---
description: Discover what it takes to successfully implement AI to enhance cyber defences and how Aussie IT professionals plan to invest in AI.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Australian IT professionals are optimistic to enhance cyber defences with AI
---

# Plan, prioritise, and prepare: How to get AI ready to enhance cyber defence in Australia

Canonical: https://www.getapp.com.au/blog/7551/how-to-get-AI-ready-for-cyber-defence

Published on 12/11/2024 | Written by David Jani, Andrew Blair.

![Plan, prioritise, and prepare: How to get AI ready to enhance cyber defence in Australia](https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg)

> In part one of this two-part report on data security, we found that software vulnerability is the most common cause of a data breach in Australia. In this article, we find out how IT professionals are investing in AI to enhance cyber defences and restrict the proliferation of data breaches. Above all, IT professionals in Australia are optimistic that AI can enhance cyber defences encouraging protection against cyberattacks.

-----

## Article Content

In part one of this two-part report on data security, we found that software vulnerability is the most common cause of a data breach in Australia. In this article, we find out how IT professionals are investing in AI to enhance cyber defences and restrict the proliferation of data breaches. Above all, IT professionals in Australia are optimistic that AI can enhance cyber defences encouraging protection against cyberattacks.In this articleMost Aussie IT professionals believe AI will help enhance defences not attacksIT security spending in Australia is higher than the global average and nearly all IT professionals are investing in AI96% of Aussie IT professionals are using AI-assisted cybersecurity toolsPlan, prioritise, and prepare for successful AI implementation in cybersecurityArtificial intelligence in cybersecurity can be both an emerging threat and an opportunity. Nevertheless, the overall sentiment among IT professionals on using AI in cybersecurity is positive rather than negative, with respondents highlighting top benefits such as advanced malware detection and real-time monitoring. These findings featured amongst many found in GetApp’s 2024 Data Security Survey, which studied the responses of 4,000 respondents in 11 countries and featured answers from 350 Australian participants.\*An increasing number of firms are now considering leveraging AI in cybersecurity. Various signs indicate their readiness to embrace these systems, including their interest in investing substantially in their use over the coming months. Our research shows that professionals see a clear value in using AI to secure their networks, cloud resources, and data. However, it is important for IT leaders to plan for this adoption carefully, taking into account the necessary use cases, preparing the dataset that will be used, and providing enough human guardrails.Key insights56% of Australian IT and data security professionals see AI as a greater ally than a threat.91% of Aussie respondents expect spending on cybersecurity to increase in 2025.AI solutions for network security (41%) and cloud security (40%) are considered the biggest investment priorities in Australia.47% of Aussie respondents use AI tools for advanced malware detection.Most Aussie IT professionals believe AI will help enhance defences not attacksAI technology has often garnered a bad reputation in cybersecurity. This is partly due to its misuse to generate more potent phishing emails and deepfake impersonation of staff including other ways to expose vulnerabilities faster. However, there’s a lot more to AI than bringing harm to businesses.Various facets of AI, such as machine learning \[2\], neural networks \[3\], natural language processing (NLP) \[4\], and deep learning \[5\], can present opportunities for cyber defence. They can also prove highly useful for automating tasks and helping systems identify threats more precisely.     This implication of considering AI as an opportunity rather than a danger in security is clearly seen amongst the cybersecurity participants of our survey. In Australia, for instance, 56% of participants see a greater potential for artificial intelligence to boost business cybersecurity defences rather than solely create new vulnerabilities or enhance attacks. Australian respondents are slightly less optimistic than the global average about AI helping security defences (62%) and more pessimistic about it helping cybercriminals enhance their attacks (38%). These signs indicate businesses’ desire to embrace AI rather than seeing it as the cause of worse threats. However, it’s worth considering that the fear of AI's malicious uses could drive the interest in more robust network monitoring and automation solutions in cybersecurity that AI itself provides the solutions for.IT security spending in Australia is higher than the global average and nearly all IT professionals are investing in AIWith the findings suggesting optimism about AI's potential in cybersecurity defence, it’s worth unpacking what inspires such confidence. As already mentioned, AI is multifaceted and can influence many areas of cyber defence. This affects how companies choose systems and prioritise their security spending accordingly.We looked at the areas companies aim to prioritise when implementing AI systems in cybersecurity. In terms of investments, the top priorities identified by Australian respondents centre on monitoring across essential areas such as networks, cloud services, and emails. Additionally, IT professionals suggest their companies see the use of AI to detect cybersecurity threats more widely as a necessity.This is also widespread behaviour with 98% of Australian respondents identifying at least one AI