The rise of artificial intelligence has rendered portions of your current cybersecurity playbook obsolete. Unless Chief Information Security Officers (CISOs) act quickly to reorient their thinking, they may be unaware of and unprepared to face emerging AI-related threats. Learn how to secure your organization’s AI usage and ensure implementation won’t have negative consequences.
AI usage is on the rise, and with it come security concerns. According to the 2025 Cyberhaven AI Adoption Risk Report, workplace AI usage increased by a magnitude of 61 from 2023 to 2025. Most of the enterprise data these tools process ends up on high or critical-risk platforms, and much of the information employees input is sensitive.
Regardless of your personal opinions on AI, it is essential to recognize that it has significant cybersecurity implications. They apply to you regardless of whether you build an internal model from the ground up, develop a lightweight agent, or source an AI-enabled tool from a third-party software-as-a-service (SaaS) vendor.
Shadow AI Risks (Ungoverned AI Usage)
Adversarial AI & Cyber Threats
AI Development & Supply Chain Risks
AI Risk Realizations (Operational Failures)
Legal, Compliance & Ethical Risks
As a leading information security consulting firm, CBIZ Pivot Point Security can leverage forward-thinking insights to help you prepare your next steps. Even if you have deep technical knowledge, you’ll want to listen to expert recommendations from an outside partner drawing on the work they are doing with dozens of other organizations facing similar challenges.
1. Third-Party AI Tools Are Safe
Consider that 56% of organizations using third-party AI tools experienced at least one incident of sensitive data exposure, and only 23% have incorporated AI-specific evaluations into their third-party risk assessments.
The Harvard Extension School surveyed a panel of CISOs and cybersecurity leaders. One was Naveen Balakrishnan, the managing director at TD Securities. He estimated 70% of AI-driven cyberattacks enter his organization’s environments through third-party vendors.
2. You Can Control Workers’ AI Usage
At CBIZ Pivot Point Security, we believe shadow AI is among the most pressing AI risks facing CISOs. Given that 40% or more of SaaS applications are AI-enabled, every organization is consuming far more AI than they assume. For the average midmarket organization, this equates to 60 unmanaged AI applications.
3. AI Vendor Contracts Will Protect You
Airtight vendor agreements may protect your company from liability, but they won’t prevent indirect financial or reputational damage. Evolving law makes the user of the AI-enabled application liable in the event that it fails (e.g., discriminates against a particular ethnic group), rather than the vendor, unless the end user organization has a robust AI-Governance program in place and has done due diligence against the vendor.
4. In-House Models Are More Secure
Developing a machine learning model in-house provides more control over development; however, it still carries risks, including hallucinations, discrimination, unsafe output, copyright violations, and data leakage. The vast majority of developers now utilize AI-enabled development tools, which have recently been targeted by malicious adversaries.
Mitigating AI risk requires a comprehensive approach. CISOs should establish an internal AI governance/risk management program aligned with prevailing good practice (e.g., NIST AI RMF, ISO 42001).
Core elements include (but are not limited to):
The threats AI poses in business environments are varied and dynamic, making it challenging to protect the workplace. Whether you develop your own systems or just use AI-enabled SaaS, ensuring secure and strategic AI usage will advance business objectives.
Even with all of this knowledge, navigating emerging AI threats can be challenging. If employee training backfires or valued vendors create attack vectors, the experts at CBIZ Pivot Point Security can help you anticipate your next steps and turn risks into opportunities. Contact them today to stay ahead of the evolving cybersecurity landscape.