{"id":23891,"date":"2025-07-31T16:51:56","date_gmt":"2025-07-31T16:51:56","guid":{"rendered":"https:\/\/insurance-canada.ca\/?p=83573"},"modified":"2025-07-31T16:51:56","modified_gmt":"2025-07-31T16:51:56","slug":"navigating-the-ai-rush-without-sidelining-security","status":"publish","type":"post","link":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/2025\/07\/31\/navigating-the-ai-rush-without-sidelining-security\/","title":{"rendered":"Navigating the AI rush without sidelining security"},"content":{"rendered":"<h4>By Limor Kessem, X-Force Cyber Crisis Management Global Lead, IBM <span>\u2014<\/span><\/h4>\n<p>The cyber landscape has changed dramatically with the rapid adoption of artificial intelligence. In the frenzied race to harness the potential of AI, organizations often find themselves up against the clock, eager to deploy AI without first assessing their foundational cybersecurity measures. This creates a dangerous parallel: while businesses scramble to adopt AI for competitive advantage, cybercriminals are just as rapidly incorporating these technologies into their attack arsenals.<\/p>\n<p>It\u2019s not all bad news. For the first time in five years, global data breach costs have declined. IBM\u2019s newly released <a href=\"https:\/\/insurance-canada.ca\/2025\/07\/31\/ibm-data-security-under-threat\/\">2025 Cost of a Data Breach Report<\/a> found that average global costs dropped to USD 4.44 million\u2014down from USD 4.88 million, or 9%, in the year prior. The catalyst? Faster breach containment driven by AI-powered defenses. According to the report, organizations were able to identify and contain a breach within a mean time of 241 days, the lowest it\u2019s been in nine years.<\/p>\n<p>Yet this progress comes with a caveat: the very speed of AI and automation deployment that\u2019s helping organizations defend better is also creating new risks. This phenomenon of AI adoption outpacing oversight can lead to significant security debt, posing risk for enterprises determined to maintain a competitive edge. This debt\u2014the cumulative consequences of delayed or inadequate cybersecurity practices\u2014can lead to severe vulnerabilities over time. With AI, organizations are already starting to flash the warning signs.<\/p>\n<h2 class=\"expressive-heading-05 \">The AI oversight gap<\/h2>\n<p>Consider this: a staggering 97% of breached organizations that experienced an AI-related security incident say they lacked proper AI access controls, according to <a href=\"https:\/\/newsroom.ibm.com\/2025-07-30-ibm-report-13-of-organizations-reported-breaches-of-ai-models-or-applications,-97-of-which-reported-lacking-proper-ai-access-controls\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">findings from the Cost of a Data Breach Report<\/a>. Additionally, among the 600 organizations researched by the independent Ponemon Institute, 63% revealed they have no AI governance policies in place to manage AI or prevent workers from using shadow AI.<\/p>\n<p>This AI oversight gap is carrying heavy financial and operational costs. The report shows that having a high level of <a href=\"https:\/\/www.ibm.com\/think\/insights\/hidden-risk-shadow-data-ai-higher-costs\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">shadow AI<\/a>\u2014where workers download or use unapproved internet-based AI tools\u2014added an extra USD 670,000 to the global average breach cost. AI-related breaches also had a ripple effect: they led to broad data compromise and operational disruption. That disruption can stop organizations from processing sales orders, providing customer service and keeping supply chains running.<\/p>\n<p>By neglecting foundational cybersecurity practices when adopting AI, companies leave themselves vulnerable to operational disruption of AI-based workloads, large-scale data breaches that span multi-cloud and on-premise environments, and the potential exposure of intellectual property used to train or tune their AI implementations.<\/p>\n<p>As business leaders continue to dive into, and drive, the AI hype, they must confront the bloated risk that persists within their overall infrastructures. This is especially true when it comes to cloud security, where AI workloads and data spend most of their time. To ensure these remain within organizational risk appetite levels, security leaders need to help their businesses win at AI by reassessing their cybersecurity frameworks. These leaders must ensure their companies can adapt to the evolving risks that accompany AI technologies.<\/p>\n<p>This includes regular audits of security and data protection policies, adapting controls, evolving response plans and investing in employee training. As <a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/chief-ai-officer\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">newly appointed Chief AI Officers (CAIOs) gradually join the C-suite ranks<\/a>, security leaders need to be right there next to them. They should strengthen their ties with the governance, risk and compliance (GRC) teams to help break down current or emerging silos with the department overseeing regulatory compliance. This will go a long way toward ensuring alignment and creating a strong crisis-response bond in case of a data breach involving AI assets.<\/p>\n<p>How risky is this situation? Cybercriminals are acutely aware of this situational weakness, positioning AI workloads as high-value targets ripe for compromise. Is the risk materializing in the real world? The answer, as you can see in the data above, is yes. The report reveals that 13% of surveyed organizations have experienced an attack that impacted their AI models or applications. That percentage is small, for now. We are likely to see many more in the coming 12 months, unless security leaders and their business counterparts recognize the risk and pivot to focus more intently on AI security.<\/p>\n<h2 class=\"expressive-heading-05 \">Essential measures to reduce security risk<\/h2>\n<p><a href=\"https:\/\/www.ibm.com\/think\/x-force\/2025-cost-of-a-data-breach-navigating-ai#Essential+measures+to+reduce+security+risk\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Read the full blog on IBM.com<\/a> for details on how organizations can mitigate these risks and strengthen their security posture, which includes reinforcing cloud security, strengthening AI governance, and providing continuous education and training.<\/p>\n<h4 class=\"smallhead\"><b>About IBM<\/b><\/h4>\n<p>IBM is a leading provider of global hybrid cloud and AI, and consulting expertise. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. More than 4,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM\u2019s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM\u2019s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and consulting deliver open and flexible options to our clients. All of this is backed by IBM\u2019s legendary commitment to trust, transparency, responsibility, inclusivity and service. Visit <a href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.ibm.com<\/a> for more information.<\/p>\n<p class=\"referencetext\"><i>Source: IBM<\/i><\/p>\n<p> Tags: <a href=\"https:\/\/insurance-canada.ca\/tag\/artificial-intelligence\/\" rel=\"tag\">Artificial Intelligence (AI)<\/a>, <a href=\"https:\/\/insurance-canada.ca\/tag\/cyber-attacks\/\" rel=\"tag\">cyber attacks<\/a>, <a href=\"https:\/\/insurance-canada.ca\/tag\/cyber-risk\/\" rel=\"tag\">cyber risk<\/a>, <a href=\"https:\/\/insurance-canada.ca\/tag\/cyber-security\/\" rel=\"tag\">cyber security<\/a>, <a href=\"https:\/\/insurance-canada.ca\/tag\/ibm\/\" rel=\"tag\">IBM<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Limor Kessem, X-Force Cyber Crisis Management Global Lead, IBM \u2014 The cyber landscape has changed dramatically with the rapid adoption of artificial intelligence. In the frenzied race to harness the potential of AI,&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[1],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts\/23891"}],"collection":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/comments?post=23891"}],"version-history":[{"count":0,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts\/23891\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/media?parent=23891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/categories?post=23891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/tags?post=23891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}