Artificial Intelligence and Cybersecurity Balancing Risks and Rewards 2025

Page 14 of 28 · WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf

4 There are several contextual factors that may influence the risk exposure of organizations adopting AI:Understanding how the organization’s context influences the AI cyber riskSteps towards effective management of AI cyber risk Evaluating the cyber risks resulting from AI adoption is essential for all organisations intending to innovate. This chapter presents a set of steps for implementing oversight and control of cyber risks related to AI adoption and use. It is designed to be used by senior risk owners within an organization. The steps aim to guide the assessment of cybersecurity risks resulting from the adoption of AI technologies, and the implementation of the necessary mitigations. The decision-making process will, in many cases, be iterative. Senior risk owners should revisit risk-reward evaluations after analysing the potential impact scenarios. The process starts with an assessment of the AI risk context of the organization, and ends with the deployment of leading practices throughout the AI life cycle. Step 1 Characteristics influencing the cyber risks faced by organizations adopting AI FIGURE 2 Creator of its own AI modelsLevel of AI autonomyNature of businessGeographical context Threat context – Provider to others – Early adopters versus more conservative users – Level of local innovation/ service provision– Level of oversight by humans – Level of influence on critical processes (and explainability of influences) – Risk tolerance– Size/resource (including for cybersecurity) – Sector – Safety-critical functionalities – Downstream dependencies on business processes – Adversarial context (see threat actors context)– (Stable) cybersecurity and related regulations/legislation – Operational collaboration bodies/ networks, e.g. threat- intelligence sharing – Local market for cybersecurity products and services – Compliance with (various competing) standards – Infrastructure sovereignty (versus outsourced capability)– Capability/resource – Intent – Frequency – CredibilityAI outputs drive critical business processes autonomously Consumer of AI services AI outputs inform decision-making by humans Critical infrastructure organization Non-critical infrastructure organization High national/ regional cybersecurity capacity Limited national/ regional cybersecurity capacity Politically motivated sabotage Cybercriminals and activistsPosition in the AI supply chain and appetite for innovation Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards 14
Ask AI what this page says about a topic: