* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/) * AI in Cybersecurity --- A C... # AI in Cybersecurity --- A CISO's Perspective [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2024%2F03%2Fai-in-cybersecurity-a-cisos-perspective%2F) [](https://twitter.com/share?text=AI+in+Cybersecurity+%E2%80%94+A+CISO%E2%80%99s+Perspective&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2024%2F03%2Fai-in-cybersecurity-a-cisos-perspective%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2024%2F03%2Fai-in-cybersecurity-a-cisos-perspective%2F&title=AI+in+Cybersecurity+%E2%80%94+A+CISO%E2%80%99s+Perspective&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2024/03/ai-in-cybersecurity-a-cisos-perspective/&ts=markdown) \[\](mailto:?subject=AI in Cybersecurity — A CISO’s Perspective) Link copied By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") Mar 06, 2024 8 minutes [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown) [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [AI](https://www.paloaltonetworks.com/blog/tag/ai/?ts=markdown) [AI in cybersecurity](https://www.paloaltonetworks.com/blog/tag/ai-in-cybersecurity/?ts=markdown) [AI's Impact in Cybersecurity](https://www.paloaltonetworks.com/blog/tag/ais-impact-in-cybersecurity/?ts=markdown) [CISO](https://www.paloaltonetworks.com/blog/tag/ciso/?ts=markdown) [Interview](https://www.paloaltonetworks.com/blog/tag/interview/?ts=markdown) ![](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/audio-icon.svg) Niall Brown -- AI in Cybersecurity *00:00* *00:00* Volume Slider 10s 10s 10s 10s Seek Slider *"[AI's Impact in Cybersecurity](https://www.paloaltonetworks.com/blog/tag/ai-in-cybersecurity/?ts=markdown)" is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more. Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current threat landscape, how Palo Alto Networks protects itself and its customers, as well as implications for the future of cybersecurity. *Niall Browne discusses the current and future landscape of artificial intelligence (AI)* in cybersecurity with us.* As AI technology matures and proves its worth, it is set to revolutionize the way security professionals approach their roles and responsibilities. This is not hyperbole, yet rather a credible assessment of the daily outcomes experienced in our own security operations and with our customers who benefit from deploying our AI-driven solutions. In a candid interview with Niall Browne, CISO of Palo Alto Networks, we explored the profound impact of artificial intelligence on the current and future landscape of cybersecurity. ## AI's Journey in Cybersecurity While AI is not a novel concept, its full potential is finally becoming a reality with the democratization of tools, such as generative AI. As such, there has been a noticeable shift as AI has seemingly entered the mainstream, available to anyone with access to a keyboard and an internet connection. And Browne envisions even more tectonic changes on the way. Adversaries are already continually examining the tools used by organizations and exploring ways to leverage AI to compromise their targets. This battle will remain a nonstop game of cat-and-mouse for the next 5 to 10 years. Both defensive and offensive teams are constantly recalibrating their strategies and techniques, trying to one-up each other, but this game will look different as AI evolves. AI-powered adversaries don't have the same limitations as humans. They never sleep or take breaks. They don't get distracted. They can move at machine speed. They can multitask in ways humans can't. AI can exploit vulnerabilities, move laterally, and compromise multiple targets simultaneously, posing a significant threat to organizations. We have seen similar changes in financial markets with high-frequency trading, where technology advancements led to millisecond interactions. In a world of AI, cybersecurity will transition from humans dealing with threats over days to AI handling them in milliseconds. Bolstered by AI's capabilities, initial compromises to data theft are possible in hours now. Coordinated wide-scale attacks are happening concurrently. And, attackers are increasingly showing a deep understanding of how business processes work. This all leads to an unprecedented [increase](https://www.cnn.com/2024/01/17/investing/jpmorgan-fights-off-45-billion-hacking-attempts-each-day/index.html)of security events and breaches. The relentless advancement of technology, coupled with the creative minds of malicious actors, paints a potentially grim picture for the cybersecurity