illustration of an AI model Ponemon Report: The Top Three AI Cyber Risks Revealed

July 17, 2024

Ponemon Report: The Top Three AI Cyber Risks Revealed

The 2024 State of Enterprise Cyber Risk in the Age of AI report, independently conducted by Ponemon Institute and analyzed and published by Balbix, is fueled by over 20,000 answers from hundreds of CIOs, CISOs, CSOs, and leaders from information security.

According to the report, enterprise organizations need help keeping up with the growing needs and requirements of cyber risk strategies. Unpatched vulnerabilities were identified as one of the top concerns. Additionally, many organizations plan their cyber strategies more than 12 months in advance. In the age of AI, this results in outdated choices on tooling, processes, and procedures, resulting in weakened security postures against emerging AI-powered threats.

This report reveals the pressing issues that keep cybersecurity professionals awake at night in a new, fast-changing world of cybersecurity where AI plays a dual role in defending and targeting organizations. It explores the growing divide between cybersecurity operators and executive teams regarding the approach, prioritization, and investment in cyber risk management, offering potential solutions to bridge this gap.

Top 3 Findings from the State of Enterprise Cyber Risk in the Age of AI report

1. AI is now a pivotal tool for many organizations, particularly in prioritizing threats and vulnerabilities.

However, nearly half of these organizations are concerned about vulnerabilities arising from AI-generated code despite already integrating AI tools into their operations and tech stacks.
While AI-generated vulnerabilities seem intimidating, organizations should fall back to basics. The speed of coding and development may cause the number of vulnerabilities to rise. Rather than focus on how the vulnerabilities are generated, organizations should have a system to identify and remediate them. This includes prioritizing vulnerabilities based on organizational context and integration with tools to patch and remediate them.

Most orgs want to use AI to fight cyber risk

2. Despite growing concerns around AI, persistent, unpatched vulnerabilities remain the top concern for security professionals.

Alongside misconfigurations and end-of-life (EOL) software, organizations are struggling to manage an increasing number of vulnerabilities. This challenge is compounded by inadequate vulnerability scanning practices, with half of the organizations scanning for CVEs only once a week or longer. Industry reports indicate that attackers can exploit vulnerabilities within days, challenging defenders to always play catch-up.

Unpatched Vulnerabilities

Organizations need to invest in risk-based frameworks and approaches to tackle CVEs, misconfigurations, and EOL software. CVE scanners can provide visibility, but they are siloed in nature. Instead, enterprises should consolidate and unify all exposures and vulnerabilities into a single tool and ensure they prioritize based on impact rather than individual tool scoring.

Vulnerability Scanning Frequency

3. There is a growing divide between the top concerns of security professionals and their executive leadership teams.

Security teams grasp the potential business impact of an exploited vulnerability but need help to convey this effectively to leadership. Astonishingly, 87% of CISOs and CSOs lack overall responsibility for defining metrics in their cyber risk management strategy. Challenges include the time-consuming nature of report preparation and infrequent cybersecurity briefings of executives.

No Cyber Risk Metrics

Consequently, more than half of the executives who do receive reports find them unengaging.However, there is hope in bridging this communication gap. Translating cyber risk into monetary terms can help executives understand the potential business impact of cyber risks. This approach can make cybersecurity reporting more relevant and impactful for leadership.

Executives are uninterested in cybersecurity

Next Steps

There’s a lot more to dive into in the full report. You can download the PDF here.

Lastly, hear directly from our experts in an upcoming webinar walking through the full report findings and offering best practices for improving your cyber risk. Sign up for the webinar with Ponemon Institute on September 11, 2024.