investment priority and only 2% choosing none of the available options.Another element that will affect AI investment is spending dedicated to cybersecurity more generally. Looking at year-on-year figures, this is currently high and expected to remain high into 2025 compared to the global average.The ongoing commitment to security spending is a worthwhile step to get ahead of some of the considerable threats detailed in our sample. However, the desire to raise and maintain spending is also likely to be driven by a willingness to stay security compliant more generally, avoid falling behind competitors, and capitalise on the investment priorities noted above.96% of Aussie IT professionals are using AI-assisted cybersecurity toolsAs cyberthreats become more advanced, IT professionals need constant mechanisms to detect threats and monitor systems. AI-assisted threat detection and security monitoring can reduce some of that workload. We’ve already seen that AI investment is primarily focused on tools to assist with security monitoring. This emphasis on monitoring and detection appears to be reflected amongst those who have already adopted AI-powered security systems.In total, 96% of Australian respondents are using AI-assisted cybersecurity tools in some capacity, with most using them for a variety of threat detection. Amongst Australian firms advanced malware detection stood out as the top use, with real-time monitoring also proving popular amongst companies.  Plan, prioritise, and prepare for successful AI implementation in cybersecurityWhile there are solid reasons to introduce AI into a cybersecurity plan in the near future, the process shouldn’t be rushed, even if time is imperative.Integration of AI into a business’s cybersecurity defences can be a long process and it’s important to factor this into planning. A recent article by Gartner identifies four key areas of focus for getting firms’ IT ready to leverage AI. These include defining the use of AI tools, assessing deployment necessities, making data ‘AI-ready,’ and adopting AI principles. \[1\] To help achieve these steps, we’ve highlighted three tips below to ready your firm for AI cybersecurity implementation. 1. Plan: Identify where and how AI can enhance IT securityThe first step to any AI deployment is to set goals for its usage. Having clear goals for this usage can help organise preparations for implementation and plan the use of staff and resources more effectively. It’s better to prioritise areas where AI can help drive better protection of systems that need constant surveillance. As our data shows, this applies primarily to network security, cloud security, and threat detection. Another important consideration is to check how this will affect the organisation’s current tech stack. Based on changing business needs and market trends, businesses have to decide whether to opt for a new software entirely or adopt unutilised features of an existing system. In many cases, businesses can add AI features to an existing security system suite by introducing new features and tiers to their existing software.2. Prioritise: Develop a human-in-the-loop (HITL) approachThe use of machine learning and deep learning automations in cybersecurity isn’t quite as contentious as other areas where AI can be used, such as the application of generative AI in marketing. However, whilst monitoring and automation of cybersecurity can help IT teams save time and enhance protection, human intervention is necessary to avoid errors that a machine could miss due to faulty programming or limited capabilities.A human-in-the-loop approach can help ensure smooth operations even with most AI-managed tasks, especially when considering AI deployment and applying ethical AI principles. Human decision-making should still be able to override AI and allow a person to act on threat intelligence manually when needed. Additionally, businesses should set clear guardrails to avoid improper data use and stay compliant with regulations.     To get ready for the use of AI in a company, firms will need to provide sufficient security training courses that empower staff to use AI tools effectively. This should focus on how and where human intervention is needed, how to remain data compliant when using data for AI training, and a technical understanding of identifying bugs when managing AI.3. Prepare: Ensure data is AI-readyUsing AI for effective results requires users to input quality data into the system. This information needs to be organised and readable to help the AI system carry out its tasks more accurately and reduce performance errors. There are a few key factors to focus on to get data AI-ready.Data management and data governance are highly important to AI adoption. The data that can be accessed and used by a system must be checked carefully and organised into an error-free, readable, and uniform format for an AI system to put it to effective use.Once data is prepared for use by an AI process, there is an important decision to be made on whether to use a system fed with information primarily from public datasets. Companies can simply opt to use their own in-house data sets exclusively. Alternatively, they can partially or entirely use proprietary data sets belonging to the software maker providing the AI system. Managing the data process in-house can be more challenging and expensive, but it also provides a more bespoke service for the user.Protecting any data you share with the system is also highly important. In theory, AI-assisted cybersecurity software should take care of much of that but there are still ways that data could be compromised. For example, data poisoning can make a secure system more vulnerable to attacks (a factor that 38% of Australian respondents noted as a concern).Looking for cybersecurity software? Check out our catalogue\!

