{"id":5427,"date":"2025-10-15T20:35:59","date_gmt":"2025-10-15T20:35:59","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5427"},"modified":"2025-10-15T20:35:59","modified_gmt":"2025-10-15T20:35:59","slug":"58-of-cisos-are-boosting-ai-security-budgets","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5427","title":{"rendered":"58% of CISOs are boosting AI security budgets"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>AI is no longer an experiment in the security stack \u2014 it\u2019s becoming the centerpiece. Foundry\u2019s 2025 Security Priorities Study finds that 58% of organizations plan to boost spending on AI-enabled security tools next year, signaling a decisive shift from curiosity to commitment. And it\u2019s not just budgets following the trend. The research finds\u00a093% say they\u2019re already using or are actively researching using AI in their security technologies\u00a0over the next 12 months.<\/p>\n<p>The urgency makes sense. CISOs are watching attackers weaponize generative AI to automate phishing, create deepfakes, and craft more convincing social engineering campaigns. In response, they\u2019re turning to agentic and generative AI to harden defenses, augment analysts, and improve resilience at scale.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p class=\"imageCredit\">Foundry<\/p>\n<\/div>\n<p>At the upcoming <a href=\"https:\/\/event.foundryco.com\/cso-conference-awards\/\">CSO Conference<\/a>, IDC\u2019s Frank Dickson will examine this trend in his session, \u201cInsights from IDC\u2019s Latest Security Research.\u201d He\u2019ll explore how AI is reshaping cybersecurity strategy \u2014 not as a bolt-on tool, but as a fundamental shift in how organizations detect, respond, and adapt to risk.<\/p>\n<p>Recent <a href=\"https:\/\/www.csoonline.com\/article\/4064158\/agentic-ai-in-it-security-where-expectations-meet-reality.html\">CSO reporting<\/a> shows what that evolution looks like in practice. Early adopters describe how intelligent agents are already handling tier-one SOC tasks such as alert triage, log correlation, and first-line containment, freeing analysts for higher-level investigations. Others <a href=\"https:\/\/www.csoonline.com\/article\/4049485\/5-ways-cisos-are-experimenting-with-ai.html\">are using AI<\/a> to prioritize vulnerabilities, analyze threat intelligence in real time, and even draft reports and risk summaries for executive audiences.<\/p>\n<p>But as adoption accelerates, so does the need for governance. Many security leaders are discovering that deploying AI responsibly requires new controls, from audit trails and human-in-the-loop oversight to transparency into model decisions. In other words, the same technology transforming the SOC also demands fresh thinking about accountability, data quality, and risk tolerance.<\/p>\n<p>Still, most CISOs agree the upside outweighs the risk. Experts <a href=\"https:\/\/www.csoonline.com\/article\/4042494\/how-ai-is-reshaping-cybersecurity-operations.html\">describe AI as a \u201cforce multiplier for the defense,\u201d<\/a> enabling smaller teams to handle larger workloads and react faster than ever. The Security Priorities research echoes that sentiment, showing AI-driven cybersecurity is now a top-tier investment priority \u2014 not a future experiment.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p class=\"imageCredit\">Foundry<\/p>\n<\/div>\n<p>The takeaway: AI in cybersecurity has reached an inflection point. Whether it\u2019s accelerating incident response, tightening identity management, or simplifying complex threat analysis, enterprises are betting big that AI-enabled tools will be essential for staying secure in an era of AI-enabled attacks.<\/p>\n<p>The CSO Security Priorities study for 2025 will be presented during a discussion at the annual CSO Conference &amp; Awards, October 20\u201322 at the Grand Hyatt Indian Wells.\u00a0 Join IDC\u2019s Frank Dickson and leading CISOs as they share real-world lessons on where AI delivers results and how to deploy it responsibly in the fight against today\u2019s evolving threats.<\/p>\n<p>For more information about the agenda and speakers, please visit:\u00a0<a href=\"https:\/\/event.foundryco.com\/cso-conference-awards\/agenda\/\">https:\/\/event.foundryco.com\/cso-conference-awards\/agenda\/<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>AI is no longer an experiment in the security stack \u2014 it\u2019s becoming the centerpiece. Foundry\u2019s 2025 Security Priorities Study finds that 58% of organizations plan to boost spending on AI-enabled security tools next year, signaling a decisive shift from curiosity to commitment. And it\u2019s not just budgets following the trend. The research finds\u00a093% say [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":5399,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-5427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5427"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5427"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5427\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/5399"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}