Contact us
Cost of a Data Breach Report 2025
Download report
Watch the webinar
The AI oversight gap
New global research from IBM and Ponemon Institute reveals how AI is greatly outpacing security and governance in favor of do-it-now adoption. The findings show that ungoverned AI systems are more likely to be breached and more costly when they are.
0.0M
The global average cost of a data breach, in USD, a 9% decrease over last year—driven by faster identification and containment.
0%
Share of organizations that reported an AI-related security incident and lacked proper AI access controls.
0%
Share of organizations that lacked AI governance policies to manage AI or prevent the proliferation of shadow AI.
0.0M
Cost savings, in USD, from extensive use of AI in security, compared to organizations that didn’t use these solutions.
Key takeaways
Join IBM cybersecurity expert Jeff Crume as he unpacks this year’s key findings, strategic takeaways and recommendations for how you can limit risk and safeguard your AI, data, people and infrastructure.
Watch video (15:26)
Take action
Identity security
Data security
AI oversight
Security automation
Improve resilience
Fortify identities—humans and machines
AI and automation can fortify identity security without overburdening understaffed teams. Implementing strong operational controls for non-human identities (NHIs) and adopting modern, phishing-resistant authentication methods, such as passkeys, can significantly reduce the risk of credential abuse.
Explore IBM® Verify
Explore passwordless authentication
Elevate AI data security practices
Implement strong data security fundamentals: data discovery, classification, access control, encryption and key management. Leverage AI and data security to protect data integrity and avoid compromise. These measures are essential as AI becomes both a threat vector and a security tool.
Explore IBM Guardium®
Secure AI models and agents
Connect security and governance for AI
Investing in integrated security and governance solutions allows organizations to gain visibility into all AI deployments (including shadow AI), mitigate vulnerabilities, protect prompts and data and use observability tools to improve compliance and detect anomalies.
Try watsonx.governance®
Explore IBM Guardium
Use AI security tools and automation
As attackers use AI for more adaptive attacks, security teams must also embrace AI technologies. AI-powered security tools and services can reduce alert volume, identify at-risk data, spot security gaps, detect breaches early and enable faster, more precise responses.
Try detection and response
Use autonomous security
Prepare for cyber threats
Building resilience means quick detection and containment of security issues. Effective crisis response means regularly testing incident response (IR) plans and backups, defining clear roles in the event of a breach and conducting crisis simulations.
Join IBM’s cyber range
Build your cybersecurity skills
Mixture of Experts
Suja Viswesan, Vice President, Security and Runtime Products, joins us to explore takeaways from the Cost of a Data Breach Report 2025. What do we need to know about the risk of rapid AI adoption?
Tune in to Mixture of Experts to find out!
Watch video (8:56)
Take the next step
Read our report to learn why racing to adopt AI without security and governance puts your data and reputation at risk.
Download our report
Watch the webinar
Need more details?
See IBM Guardium in action
Schedule a consultation with an expert
Subscribe to the IBM Think Newsletter
Products
Consulting services
Industries
Case studies
Financing
Research
LinkedIn
X
Instagram
YouTube
Podcasts
Business partners
Documentation
Events
Newsletters
Support
TechXchange community
Overview
Careers
Investor relations
Leadership
Newsroom
Security, privacy and trust
Contact IBM
Privacy
Terms of use
Accessibility
ibm.com, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net, mobilebusinessinsights.com, promontory.com, proveit.com, ptech.org, s81c.com, securityintelligence.com, skillsbuild.org, softlayer.com, storagecommunity.org, think-exchange.com, thoughtsoncloud.com, alphaevents.webcasts.com, ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net, ibmcloud.com, galasa.dev, blueworkslive.com, swiss-quantum.ch, blueworkslive.com, cloudant.com, ibm.ie, ibm.fr, ibm.com.br, ibm.co, ibm.ca, community.watsonanalytics.com, datapower.com, skills.yourlearning.ibm.com, bluewolf.com, carbondesignsystem.com, openliberty.io