Artificial Intelligence and Cybersecurity Balancing Risks and Rewards 2025
Page 15 of 28 · WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf
Position in the supply chain and appetite for
innovation: Organizations leading in AI innovation
(either as sellers or consumers with market-leading
capabilities) are likely to face risks from using
newer technologies that may contain undiscovered
vulnerabilities. More conservative users that procure
more mature AI technologies may face fewer risks,
as more will be known about vulnerabilities and
effective control practices.
Nature of business: Which sectors the business
operates in can affect their risk exposure. For
example, critical national infrastructure organizations
may be more likely to face high threat levels from
attackers motivated by high harm potential or value,
and to be subject to cybersecurity regulation. The
size of the business could influence its resources
for implementing AI risk mitigation, while the level
of dependence from other businesses downstream
affects the extent to which impacts of compromise
might propagate.
Geographical context: Where the organization is
conducting business will have a strong influence on
their cybersecurity posture and residual cyber risk. The level of cybersecurity capacity of the country
may influence the level of cybersecurity regulation
that the organization is subject to. This might
also affect the organization’s access to a skilled
professional workforce – though this might be less
of an issue for large multinational organizations
– and the availability of trusted sovereign
cybersecurity infrastructures or threat/intelligence
sharing channels.
Level of AI autonomy: Where autonomous
AI drives business processes without human
oversight, this may create greater risk. Lower risk is
faced when there is little autonomy or strong human
oversight to limit risk propagation.
Threat context: The type of threat actor faced by
an organization determines the level of risk. More
capable, resourced and motivated threat actors will
create greater risk for potential victims.
It is necessary for organizations to consider how
these risk contexts apply to them. This then informs
later steps, during which the potential risks and
impacts will be identified.
There may be a lack of clarity around the true
benefits of AI technologies, as use cases are still in
development, making accurate risk-reward analysis
challenging. However, understanding the business
drivers for the implementation of AI technologies
will help to promote understanding of the expected
rewards that are being sought. Research by the AI
Governance Alliance has informed categorization of
the opportunities that generative AI is perceived to
be creating for businesses:17
–Enhancing enterprise productivity –Creating new products or services
–Redefining industries and societies (e.g.
making sectors such as healthcare more
efficient and responsive to market changes –
e.g. accelerating drug discovery).
It is essential to build understanding of the
proposed integration of AI in the business. This
should incorporate which systems, processes,
information and data is involved, as well as which
stakeholders and why.
Key questions can help organizations to develop an
understanding of the new risk exposure that the use
of AI might bring:
1. What parts of the business might be dependent
on AI and could be impacted should the AI
systems be compromised?
2. What key business value, e.g. revenue, reputation,
process efficiency, need to be protected?
3. Might the deployment of AI put crown jewels –
assets of greatest value to the organization – and
broader critical assets and processes at risk?
4. What new assets and processes related to
the AI system itself need to be protected? New technology brings the potential for new
vulnerabilities. These typically fall into the
following categories:
–Inherent software vulnerabilities
–Vulnerabilities introduced by humans’
configuration and use of the technologies,
particularly since this may require new and
untrained practice
–Vulnerabilities in interfaces with other digital
systems, e.g. weak links between software,
hardware, operating systemUnderstanding the rewards
Identifying the potential risks and vulnerabilitiesStep 2
Step 3
Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards
15
Ask AI what this page says about a topic: