for the DMS global messaging backbone.
Ken has presented at industry conferences with his research
on early warning of cyber-attacks based on open source
intelligence (OSINT).
© 2024 Enterprise Management Associates, Inc. 3
Ken Buckler, CASP
Research Director
Information Security, Risk, and Compliance
Enterprise Management Associates (EMA)
@ema_research
| @ema_research
@ema_research
| @ema_research
Sponsors
© 2024 Enterprise Management Associates, Inc. 4
@ema_research
| @ema_research
@ema_research
| @ema_research
Looking Back
© 2023 Enterprise Management Associates, Inc. 5
The roots of human/machine collaboration trace back to the 18th
century with the advent of the "Mechanical Turk."
While the Mechanical Turk was ultimately a hoax, today’s
“generative” artificial intelligence based on pretrained models is
very real, often providing analytical and creative power at least
equal to, or sometimes more powerful than, that of humans…but
with great power comes great responsibility.
@ema_research
| @ema_research
@ema_research
| @ema_research
Research Demographics
© 2023 Enterprise Management Associates, Inc. 6
@ema_research
| @ema_research
@ema_research
| @ema_research
Key Findings
© 2023 Enterprise Management Associates, Inc. 7
36% of organizations
reported a material
security or privacy
incident due to the
usage of AI
96% of organizations
observed positive impacts
by leveraging AI
75% of organizations utilize
text generators, such as
ChatGPT or Google Bard
Impact and Results
Leveraging AI
AI Methods and Tools
@ema_research
| @ema_research
Voices of the Survey
@ema_research
| @ema_research
“
@ema_research
| @ema_research
Respondent Quotes
“AI is used in [our] underwriting processes to more precisely analyze risks.
Predictive analytics and machine learning models can examine a variety
of data sources to assess policyholder risk, enhancing decision-making
and lowering risk exposure.”
“To detect and prevent fraudulent activity, [we] employ AI algorithms for
safe client authentication, such as evaluating behavioral biometrics or
detecting patterns of valid transactions.”
“Cybersecurity education and training should be strengthened to
improve the awareness and ability of AI security and the safe and
compliant use of AI.”
© 2023 Enterprise Management Associates, Inc. 9
@ema_research
| @ema_research
@ema_research
| @ema_research 10
© 2023 Enterprise Management Associates, Inc.
@ema_research
| @ema_research
AI Usage and
Policies
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 12
@ema_research
| @ema_research
@ema_research
| @ema_research 13
© 2023 Enterprise Management Associates, Inc.
@ema_research
| @ema_research
Impacts of AI
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 15
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 16
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 17
@ema_research
| @ema_research
@ema_research
| @ema_research 18
34.9%
Data analysis and trend reporting
31.1%
Virtual cybersecurity
analyst/assistant using large
language models (i.e., ChatGPT)
12.3%
Product usage
assistance
9.4%
Alert
suppression/
correlation
8.5%
Phishing detection
1.9%
We have not invested in any AI powered or
integrated cybersecurity solution
1.9% User
behavior
analytics
© 2023 Enterprise Management Associates, Inc.
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 19
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 20
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 21
@ema_research
| @ema_research
How Effective is AI at
Pretending to Be
Human?
@ema_research
| @ema_research
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 23
Response Sophistication Low AI Confidence Medium AI Confidence High AI Confidence
Low 0 5 0
Medium 0 3 0
High 1 0 6
@ema_research
| @ema_research
Closing Thoughts
@ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc.
A substantial percentage
of organizations recognize
the critical role of AI in
shaping the future of
information security and
cyber threat intelligence.
The rise of AI-powered
attacks, including phishing,
business email
compromise, and even AI-
powered malware, poses
a growing concern.
Fortunately for humans,
the Mechanical Turk is still
not a reality and we aren’t
going to be replaced
anytime soon.
| @ema_research 25
@ema_research
| @ema_research
@ema_research
| @ema_research
Get the “Securing Tomorrow: The Role of AI in Transforming Cybersecurity” Report
Learn more and download:
https://bit.ly/ai-transforming-cybersecurity
© 2024 Enterprise Management Associates, Inc. 26

More Related Content

Similar to Securing Tomorrow: The Role of AI in Transforming Cybersecurity (20)

PDF
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
Enterprise Management Associates
 
PDF
Unlocking High Fidelity Security
Enterprise Management Associates
 
PDF
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc
 
PDF
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
 
PPTX
AI & Cyber Security presentation it is a
ateebeqbal8
 
PDF
Applying Generative AI to IT Operations Research
Enterprise Management Associates
 