landscape. Attacks are already increasing in "[speed, scale and sophistication](https://www.foxbusiness.com/video/6345067101112)" according to Wendi Whitmore, SVP, Unit 42. That said, Browne sees an inflection point occurring right now where AI is being applied effectively to detect and respond to cyberthreats before they can cause harm. This transformation is akin to the paradigm shift that occurred when organizations embraced cloud computing. Browne elaborates on that comparison: *"The power of AI will be transformative for cybersecurity teams. We're now seeing the real potential for AI to detect attacks as they occur, and then to help the systems recover from those same attacks. I am certainly seeing there's a huge undertaking from cybersecurity teams to start embracing AI, similarly to the journey 6 or 7 years ago, when enterprises started embracing the move to the cloud.* *I think AI will totally transform the way cybersecurity teams operate within their organization, from the security operations center, to application security teams, and beyond."* ## Understanding the Importance of Metrics in Security Looking at the current state of technology, Browne details key performance metrics for evaluating the effectiveness of AI-powered solutions in cybersecurity. Metrics are crucial to understanding how to improve processes and where there are security gaps. But, he dismisses the idea of mean time to close as a top metric, comparing it to call center practices where the aim is to quickly end calls. Instead, he prefers to focus on metrics related to systems and AI capabilities: * **Percentage of Systems Logged and Data Ingested:** Tracking how much data is ingested from various systems. * \*\*False Positives and True Positives Rates:\*\*Ensuring a balance between accurate alerts (true positives) and avoiding unnecessary alerts (false positives). * **Mean Time to Detect:** The time taken to detect an incident once it occurs. Browne's goal is a swift 10-second detection time. * **Mean Time to Respond:** Measuring how quickly the security team responds to an incident, aiming for a 10-minute response time. These metrics enable organizations to assess the efficiency and effectiveness of their cybersecurity operations. Browne also highlights the ease of comparing these metrics when transitioning from legacy SIEM (security information and event management) systems to AI-based SIEM, allowing for clear ROI calculations. Palo Alto Networks [Cortex XSIAM®](https://www.paloaltonetworks.com/blog/2023/11/xsiam-2-0-continuing-soc-transformation/?ts=markdown) is quickly demonstrating its prowess in handling data that can be ingested and integrated to feed machine learning, analytics and automation. With a SOC that ingests over 1 trillion events per month, nearly 40 billion per day, and intelligently groups and analyzes alerts, resulting in *only eight* incidents a day on average in need of human investigation. *"In the case of Palo Alto Networks, we use XSIAM and we leverage that on a day-to-day basis to go through approximately 75 TB gigabytes of data. And, that's allowed us internally to achieve a result of a mean time to detect of 10 seconds, and then a mean time to respond of 1 minute."* ![Graph of what our SOC has achieved with Cortex XSIAM](https://www.paloaltonetworks.com/blog/wp-content/uploads/2024/03/word-image-315427-4.png) ## The Exponential Growth of AI in Cybersecurity With the advent of AI and more automation, there is a shift away from traditional, four-tiered SOC structures, where human analysts handle most tasks, toward a model where AI takes over the initial triage and analysis. Browne agrees with this evolution and shares that, in his vision, the lower tiers of a SOC (Tier 1, 2 and 3) will be primarily AI-driven, while human analysts will focus more on Tier 4 tasks. At Palo Alto Networks, Browne notes that we've eliminated lower SOC layers, creating a more dynamic workforce of specialists. This shift allows SOC analysts to concentrate on more engaging and valuable tasks, like threat hunting, ultimately leading to higher levels of job satisfaction and lower levels of attrition. As organizations increasingly embrace AI for cybersecurity, we are witnessing a profound transformation across various facets of the industry: **AI Data Concentration Risk:** Internal AI systems will have access to a treasure trove of highly confidential information. This data concentration risk will ensure that AI becomes the top target for hackers. As such, organizations will need to deploy significant resources to ensure these AI systems are