## Disclaimer

> Methodology\*GetApp’s 2024 Data Security Survey was conducted online in August 2024 among 4,000 respondents in Australia (n=350), Brazil (n=350), Canada (n=350), France (n=350), India (n=350), Italy (n=350), Japan (n=350), Mexico (n=350), Spain (n=350), the U.K. (n=350), and the U.S. (n=500) to learn more about data security practices at businesses around the world. Respondents were screened for full-time employment in an IT role with responsibility for, or full knowledge of, their company's data security measures.SourcesGet AI Ready: Action plan for IT Leaders, Gartner Machine Learning, CapterraNeural Networks, GartnerNatural Language Processing (NLP), CapterraDeep Learning, Gartner

## About the authors

### David Jani

David is a Content Analyst for the UK, providing key insights into tech, software and business trends for SMEs. Cardiff University graduate. He loves traveling, cooking and F1.

### Andrew Blair

Andrew is a Content Analyst for GetApp, giving SMEs insights into tech, software and business trends. Interest in entrepreneurship, furthering projects and startups. 

## Related Categories

- [Artificial Intelligence (AI) Software](https://www.getapp.com.au/directory/1397/artificial-intelligence/software)
- [Cloud Security Software](https://www.getapp.com.au/directory/291/cloud-security/software)
- [Cybersecurity Software](https://www.getapp.com.au/directory/1035/cybersecurity/software)
- [Network Monitoring Tools](https://www.getapp.com.au/directory/480/network-monitoring/software)
- [Network Security Software](https://www.getapp.com.au/directory/1443/network-security/software)

## Related Articles

- [Data security processes: What do Australians expect from organisations?](https://www.getapp.com.au/blog/3663/data-security-australia)
- [Speed of virtualisation – 52% Aussie organisations conduct most or all of their business online](https://www.getapp.com.au/blog/1898/speed-of-virtualisation-half-conduct-most-of-their-business-online)
- [Best Free Password Managers For Australian SMEs In 2020](https://www.getapp.com.au/blog/1393/best-free-password-managers-australian-smes-2020)
- [Australian consumer search behaviour: A study of privacy concerns and trust](https://www.getapp.com.au/blog/3580/consumer-search-behaviour)
- [AI cyberattacks push 66% Aussie companies to have a deepfake response plan](https://www.getapp.com.au/blog/6892/deepfake-response-plan-ai-cyberattacks)

## Links

- [View on GetApp](https://www.getapp.com.au/blog/7551/how-to-get-AI-ready-for-cyber-defence)
- [Blog](https://www.getapp.com.au/blog)
- [Home](https://www.getapp.com.au/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"GetApp Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Review, Compare and Evaluate small business software. GetApp Australia has software offers, SaaS and Cloud Apps, independent evaluations and reviews.","email":"info@getapp.com.au","url":"https://www.getapp.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/getapp/getapp-logo-light-mode-5f7ee07199c9b3b045bc654a55a2b9fa.svg","@type":"Organization","@id":"https://www.getapp.com.au/#organization","parentOrganization":"G2.com, Inc.","sameAs":["https://twitter.com/getapp","https://www.facebook.com/GetAppcom","https://www.instagram.com/getappcom/","https://www.youtube.com/c/GetAppCom"]},{"name":"GetApp Australia","url":"https://www.getapp.com.au/","@type":"WebSite","@id":"https://www.getapp.com.au/#website","publisher":{"@id":"https://www.getapp.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.getapp.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Australian IT professionals are optimistic to enhance cyber defences with AI","description":"Discover what it takes to successfully implement AI to enhance cyber defences and how Aussie IT professionals plan to invest in AI.","url":"https://www.getapp.com.au/blog/7551/how-to-get-AI-ready-for-cyber-defence","about":{"@id":"https://www.getapp.com.au/#organization"},"@type":"WebPage","@id":"https://www.getapp.com.au/blog/7551/how-to-get-AI-ready-for-cyber-defence#webpage","isPartOf":{"@id":"https://www.getapp.com.au/#website"}},{"description":"In part one of this two-part report on data security, we found that software vulnerability is the most common cause of a data breach in Australia. In this article, we find out how IT professionals are investing in AI to enhance cyber defences and restrict the proliferation of data breaches. Above all, IT professionals in Australia are optimistic that AI can enhance cyber defences encouraging protection against cyberattacks.","author":[{"name":"David Jani","@type":"Person"},{"name":"Andrew Blair","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg","@type":"ImageObject","@id":"https://www.getapp.com.au/blog/7551/how-to-get-AI-ready-for-cyber-defence#primaryimage"},"headline":"Plan, prioritise, and prepare: How to get AI ready to enhance cyber defence in Australia","@type":"BlogPosting","datePublished":"2024-11-12T19:30:03.000000Z","publisher":{"@id":"https://www.getapp.com.au/#organization"},"inLanguage":"en-AU","articleBody":"&lt;p&gt;&lt;b&gt;In part one of this two-part report on data security, we found that &lt;/b&gt;&lt;a href=&quot;/blog/7539/advanced-phishing-attacks-top-worry-it-professionals&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;software vulnerability&lt;/b&gt;&lt;/a&gt;&lt;b&gt; is the most common cause of a data breach in Australia. In this article, we find out how IT professionals are investing in AI to enhance cyber defences and restrict the proliferation of data breaches. Above all, IT professionals in Australia are optimistic that AI can enhance cyber defences encouraging protection against cyberattacks.&lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;cyber-security-threats&quot; alt=&quot;protect against cyber security threats&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/6Dmj-c_O8H7fKnTPlgGgSBHD_x1jscX4ivw3gjtYi-c/4a466fe803ee470f4d77fe6368fb8474/cyber-security-threats.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;In this article&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#Most-Aussie-IT-professionals-believe-AI-will-help-enhance-defences-not-attacks&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Most Aussie IT professionals believe AI will help enhance defences not attacks&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#IT-security-spending-in-Australia-is-higher-than-the-global-average-and-nearly-all-IT-professionals-are-investing-in-AI&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;IT security spending in Australia is higher than the global average and nearly all IT professionals are investing in