AI

Magic, Math, and Mayhem: The Real Story of AI in Cyber Defense

By Aaron R. Warner, CEO - ProCircular, Inc

The headline sounds fantastic: drop AI into your security stack, cut breach response times byย 80ย days,ย  andย save almost $2 million. IBM’s 2025 Cost of a Data Breach Report promises those kinds ofย turnkeyย  returns, and security leaders everywhere are hungry for real ROI numbers to back it up.ย ย 

If you peel back the layers, while the performance data are still compelling, those numbers rest onย shakyย  ground. The reality of breach economicsย areย complex, and no one layer or vendor can solveย yourย  cybersecurityย challenges. Carl Sagan famously said that “anything sufficiently complexย isย  indistinguishableย from magic,” and the same applies to AI in cybersecurity. It may appear to beย magic,ย  butย that’sย primarily due to the systems’ complexity.ย There’sย no magic in AI or cybersecurity, but itย isย  complicatedย enough to make understanding its performance difficult.ย 

Rather than relying solely on IBM’s excellent research work, we compared the results to similar industry leading reports from Verizon and Mandiant.ย We’veย taken the extra step of including reports fromย theย  threeย organizations over the last decade – comparing their estimates in 2015 to the 2025 work toย checkย  bothย progress and accuracy.ย ย 

While the dollar figures and some of the performance results might be debatable, once the dataย areย  normalizedย and reviewed, the trends are worth noting. AI is a worthy investment ifย implementedย  correctlyย and strategically.ย It’sย also an excellent place to throw money down a hole if youย aren’tย applyingย  itย carefully.ย ย 

The $10 Million Questionย ย 

According to the same IBM report, the U.S. average breach in 2025 costs $10.22 million โ€” up 9%ย fromย  lastย year, and more than double the global average of $4.44 million.ย That’sย 15 years in a row that theย U.S.ย ย has reported the most expensive breaches.ย ย 

Why the U.S. costs more:ย ย 

  • Tighter regulations increase workload for each breach (reporting, legal fees, etc.)ย ย 
  • Higher wages for skilled labor (there is a skillset shortage, and this talent is expensive)ย ย 
  • High concentrations of high-value data and financial resources in one countryย ย 

Healthcare still takes the top spot with $9.77 million per breach, and even the “cheaper” public-sectorย  breachesย come in at $2.55 million. Across the Atlantic, the U.K. looks almost reasonable byย comparisonย  atย ยฃ3.29M ($4.12M). Heavy users of AI/automation seem to have shaved off about ยฃ670,000 onย average,ย  anย excellent bit of progress but far from magical.ย ย 

What the Headlines Don’t Tell Youย 

Breach cost figures from vendors are often built on shaky ground. The CISA Office of the Chiefย Economistย  foundย that median cost estimates from vendors vary wildlyโ€”from $56,000 to over $40 millionโ€” depending on the source. One of the most cited studies, theย Ponemon/IBM report, is based onย surveyย  responsesย from just 600 organizations globally. It includes speculative “opportunity costs” which usesย aย  cost-per-record model that only accounts for a fraction of actual varianceโ€”just 2% to 13%.ย ย 

That 2โ€“13% stat tells us the cost-per-record modelย doesn’tย hold water. It assumes breach costsย scaleย  neatlyย with the number of records lost, but theyย don’t. A breach involving a few thousandย sensitiveย  healthcareย records can cost more than one leaking millions of usernames from a marketing database.ย ย The model ignores what TRULY drives costโ€”like downtime, legal exposure, business impact, andย theย  complexityย of response.ย Soย when a metric that underpins headlines and budget slides only explainsย aย  sliverย ofย real-world outcomes, it stops being a shortcut and becomes a distraction.ย ย 

Insurance data paints a different picture.ย NetDiligenceย reports median breach costs around $56,000,ย  whileย Advisen’sย updated figures put the number closer to $196,000. Even if we factor in policy limitsย andย  coverageย gaps,ย we’reย still nowhere near the $10M+ figures that vendor-funded surveys suggest.ย ย Academic work by Sasha Romanosky backs this up: the meanย breachย loss may be close to $6 million,ย butย  theย median is just $170,000โ€”another example of how outliers skew the story.ย ย 

We know these surveysย aren’tย ideal methodologies, but thatย doesn’tย mean theyย aren’tย helpfulย inย  decision-making. We needed more data from a larger population with different collection methodsย overย  aย largerย period.ย ย 

AI’s Real Impact โ€” and Its Limitsย ย 

AI’s practical benefits are consistent across multiple independent reports. No singleย datasetย tellsย theย  wholeย story, but when you combine the findings from reliable sources, a few powerful patternsย emerge.ย ย 

For example, organizations that fully embrace AI and automation are seeing a significant impact onย theirย  breachย timelinesโ€”reducing the averageย breachย lifecycle byย 80 days, from 241 to 161. That translatesย toย  $1.9 million in savings per breach globallyโ€”and even more for U.S. organizations where the stakesย areย  higher.ย ย 

Looking at the long game, Mandiant reports a 92.5%ย drop inย median dwell timeโ€”fromย 146 daysย inย 2015ย  toย just 11 in 2025. Internal detection improved even more dramaticallyโ€”from 320 toย 10 days. Thatย kindย  ofย progressย doesn’tย just happen without a reason, and it suggests that organizations investingย inย  automationย and AI are keeping pace while traditional approaches are starting to lag. The slight uptickย inย  first-year dwell times from 10 toย 11 daysย this year could be a sign that threat actors are nowย leveragingย  generativeย AI themselves, getting better at it, and able to hide for longer.ย 

Figure 1A Decade of Change โ€” Breach Cost, Dwell Time, and Detection Improvements (2015โ€“2025).ย ย 

Normalized comparison of key breach metrics from IBM, Mandiant, and Verizon reports. The dataย revealย  dramaticย reductions in dwell time and detection timelines, alongside inflation-adjusted improvementsย inย  breachย cost control for AI-adopting organizations.

In the U.K., the data shows that AI adopters saved roughly ยฃ670,000 per breach, and IBM’s decade-longย  lens shows a 20% increase in nominal breach costsโ€”but an 8.6% decrease when adjusted for inflation.ย ย The cost of getting hacked is rising, but the organizations that manage it using AI seem to be showingย  measurable improvement over others.

Of course, it’s not all upside, and AI adoption includes its new risks. IBM found that 13% of organizationsย  reported breaches involving their AI systemsโ€”97% of those due to poor access controls. And whenย  “shadow AI” (unauthorized tools used by employees) is widespread, breach costs jump by $670,000 onย  average. Any CIO can tell you that AI risks bubble up from the user community daily when SaaS andย  online solutions sell directly to departments and users rather than a traditional IT buying process. Theย  inmates can tend to run the asylum, and they’re now armed with their brand of unapproved AI-enabledย  tools.

The bottom line? AI helps us respond faster and contain more damageโ€”but it’s also creating newย  openings. Like any tool, it’s only as effective as the handsโ€”and policiesโ€”that guide it.

The Skillset Gap Is the Real Crisisย ย 

We’reย facing a global shortfall of over 4.8 million cybersecurity professionals worldwide, a 19%ย jumpย  fromย last year (ISC2). The U.S. is short more than half a million FTE in cybersecurity, and the U.K. isย downย  anotherย 93,000 (ISC2). But the bigger problemย isn’tย just how many people are missingโ€”it’sย whatย theย  peopleย already in the field can (andย can’t) do.ย ย 

Severe staffing shortages raise breach costs by $1.76 million on average (IBM), but skills gaps areย evenย  moreย damaging. Ninety percent of organizations report lacking criticalย expertise;ย nearly two-thirdsย sayย  skillsย shortages hurt more than pure headcount deficits (ISC2). The most urgent needsโ€”cloudย security,ย  zeroย trust design, and emerging tech defenseโ€”aren’tย just technical boxes to check. They reflectย strategicย  shiftsย many security programsย haven’tย yet made, leaving teamsย nearly twiceย as likely to face aย materialย  breachย (IBM).ย ย 

These risks and shortcomings becomeย immediatelyย apparentย during a breach. Large and smallย companiesย  oftenย ask, “Who do we even call?”ย whenย no one has the relevantย experience, andย each minuteย becomesย  moreย expensive.ย ย 