deployed and secured appropriately, from the start. To add to the complexity, some AI security controls may be nascent, and as such, compensating controls will become critically important. **Shift Left for Security:** The concept of "shift left" in security emphasizes addressing vulnerabilities at the earliest stage of the development process (i.e., before they are introduced.) With AI assistance, developers can receive real-time feedback on potential security issues, leading to more secure code and infrastructure. This shift left approach ensures that security is not an afterthought but an integral part of the development process. \*\*Security Operations Transformation:\*\*AI is poised to have the most significant impact on security operations. Security operations centers (SOCs) are currently overwhelmed by the sheer volume of alerts and incidents. AI-driven solutions can sift through vast amounts of data, prioritize threats, and significantly reduce false positives. This enables SOC teams to focus on high-value tasks, such as threat hunting and research, as opposed to low-value alerts. In fact the Palo Alto Networks SOC spends just a third of their time on alerts, enabling them time to focus on much higher value work. **Reshaping Security Analyst Roles:** With AI handling routine tasks, security analysts can evolve into high-value resources. They can dive deep into data analysis, threat intelligence and proactive threat hunting, driving overall security maturity within organizations. ## The AI-Driven Future Looks Bright Browne predicts that AI will transform the cybersecurity landscape in the next few years, delivering value that exceeds expectations. It's not just about potential; it's about real-world applications. AI is set to become an indispensable tool in the security arsenal, exponentially improving efficiency and effectiveness. Imagine a world where AI serves as a co-pilot to developers, offering real-time guidance on secure coding practices. Envision security operations teams with drastically reduced alert fatigue, focusing on the most critical threats. Picture a security landscape where the attacker's job becomes exponentially more challenging due to AI-powered defenses. It's a future ripe for possibilities, and Palo Alto Networks is leading the charge with AI-driven products such as [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) and the whole [Cortex suite of products](https://www.paloaltonetworks.com/cortex/whycortex?ts=markdown). AI is not just a buzzword but a tangible force shaping the future of cybersecurity. As organizations adopt AI-driven security solutions, they will experience a significant transformation in their security posture. With AI as a co-pilot, we are on the cusp of a more secure digital world, riding shotgun with some pretty cool tools. And as technology advances, defenders and organizations must adapt rapidly to stay ahead of the ever-more-sophisticated adversaries they face. ## **Learn More About AI's Impact on Cybersecurity** Attend Symphony 2024, April 17-18, to explore the latest advancements in AI-driven security, where machine learning algorithms predict, detect and respond to threats faster and more effectively than ever. [**Register today!**](https://symphony.paloaltonetworks.com/?utm_source=content-corp-blog&utm_medium=web&utm_campaign=symphony24&utm_content=) *** ** * ** *** ## Related Blogs ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Let AI Handle the Heavy Lifting in the Modern SOC](https://www.paloaltonetworks.com/blog/2024/03/ai-in-the-modern-soc/) ### [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Beyond the Hype --- Where AI Can Shine in Security](https://www.paloaltonetworks.com/blog/2024/01/where-ai-can-shine-in-security/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### AI in OT Security --- Balancing Industrial Innovation and Cyber Risk](https://www.paloaltonetworks.com/blog/2024/08/ai-in-ot-security/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### AI Provides an Rx for Cybersecurity in Healthcare](https://www.paloaltonetworks.com/blog/2024/07/ai-provides-an-rx-for-cybersecurity-in-healthcare/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### The Dark Side of AI in Cybersecurity --- AI-Generated Malware](https://www.paloaltonetworks.com/blog/2024/05/ai-generated-malware/) ### [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Witnessing a Revolution in Cybersecurity with AI](https://www.paloaltonetworks.com/blog/2024/03/revolution-in-cybersecurity-with-ai/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language