AI&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#96-of-Aussie-IT-professionals-are-using-AI-assisted-cybersecurity-tools&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;96% of Aussie IT professionals are using AI-assisted cybersecurity tools&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Plan-prioritise-and-prepare-for-successful-AI-implementation-in-cybersecurity&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;table-of-contents&quot; data-evdst=&quot;jump-to_section&quot; data-evdtl=&quot;text-link_section-name&quot;&gt;Plan, prioritise, and prepare for successful AI implementation in cybersecurity&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Artificial intelligence in &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity&lt;/a&gt; can be both an emerging threat and an opportunity. Nevertheless, the overall sentiment among IT professionals on using AI in cybersecurity is positive rather than negative, with respondents highlighting top benefits such as advanced malware detection and real-time monitoring. These findings featured amongst many found in GetApp’s 2024 Data Security Survey, which studied the responses of 4,000 respondents in 11 countries and featured answers from 350 Australian participants.*&lt;/p&gt;&lt;p&gt;An increasing number of firms are now considering leveraging AI in cybersecurity. Various signs indicate their readiness to embrace these systems, including their interest in investing substantially in their use over the coming months. Our research shows that professionals see a clear value in using AI to secure their networks, cloud resources, and data. However, it is important for IT leaders to plan for this adoption carefully, taking into account the necessary use cases, preparing the dataset that will be used, and providing enough human guardrails.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 26 28&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-star box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path d=&quot;M26 10.109c0 0.281-0.203 0.547-0.406 0.75l-5.672 5.531 1.344 7.812c0.016 0.109 0.016 0.203 0.016 0.313 0 0.406-0.187 0.781-0.641 0.781-0.219 0-0.438-0.078-0.625-0.187l-7.016-3.687-7.016 3.687c-0.203 0.109-0.406 0.187-0.625 0.187-0.453 0-0.656-0.375-0.656-0.781 0-0.109 0.016-0.203 0.031-0.313l1.344-7.812-5.688-5.531c-0.187-0.203-0.391-0.469-0.391-0.75 0-0.469 0.484-0.656 0.875-0.719l7.844-1.141 3.516-7.109c0.141-0.297 0.406-0.641 0.766-0.641s0.625 0.344 0.766 0.641l3.516 7.109 7.844 1.141c0.375 0.063 0.875 0.25 0.875 0.719z&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Key insights&lt;/div&gt;&lt;ul&gt;&lt;li&gt;56% of Australian IT and data security professionals see AI as a greater ally than a threat.&lt;/li&gt;&lt;li&gt;91% of Aussie respondents expect spending on cybersecurity to increase in 2025.&lt;/li&gt;&lt;li&gt;AI solutions for network security (41%) and cloud security (40%) are considered the biggest investment priorities in Australia.&lt;/li&gt;&lt;li&gt;47% of Aussie respondents use AI tools for advanced malware detection.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Most-Aussie-IT-professionals-believe-AI-will-help-enhance-defences-not-attacks&quot;&gt;Most Aussie IT professionals believe AI will help enhance defences not attacks&lt;/h2&gt;&lt;p&gt;AI technology has often garnered a bad reputation in cybersecurity. This is partly due to its misuse to generate more potent phishing emails and &lt;a href=&quot;/blog/6892/deepfake-response-plan-ai-cyberattacks&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;deepfake impersonation of staff&lt;/a&gt; including other ways to expose vulnerabilities faster. However, there’s a lot more to AI than bringing harm to businesses.&lt;/p&gt;&lt;p&gt;Various facets of AI, such as machine learning [2], neural networks [3], natural language processing (NLP) [4], and deep learning [5], can present opportunities for cyber defence. They can also prove highly useful for automating tasks and helping systems identify threats more precisely.     &lt;/p&gt;&lt;p&gt;This implication of considering AI as an opportunity rather than a danger in security is clearly seen amongst the cybersecurity participants of our survey. In Australia, for instance, 56% of participants see a greater potential for artificial intelligence to boost business cybersecurity defences rather than solely create new vulnerabilities or enhance attacks. &lt;/p&gt;&lt;img title=&quot;1-AI-help-cyber-AU-GA-donut-chart&quot; alt=&quot;Donut chart showing most Australian IT professionals believe AI is more of an aid than it is a threat to cybersecurity efforts&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/5zfmDCbhCx7hY9tXYZQHCG/297b92b90c29660c8ff9048db79be178/1-AI-help-cyber-AU-GA-donut-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/5zfmDCbhCx7hY9tXYZQHCG/297b92b90c29660c8ff9048db79be178/1-AI-help-cyber-AU-GA-donut-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/5zfmDCbhCx7hY9tXYZQHCG/297b92b90c29660c8ff9048db79be178/1-AI-help-cyber-AU-GA-donut-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/5zfmDCbhCx7hY9tXYZQHCG/297b92b90c29660c8ff9048db79be178/1-AI-help-cyber-AU-GA-donut-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/5zfmDCbhCx7hY9tXYZQHCG/297b92b90c29660c8ff9048db79be178/1-AI-help-cyber-AU-GA-donut-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/5zfmDCbhCx7hY9tXYZQHCG/297b92b90c29660c8ff9048db79be178/1-AI-help-cyber-AU-GA-donut-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Australian respondents are slightly less optimistic than the global average about AI helping security defences (62%) and more pessimistic about it helping cybercriminals enhance their attacks (38%). &lt;/p&gt;&lt;p&gt;These signs indicate businesses’ desire to embrace AI rather than seeing it as the cause of worse threats. However, it’s worth considering that the fear of AI&amp;#39;s malicious uses could drive the interest in more robust &lt;a href=&quot;/directory/480/network-monitoring/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;network monitoring&lt;/a&gt; and automation solutions in cybersecurity that AI itself provides the solutions for.&lt;/p&gt;&lt;h2 id=&quot;IT-security-spending-in-Australia-is-higher-than-the-global-average-and-nearly-all-IT-professionals-are-investing-in-AI&quot;&gt;IT security spending in Australia is higher than the global average and nearly all IT professionals are investing in AI&lt;/h2&gt;&lt;p&gt;With the findings suggesting optimism about AI&amp;#39;s potential in cybersecurity defence, it’s worth unpacking what inspires such confidence. As already mentioned, AI is multifaceted and can influence many areas of cyber defence. This affects how companies choose systems and prioritise their security spending accordingly.&lt;/p&gt;&lt;p&gt;We looked at the areas companies aim to prioritise when implementing AI systems in cybersecurity. In terms of investments, the top priorities identified by Australian respondents centre on monitoring across essential areas such as networks, cloud services, and emails. Additionally, IT professionals suggest their companies see the use of AI to detect cybersecurity threats more widely as a necessity.&lt;/p&gt;&lt;img title=&quot;2-priorities-investment-AU-GA-bar-chart&quot; alt=&quot;Bar chart showing where Australian businesses are prioritising AI investments in cybersecurity&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/1BXbbqBXO20k05lHiDo2D7/28631187f93e57db4dfe98bf3ec59525/2-priorities-investment-AU-GA-bar-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/1BXbbqBXO20k05lHiDo2D7/28631187f93e57db4dfe98bf3ec59525/2-priorities-investment-AU-GA-bar-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/1BXbbqBXO20k05lHiDo2D7/28631187f93e57db4dfe98bf3ec59525/2-priorities-investment-AU-GA-bar-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/1BXbbqBXO20k05lHiDo2D7/28631187f93e57db4dfe98bf3ec59525/2-priorities-investment-AU-GA-bar-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/1BXbbqBXO20k05lHiDo2D7/28631187f93e57db4dfe98bf3ec59525/2-priorities-investment-AU-GA-bar-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/1BXbbqBXO20k05lHiDo2D7/28631187f93e57db4dfe98bf3ec59525/2-priorities-investment-AU-GA-bar-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;This is also widespread behaviour with 98% of Australian respondents identifying at least one AI investment priority and only 2% choosing none of the available options.