Hiring more peopleย won’tย fix this alone. Closing the skills gap requires targeted training for existingย staffย  andย new talent. Partnering with educators to align today’s curricula with real-world threats andย inputย  fromย industry should ensure that tomorrow’s hires are ready from day one. Whether through Ph.D.ย  cybersecurityย programs at schools like Carnegie Mellon and Iowa State or certificate programs at aย localย  communityย college, cybersecurity and AI education is an essential security layer.ย ย ย 

At the same time, economic pressures are pulling organizations in the wrong direction. In 2024,ย aย  quarterย of organizations cut security staff, over a third faced budget reductions, and hiring freezesย hitย  38% (ISC2). The result is a burnout loop: fewer people, more pressure, lower satisfaction, andย risingย  turnoverโ€”draining talent and capability.ย That’sย why many companies are turning to private cybersecurity firms to run or augment their limited programs, bringing in specializedย expertiseย thatย  wouldย be too costly or time-consuming to build in-house. If we want a resilient cybersecurity workforce, we must build itโ€”not justย staffย it.ย ย 

Third Parties: Accountability Without Authorityย ย 

One of the most troubling shifts in the threat landscape is the surge in breaches involving third parties.ย ย According to Verizon’s DBIR (2025), the share of incidents tied to vendors, partners, or otherย externalย  providersย has doubled from 15% to 30% in a single year.ย The headlineย casesโ€”Snowflake,ย Changeย  Healthcare, CDK Globalโ€”show how one compromised provider can ripple across an entire industry.ย ย When a single vendor holds a dominant position in a market, the blast radius of a breach canย beย  enormous. Nowhere is this more dangerous than in healthcare, where interconnected providerย networksย  makeย these some of the costliest breaches in history.ย ย 

The technical side of this shift is just as alarming. Edge devices and VPNsโ€”once a niche entry pointโ€” now account for 22% of exploitation targets, up from just 3% last year (Verizon DBIR 2025). Medianย timeย  toย mass exploitation is effectively zero; in many cases, attackers begin exploiting vulnerabilities onย theย  sameย day a CVE is published. Much of this can be traced to the pandemic’s rapid shift to remote work.ย ย VPNs were rolledย out atย scale, often without the hardeningย they’dย get under normal timelines,ย andย  attackersย have been capitalizing on that widened surface area ever since. Many weaknesses areย stillย  easilyย detected with a Shodan.io searchย ofย a company’s domain name.ย ย 

If we zoom out and look at the past decade, theย speedย race between attackers and defenders hasย beenย  staggering. In 2015, top-performing organizations could detect a breach in just over a month;ย now,ย  leadersย spot threats in 30 minutes to four hoursโ€”a 99% improvement (Mandiant, Verizon DBIR).ย ย Response has accelerated even more dramatically, with mean time to recovery dropping from twoย toย  threeย weeks down to just a few hoursโ€”a 98% improvement.ย ย 

Unfortunately, attackers have also been evolving and improving their performance. In 2015, about 60%ย  of compromises occurred within minutes, and by 2025, this figure had increased to 87% over that shortย  period. Both good guys and bad guys are running faster than ever, but those in defense are still behindย  their adversaries. Blue teams defending organizations must be right all day, every day, whereas a hackerย  only needs to be right once.

The Human Factor Is Still the Greatest Challengeย ย 

For all the technology we throw at the problem, peopleย remainย the wild card. Verizon’s DBIR (2025)ย  showsย that 60% of breaches still involve a human elementโ€”social engineering, simple mistakes,ย orย  insiderย actions.ย That’s downย a bit from the historical 68โ€“74% range (Verizon DBIR), but it proves youย can’tย  firewallย away human behavior.ย ย 

Ransomware is whereย the humanย and technical worlds collide most visibly. It now appears in 44%ย ofย  breaches, up from 32% (Verizon DBIR). The good news is that the economics are shifting: theย medianย  ransomย payment has dropped to $115,000 from $150,000, and 64% of victims now refuse toย pay,ย  comparedย to 50% two years ago.ย That’sย a sign that better backups and sharper incident response plans are making a difference. But the picture changes with scaleโ€”small businesses are still hit hardest.ย Inย  SMBย breaches, 88% include ransomware, compared to just 39% for enterprises (Verizon DBIR).ย ย 