PDF
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Enterprise Management Associates
 
PPTX
Vulnerability in ai
SrajalTiwari1
 
PPTX
Cyber Security Essentials: Protecting Your Digital World
nitish1240728
 
PDF
How AI Agents Are Automating Threat Detection and Cybersecurity Response_.pdf
Bluebash
 
PDF
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Enterprise Management Associates
 
PPTX
First line of defense for cybersecurity : AI
Ahmed Banafa
 
PDF
How AI can help with cybersecurity
The Gulf Entrepreneur
 
PDF
AI in Hacking
venkatvajradhar1
 
PDF
Emerging Trends in AI and Cybersecurity.pdf
Assured Technology Solutions
 
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
PDF
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
FlyWly
 
PDF
AI's Role in Adaptive Cybersecurity: Learn from Amir Parekh about Real-Time T...
amir parekh
 
PDF
EMA Megatrends in Cyber-Security
Enterprise Management Associates
 
PDF
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
Enterprise Management Associates
 
Unlocking High Fidelity Security
Enterprise Management Associates
 
TrustArc Webinar - Data Privacy and Cyber Security: A Symbiotic Relationship
TrustArc
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
 
AI & Cyber Security presentation it is a
ateebeqbal8
 
Applying Generative AI to IT Operations Research
Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Enterprise Management Associates
 
Vulnerability in ai
SrajalTiwari1
 
Cyber Security Essentials: Protecting Your Digital World
nitish1240728
 
How AI Agents Are Automating Threat Detection and Cybersecurity Response_.pdf
Bluebash
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Enterprise Management Associates
 
First line of defense for cybersecurity : AI
Ahmed Banafa
 
How AI can help with cybersecurity
The Gulf Entrepreneur
 
AI in Hacking
venkatvajradhar1
 
Emerging Trends in AI and Cybersecurity.pdf
Assured Technology Solutions
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
Securing Tomorrow _ Exploring the Future of AI in Cyber Security.pdf
FlyWly
 
AI's Role in Adaptive Cybersecurity: Learn from Amir Parekh about Real-Time T...
amir parekh
 
EMA Megatrends in Cyber-Security
Enterprise Management Associates
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
venkatvajradhar1
 

More from Enterprise Management Associates (20)

PDF
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Enterprise Management Associates
 
PDF
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
Enterprise Management Associates
 
PDF
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
Enterprise Management Associates
 
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Enterprise Management Associates
 
PDF
Network Observability: Managing Performance Across Hybrid Networks
Enterprise Management Associates
 
PDF
Zero Trust Networking: How Network Teams Support Cybersecurity
Enterprise Management Associates
 
PDF
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
Enterprise Management Associates
 
PPTX
Network as a Service: Understanding the Cloud Consumption Model in Networking
Enterprise Management Associates
 
PDF
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Enterprise Management Associates
 
PDF
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
Enterprise Management Associates
 
PDF
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
Enterprise Management Associates
 
PDF
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Enterprise Management Associates
 
PDF
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
Enterprise Management Associates
 
PDF
EMA AIOps Radar: A Guide to Investing in Innovation
Enterprise Management Associates
 
PDF
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Enterprise Management Associates
 
PDF
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
Enterprise Management Associates
 
PDF
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
PDF
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Enterprise Management Associates
 
PDF
Real-world incident response, management, and prevention
Enterprise Management Associates
 
PDF
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Enterprise Management Associates
 
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
Enterprise Management Associates
 
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
Enterprise Management Associates
 
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Enterprise Management Associates
 
Network Observability: Managing Performance Across Hybrid Networks
Enterprise Management Associates
 
Zero Trust Networking: How Network Teams Support Cybersecurity
Enterprise Management Associates
 
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
Enterprise Management Associates
 
Network as a Service: Understanding the Cloud Consumption Model in Networking
Enterprise Management Associates
 
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Enterprise Management Associates
 
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
Enterprise Management Associates
 
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
Enterprise Management Associates
 
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Enterprise Management Associates
 
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
Enterprise Management Associates
 
EMA AIOps Radar: A Guide to Investing in Innovation
Enterprise Management Associates
 
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Enterprise Management Associates
 
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
Enterprise Management Associates
 
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Enterprise Management Associates
 
Real-world incident response, management, and prevention
Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
Ad

Recently uploaded (20)

PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Ad

Securing Tomorrow: The Role of AI in Transforming Cybersecurity