&lt;/p&gt;&lt;p&gt;Another element that will affect AI investment is spending dedicated to cybersecurity more generally. Looking at year-on-year figures, this is currently high and expected to remain high into 2025 compared to the global average.&lt;/p&gt;&lt;p&gt;The ongoing commitment to security spending is a worthwhile step to get ahead of some of the &lt;a href=&quot;/blog/6922/senior-executive-security-awareness-training-programs&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;considerable threats detailed in our sample&lt;/a&gt;. However, the desire to raise and maintain spending is also likely to be driven by a willingness to stay security compliant more generally, avoid falling behind competitors, and capitalise on the investment priorities noted above.&lt;/p&gt;&lt;h2 id=&quot;96-of-Aussie-IT-professionals-are-using-AI-assisted-cybersecurity-tools&quot;&gt;96% of Aussie IT professionals are using AI-assisted cybersecurity tools&lt;/h2&gt;&lt;p&gt;As cyberthreats become more advanced, IT professionals need constant mechanisms to detect threats and monitor systems. AI-assisted threat detection and security monitoring can reduce some of that workload. We’ve already seen that AI investment is primarily focused on tools to assist with security monitoring. This emphasis on monitoring and detection appears to be reflected amongst those who have already adopted AI-powered security systems.&lt;/p&gt;&lt;p&gt;In total, 96% of Australian respondents are using AI-assisted cybersecurity tools in some capacity, with most using them for a variety of threat detection. Amongst Australian firms advanced malware detection stood out as the top use, with real-time monitoring also proving popular amongst companies.  &lt;/p&gt;&lt;img title=&quot;3-AI-cyber-defence-applications-AU-GA-bar-chart&quot; alt=&quot;Bar chart showing the top five cybersecurity tasks Australian businesses leverage AI-enhanced tools for&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/1CFsq5dJe29gqr1pYDb0sD/32183cddaf6e29223a82e027d8fc08a4/3-AI-cyber-defence-applications-AU-GA-bar-chart.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/1CFsq5dJe29gqr1pYDb0sD/32183cddaf6e29223a82e027d8fc08a4/3-AI-cyber-defence-applications-AU-GA-bar-chart.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/1CFsq5dJe29gqr1pYDb0sD/32183cddaf6e29223a82e027d8fc08a4/3-AI-cyber-defence-applications-AU-GA-bar-chart.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/1CFsq5dJe29gqr1pYDb0sD/32183cddaf6e29223a82e027d8fc08a4/3-AI-cyber-defence-applications-AU-GA-bar-chart.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/1CFsq5dJe29gqr1pYDb0sD/32183cddaf6e29223a82e027d8fc08a4/3-AI-cyber-defence-applications-AU-GA-bar-chart.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/1CFsq5dJe29gqr1pYDb0sD/32183cddaf6e29223a82e027d8fc08a4/3-AI-cyber-defence-applications-AU-GA-bar-chart.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;h2 id=&quot;Plan-prioritise-and-prepare-for-successful-AI-implementation-in-cybersecurity&quot;&gt;Plan, prioritise, and prepare for successful AI implementation in cybersecurity&lt;/h2&gt;&lt;p&gt;While there are solid reasons to introduce AI into a cybersecurity plan in the near future, the process shouldn’t be rushed, even if time is imperative.&lt;/p&gt;&lt;p&gt;Integration of AI into a business’s cybersecurity defences can be a long process and it’s important to factor this into planning. &lt;/p&gt;&lt;p&gt;A recent article by Gartner identifies four key areas of focus for getting firms’ IT ready to leverage AI. These include defining the use of AI tools, assessing deployment necessities, making data ‘AI-ready,’ and adopting AI principles. [1] To help achieve these steps, we’ve highlighted three tips below to ready your firm for AI cybersecurity implementation. &lt;/p&gt;&lt;h3&gt;1. Plan: Identify where and how AI can enhance IT security&lt;/h3&gt;&lt;p&gt;The first step to any AI deployment is to set goals for its usage. Having clear goals for this usage can help organise preparations for implementation and plan the use of staff and resources more effectively. &lt;/p&gt;&lt;p&gt;It’s better to prioritise areas where AI can help drive better protection of systems that need constant surveillance. As our data shows, this applies primarily to network security, cloud security, and threat detection. &lt;/p&gt;&lt;p&gt;Another important consideration is to check how this will affect the organisation’s current tech stack. Based on changing business needs and market trends, businesses have to decide whether to opt for a new software entirely or adopt unutilised features of an existing system. In many cases, businesses can add AI features to an existing security system suite by introducing new features and tiers to their existing software.&lt;/p&gt;&lt;h3&gt;2. Prioritise: Develop a human-in-the-loop (HITL) approach&lt;/h3&gt;&lt;p&gt;The use of machine learning and deep learning automations in cybersecurity isn’t quite as contentious as other areas where AI can be used, such as the application of generative AI in marketing. However, whilst monitoring and automation of cybersecurity can help IT teams save time and enhance protection, human intervention is necessary to avoid errors that a machine could miss due to faulty programming or limited capabilities.&lt;/p&gt;&lt;p&gt;A human-in-the-loop approach can help ensure smooth operations even with most AI-managed tasks, especially when considering AI deployment and applying ethical AI principles. Human decision-making should still be able to override AI and allow a person to act on threat intelligence manually when needed. Additionally, businesses should set clear guardrails to avoid improper data use and stay compliant with regulations.     &lt;/p&gt;&lt;p&gt;To get ready for the use of AI in a company, firms will need to provide sufficient &lt;a href=&quot;/directory/3809/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;security training courses&lt;/a&gt; that empower staff to use AI tools effectively. This should focus on how and where human intervention is needed, how to remain data compliant when using data for AI training, and a technical understanding of identifying bugs when managing AI.&lt;/p&gt;&lt;h3&gt;3. Prepare: Ensure data is AI-ready&lt;/h3&gt;&lt;p&gt;Using AI for effective results requires users to input quality data into the system. This information needs to be organised and readable to help the AI system carry out its tasks more accurately and reduce performance errors. There are a few key factors to focus on to get data AI-ready.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/633/data-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Data management&lt;/a&gt; and &lt;a href=&quot;/directory/473/data-protection/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;data governance&lt;/a&gt; are highly important to AI adoption. The data that can be accessed and used by a system must be checked carefully and organised into an error-free, readable, and uniform format for an AI system to put it to effective use.&lt;/p&gt;&lt;p&gt;Once data is prepared for use by an AI process, there is an important decision to be made on whether to use a system fed with information primarily from public datasets. Companies can simply opt to use their own in-house data sets exclusively. Alternatively, they can partially or entirely use proprietary data sets belonging to the software maker providing the AI system. Managing the data process in-house can be more challenging and expensive, but it also provides a more bespoke service for the user.&lt;/p&gt;&lt;p&gt;Protecting any data you share with the system is also highly important. In theory, AI-assisted cybersecurity software should take care of much of that but there are still ways that data could be compromised. For example, data poisoning can make a secure system more vulnerable to attacks (a factor that 38% of Australian respondents noted as a concern).&lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;Looking for &lt;a href=&quot;/directory/1035/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;event&quot; data-evna=&quot;engagement_facet_click&quot; data-evcmp=&quot;blog-idea&quot; data-evdst=&quot;go-to_category-page&quot; data-evdtl=&quot;text-link_category-name&quot; target=&quot;_blank&quot;&gt;cybersecurity software&lt;/a&gt;? Check out our catalogue!&lt;/div&gt;&lt;p&gt;&lt;/p&gt;","dateModified":"2024-11-12T19:30:03.000000Z","mainEntityOfPage":"https://www.getapp.com.au/blog/7551/how-to-get-AI-ready-for-cyber-defence#webpage"}]}
</script>
