Artificial Intelligence and Cybersecurity Balancing Risks and Rewards 2025
Page 19 of 28 · WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf
Many existing cybersecurity control frameworks that
are not AI-specific remain relevant for addressing
cyber risks associated with AI adoption. What may
differ is the way in which these controls need to
be applied to protect the AI system, as well as any
potential gaps they leave for specific risks.
Basic cyber hygiene is
the foundation
It is critical to have a secure foundation of existing
cybersecurity controls in place – i.e. basic cyber
hygiene – to manage the cyber risks related to AI
adoption. Some key practices include:
Avoiding vulnerabilities in the AI systems
Robust threat and vulnerability management
practices help remediate critical exposures detected
across systems, including AI technologies. It must
also be complemented by secure configurations of
the underlying hardware and software.
Limiting blast radius
Implementing controls for protecting the perimeters
of systems – such as segmentation of networks and
databases, and data-loss prevention – help limit the
impact of an initial compromise of AI systems.
Accessing control
Ensuring that the AI systems and the infrastructure
hosting AI algorithms and data are protected by
access controls such as multi-factor authentication
and strong privileged access management (PAM).
These should be embedded as foundational
security measures. Third-party risk management
Strong procurement processes for assessing the
security of AI models and training data are also
critical to avoiding integrity issues and reducing
cyber risk exposures.
Information sharing
Organizations should collaborate with peers –
across businesses and governments – to ensure
that threat- and incident-sharing mechanisms take
AI-related cyber risks into account.
Education and awareness
Leaders need to develop an understanding of
both the opportunities and risks associated with
AI, and invest in training programmes to enhance
AI awareness, create an organization-wide culture
of responsible AI adoption and help employees
recognize potential risks. Training should be tailored
to the role of employees.
Mind the gaps: basic cyber
hygiene is not enough
Some existing critical control capabilities will need
to be tailored and updated in order to mitigate the
cyber risks related to AI adoption, while other critical
control capabilities will need to be developed from
scratch to adequately mitigate the cyber risks of
AI adoption. Examples of the former are set out in
Table 1 and examples of the latter in Table 2.Identifying options for risk mitigation Step 5
Example of existing control capabilities that need to be tailored TABLE 1
Control Description
Inventory of enterprise
devices and softwareEnsuring that all new assets (devices and software) relating to AI infrastructure (as well
as the models) are inventoried
Business critical
asset mappingMapping the infrastructure supporting the new AI system – including databases and
application programming interfaces (APIs) – to ensure that its criticality is understood
and that it is protected accordingly
Information
governanceEnsuring that the application of AI to personal and other sensitive data does not
undermine organizational information governance policies and data protection regulations
Pre-deployment
integrity processesTailoring security-by-design processes (such as hardening, secure coding, etc.)
specifically for AI data, inference models and technologies.
Business incident
response strategyRefreshing incident response procedures and business continuity plans to account
for the impacts of AI-related cyber risks
Incident recovery tools
and managementUpdating tools and playbooks for recovering AI systems that have been compromised
(e.g. “roll-back” procedures for AI models)
Defining the criteria under which AI should be switched off, if possible
Exercising Adapting the exercises with AI-related cybersecurity incidents to cover all major scenarios
Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards
19
Ask AI what this page says about a topic: