Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions.

Data breaches are continuing to surge across industries, but particularly for healthcare, finance, and manufacturing organizations. According to industry reports, U.S. companies experienced 3,205 data breaches last year (up from 1,802 data breaches in 2022), with the average cost of a data breach in the U.S. climbing to $9.48 million in 2023.

According to Metomic’s survey findings, CISOs from both the U.S. and UK rank data breaches as their top security concern. In the U.S. AI and emerging tech follow data breaches as a top concern. In the UK, phishing schemes and compromised accounts follow data breaches as a top concern. The survey revealed that 84% of CISOs plan to focus their time and efforts on security operations in 2024, followed by strategy and planning initiatives (82%), and security awareness and training (79%). Thirty-six percent of CISOs in the U.S. report their organization uses more than 200 SaaS applications to run the business.

When looking at the biggest concerns connected to generative AI, security breaches were at the top of the list with 72% of CISOs confirming they are a primary concern, followed by sensitive company data being used to train the LLMs powering generative AI solutions.

Here is a snapshot of the biggest insights from Metomic’s CISO survey:

  • More than half of the survey respondents confirmed they have already experienced malware and phishing attacks on an occasional or frequent basis.
  • Creating and maintaining a strong security culture and awareness is a top challenge for both U.S. CISOs (41%) and UK CISOs (34%).
  • Nearly 60% of CISOs in the UK and U.S. say they should be spending more time on security ops, security awareness and training, and risk management.
  • The majority of respondents (80%) believe their organization runs security training programs for employees outside of the security organization often enough, while 93% believe employees have a high level of awareness when it comes to handling confidential and/or sensitive business data.
  • More than 80% of the CISOs surveyed somewhat or strongly agreed they can get the resources they need to do their job.
  • When looking at the number of SaaS apps businesses are currently using, 7% of U.S. CISOs and 4% of UK CISOs report their organizations have implemented more than 500 collaborative work apps.
  • Four-fifths of CISOs and IT security leaders plan to implement AI-powered tools to fight emerging AI-based security schemes and threats.

“Our research makes clear just how many challenges today’s CISOs are up against. In addition to protecting their organization against data security threats, they are prioritizing security operations and implementing training programs while trying to build a security-focused culture across the organization. They are overseeing IT budgets, monitoring SaaS environments, and calculating the impact of AI on their security efforts. It’s an exhaustive list that is becoming increasingly more difficult to manage,” said Rich Vibert, co-founder and CEO, Metomic. “As part of the cybersecurity community, we conducted this survey to offer security leaders a helpful resource when building their own data security policies. Being a CISO can feel extremely isolating, especially when it’s your job to manage the very tools your business uses to keep things moving forward. Metomic exists so that we can help CISOs better monitor their systems and networks by adding an extra layer of protection across their SaaS ecosystems.”

The reality is that the more SaaS apps a business implements and the more employees it has, the greater the risk of vulnerable company data landing in the wrong hands (industry reports claim 95% of data breaches are the result of human error). Metomic’s research found that 40% of the 6.5 million Google Drives it scanned included sensitive data that could put an organization at risk of a data breach or cybersecurity attack.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3