CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◆ Security Tools & Reviews Sep 28, 2022

Cost of a Data Breach Report 2025 - IBM

IBM Archived Mar 16, 2026 ✓ Full text saved

Cost of a Data Breach Report 2025 IBM

Full text archived locally
✦ AI Summary · Claude Sonnet


    Contact us Cost of a Data Breach Report 2025 Download report Watch the webinar The AI oversight gap New global research from IBM and Ponemon Institute reveals how AI is greatly outpacing security and governance in favor of do-it-now adoption. The findings show that ungoverned AI systems are more likely to be breached and more costly when they are. 0.0M The global average cost of a data breach, in USD, a 9% decrease over last year—driven by faster identification and containment. 0% Share of organizations that reported an AI-related security incident and lacked proper AI access controls. 0% Share of organizations that lacked AI governance policies to manage AI or prevent the proliferation of shadow AI. 0.0M Cost savings, in USD, from extensive use of AI in security, compared to organizations that didn’t use these solutions. Key takeaways Join IBM cybersecurity expert Jeff Crume as he unpacks this year’s key findings, strategic takeaways and recommendations for how you can limit risk and safeguard your AI, data, people and infrastructure. Watch video (15:26) Take action Identity security Data security AI oversight Security automation Improve resilience Fortify identities—humans and machines AI and automation can fortify identity security without overburdening understaffed teams. Implementing strong operational controls for non-human identities (NHIs) and adopting modern, phishing-resistant authentication methods, such as passkeys, can significantly reduce the risk of credential abuse. Explore IBM® Verify Explore passwordless authentication Elevate AI data security practices Implement strong data security fundamentals: data discovery, classification, access control, encryption and key management. Leverage AI and data security to protect data integrity and avoid compromise. These measures are essential as AI becomes both a threat vector and a security tool. Explore IBM Guardium® Secure AI models and agents Connect security and governance for AI Investing in integrated security and governance solutions allows organizations to gain visibility into all AI deployments (including shadow AI), mitigate vulnerabilities, protect prompts and data and use observability tools to improve compliance and detect anomalies. Try watsonx.governance® Explore IBM Guardium Use AI security tools and automation As attackers use AI for more adaptive attacks, security teams must also embrace AI technologies. AI-powered security tools and services can reduce alert volume, identify at-risk data, spot security gaps, detect breaches early and enable faster, more precise responses.  Try detection and response Use autonomous security Prepare for cyber threats Building resilience means quick detection and containment of security issues. Effective crisis response means regularly testing incident response (IR) plans and backups, defining clear roles in the event of a breach and conducting crisis simulations. Join IBM’s cyber range Build your cybersecurity skills  Mixture of Experts Suja Viswesan, Vice President, Security and Runtime Products, joins us to explore takeaways from the Cost of a Data Breach Report 2025. What do we need to know about the risk of rapid AI adoption? Tune in to Mixture of Experts to find out! Watch video (8:56) Take the next step  Read our report to learn why racing to adopt AI without security and governance puts your data and reputation at risk.  Download our report Watch the webinar Need more details? See IBM Guardium in action Schedule a consultation with an expert Subscribe to the IBM Think Newsletter Products Consulting services Industries Case studies Financing Research LinkedIn X Instagram YouTube Podcasts Business partners Documentation Events Newsletters Support TechXchange community Overview Careers Investor relations Leadership Newsroom Security, privacy and trust Contact IBM Privacy Terms of use Accessibility ibm.com, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net, mobilebusinessinsights.com, promontory.com, proveit.com, ptech.org, s81c.com, securityintelligence.com, skillsbuild.org, softlayer.com, storagecommunity.org, think-exchange.com, thoughtsoncloud.com, alphaevents.webcasts.com, ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net, ibmcloud.com, galasa.dev, blueworkslive.com, swiss-quantum.ch, blueworkslive.com, cloudant.com, ibm.ie, ibm.fr, ibm.com.br, ibm.co, ibm.ca, community.watsonanalytics.com, datapower.com, skills.yourlearning.ibm.com, bluewolf.com, carbondesignsystem.com, openliberty.io
    💬 Team Notes
    Article Info
    Source
    IBM
    Category
    ◆ Security Tools & Reviews
    Published
    Sep 28, 2022
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