The Unseen Threat: Your Marketing Team’s New AI Tool Could Cost You $670,000
Imagine this: your marketing team, eager to boost engagement, starts using a new generative AI tool to create hyper-personalized campaigns. They’re getting great results. The only problem? They never told you or your IT team. The tool has broad access to customer data, its security is unvetted, and it’s operating completely outside your governance framework.
This isn’t a hypothetical scenario; it’s the new reality of Shadow AI, and according to the latest research, it’s a massive, and costly blind spot for security leaders. The 2025 Cost of a Data Breach Report from IBM and Ponemon Institute shines a harsh light on this growing problem, revealing that the speed of AI adoption is dangerously outpacing security and governance. For CISOs, the findings are a clear warning: ungoverned innovation comes with a hefty, hidden tax.
The Shadow AI Tax: Quantifying a Top-Tier Threat
For years, we’ve tracked cost amplifiers like security skills shortages and system complexity. This year, Shadow AI has surged to become one of the top three factors that dramatically increase the cost of a data breach.
The numbers are stark. Organizations with high levels of Shadow AI saw their average breach costs swell by a staggering $670,000 compared to those with little or no unsanctioned AI. These aren’t just isolated incidents. The report found that 20% of organizations suffered a breach directly related to a security incident involving Shadow AI.

Source: Figure 40, Cost Of Data Breach, p. 23.
This financial penalty, the “Shadow AI Tax,” is the direct result of a widespread governance gap. A stunning 97% of organizations that experienced an AI-related security incident admitted they lacked proper AI access controls. When combined with the fact that 63% of breached organizations don’t even have an AI governance policy to begin with, it’s clear we’re operating in a new wild west of technology risk.
Anatomy of a Shadow AI Breach: From Blind Spot to Battleground
So, what does an attack leveraging Shadow AI actually look like? It’s often more damaging than a typical breach because the systems are, by definition, unmonitored.
Widespread Exposure and Multi-Cloud Compromise
First, these incidents create widespread exposure. The report shows that in Shadow AI breaches, the compromised data is most often stored across multiple environments and a public cloud (a combined 62%). One unmonitored AI system can create a domino effect across your entire infrastructure.
Attacking the Crown Jewels: PII and IP
Second, attackers target the crown jewels. While customer PII is the most compromised data type in any breach, it’s even more so in Shadow AI incidents. 65% of these breaches involved the loss of customer PII, compared to the global average of 53%. These incidents also saw a higher rate of intellectual property compromise at 40%.

Source: Figure 23, Cost Of Data Breach, p. 16.
Slower Detection and Higher Costs
Finally, the cleanup is slower and more painful. The lack of visibility means these breaches take longer to find and fix. Security incidents involving Shadow AI took approximately a week longer to detect and contain than the global average. Every extra day adds to the final cost and reputational damage.
Closing the Oversight Gap: A CISO’s Action Plan
The report isn’t just a collection of dire warnings; it provides a clear roadmap for mitigating these new risks. The data points to several key strategies that can help you avoid paying the Shadow AI tax.
1. Make AI Governance a Core Security Function:
Security for AI and governance for AI cannot operate in silos. CISOs must collaborate with compliance and revenue officers to invest in integrated processes and software that can automatically discover and govern Shadow AI. Organizations with established AI governance policies saw a cost savings of $147,097 on their breaches compared to the average.
2. Fortify All Identities & Especially Non-Human Ones:
Many attackers today are “logging in, not hacking in.” As AI agents play a larger role in operations, their identities and credentials must be protected with the same rigor as human identities. The report specifically recommends implementing strong lifecycle management for these non-human identities.
3. Fight AI with AI: Embrace Security Automation
Attackers are using AI to their advantage, but defenders have access to the same force multiplier. The report makes a powerful business case for adopting security AI and automation. Organizations that used these tools extensively slashed their average breach costs by $1.9 million and shortened their breach lifecycle by 80 days. These tools can help overburdened security teams reduce alerts, spot threats earlier, and enable a faster, more precise response.
The rise of AI is the most fundamental technological shift in a generation. By understanding the risks of Shadow AI and taking decisive, data-informed action, you can ensure your organization reaps the rewards of innovation without paying the price.
For Further Reading:
This article is based on findings from the IBM Security, Ponemon Institute – Cost of a Data Breach Report 2025: The AI Oversight Gap. It is highly recommended reading the full report for a deeper analysis of the factors and technologies shaping the global threat landscape.