While 45% of security teams report that they are now using GenAI tools, 72% of employees areย signingย  upย for AI accounts with personal email addresses, bypassing corporateย controlsย and creatingย freshย  “shadow IT” exposure (FBI, IBM). The bad actors have noticed tooโ€”malicious emails built with AIย haveย  doubledย in just two years, rising from 5% to 10% (Verizon DBIR). Many of the same tools thatย makeย  defendersย faster are the same ones that make attackers more efficient.ย 

Recommendations for Security Leadersย ย 

  1. Deploy AI with strong guardrails from the start.ย 

An 80-day reduction inย breachย lifecycle and 30โ€“40% cost savings (IBM) are compelling results, but onlyย ifย  theย foundation is solid. Establish clear governance, define approved uses, and lock down accessย toย  preventย misuse. Begin with detection and response automation and apply AI in well-tested areasย whereย  benefitsย are proven and risks are more manageable, reducing the risks associated with usingย GenAIย  technologyย itself. Be sure not to forget the less sexy work of hardening and continuallyย monitoringย yourย  edgeย assets, thereby reducing that post-COVID VPN exposure and other commonly exploited issues. (AIย  scanningย can help with that too)ย ย 

  1. Expand capability through education, not just hiring.ย 

With a global shortage of 4.8 million cybersecurity professionals (ISC2), hiring aloneย can’tย close the gap.ย ย Embrace technical and non-tech staff and welcome them to try new tools within your program.ย You’llย  neverย eliminateย Shadow IT, but you can bring those users into the IT fold. Internalย developmentย  conferences, training, mentoring, and other programs can enhance your visibility into risks, protectย usersย  andย the organization from themselves, and improve the results of the workย they’reย trying to accomplish.ย ย Doing so makes their projects and tool usage easier toย monitorย andย improvesย results. Pair theseย withย  targetedย training to close critical skills gapsโ€”especially in cloud security, zero trust design, andย AIย  governanceโ€”and manage workloads to prevent burnout.ย ย 

  1. Modernize third-party risk programs.ย 

With 30% of breaches linked to vendors and partners (Verizon DBIR), the old approach ofย staticย  questionnairesย is outdated. Implement continuous monitoring, require least privilege and multi-factorย  authenticationย for all vendor access, and include supply chain scenarios in your incident planning.ย ย 

  1. Build with the assumption of compromise.ย 

Adversaries can move laterally in underย 90 seconds, while detection still takes too long inย manyย  organizationsย (Mandiant). Design detection and response as if the attacker is already inside.ย Testย  playbooksย quarterly and ensure recovery systems reduce the value of anything intruders can access.ย ย 

  1. Engage early with law enforcement and trusted networks.ย 

Organizations that work with law enforcement recover an average of $1 million more per incidentย andย  haveย a 66% success rate in fund recovery (FBI). The FBI has a vast network of resources available, andย itsย  guidanceย during a breach can help prevent costly mistakes. Build these relationships well ahead ofย anyย  issuesย andย participateย in information-sharing groups such as InfraGard ahead of time. Youย don’tย wantย toย  lookย for the FBI’s phone number at 2:30 am during a breach.ย 

Conclusionย ย 

AI delivers measurable gains for organizations that use it wellโ€”faster detection, shorterย containment,ย  andย reducedย breachย impact. At the same time, technology aloneย isn’tย the answer. Yourย modernย  cybersecurityย program should combine AI with governance, skilled people, strong processes, andย realisticย  third-party risk strategies.ย ย 

Companies will always make high claims on the return on investment. In the case of GenAI, the riskย ofย  inactionย far outweighs the potential downsides. In an environment where costs canย swing byย ordersย ofย  magnitudeย and dwell timesย remainย a persistent challenge, even modest gains in speed andย containmentย  canย tip the balance.ย ย 

The most successful leaders will be those who acknowledge the new reality of GenAI, adaptย early,ย  involveย their employees and teams in their latest security program, and treat AI as a coreย securityย  technology.ย 

Author

Related Articles

Back to top button