POINT OF VIEW
Introduction
In today’s increasingly volatile cyber landscape, organisations can no longer treat data security as a peripheral issue. It is a board-level concern with implications for financial performance, regulatory compliance, and long-term trust.
As IBM’s 2025 Cost of a Data Breach Report makes clear, the risks of under-investment in security measures are severe, but the rewards of effective tools are equally significant. For senior leaders, the priority is not simply to “have security”, but to embed advanced, proactive data protection strategies at the very core of operations.
From shadow AI to supply chain risk, uncover the case for modern cybersecurity tools
Financial Stakes: The True Cost of a Breach
The headline finding from IBM’s 2025 study is that the global average cost of a data breach fell to USD 4.44 million, marking the first decline in half a decade. This reduction is directly attributed to faster identification and containment through automation, AI-driven detection, and improved security software. However, averages can be misleading.
-
- United States: Costs escalated to a record USD 10.22 million, fuelled by stringent regulatory penalties, litigation exposure, and prolonged recovery cycles.
- United Kingdom: The average breach cost reached £3.40 million, with public sector organisations only marginally lower at £3.29 million. This highlights that government bodies, despite limited commercial data, remain highly attractive targets, often with complex supply chain exposure.
Such figures underscore a simple reality: the financial risk is systemic, not sector-specific. Regardless of industry, a breach now carries material consequences that can rival capital expenditure projects in size and impact.
AI: A Double-Edged Sword
AI has reshaped both the offensive and defensive sides of cybersecurity. According to IBM, the average lifecycle of a breach is now 241 days, the shortest in nine years, due in large part to AI-enabled monitoring and response. Organisations deploying mature AI and automation saved USD 1.9 million per incident compared with those without.
Yet AI has also armed adversaries. Between 16–20 per cent of breaches in 2025 involved AI-driven attacks, such as highly convincing phishing campaigns or deepfake impersonation of executives. The rise of “shadow AI” – where staff use unsanctioned AI tools – was cited in 20 per cent of breaches, each adding an average USD 670,000 to incident costs.
The governance gap is glaring:
-
- 97 per cent of organisations affected by AI-related breaches lacked basic access controls.
- 63 per cent had no AI governance framework in place.
AI can be an accelerator of resilience or a magnifier of risk, depending entirely on how it is integrated and governed.
The Role of Governance and Culture
Technology alone does not close the risk gap. Culture, policy, and governance frameworks are equally vital. Many organisations pursue rapid AI adoption but neglect to define acceptable use, approval workflows, or audit procedures. Without these guardrails, even the most advanced security software will operate in a vacuum.
Senior leadership must therefore prioritise:
-
- Comprehensive visibility across all systems, including shadow IT and shadow AI.
- Defined governance to establish accountability and compliance.
- Cross-functional engagement so that security is not perceived as a technical silo but as a shared business responsibility.
Third-Party and Supply-Chain Risks
Another trend highlighted by IBM’s research is the persistence of supply-chain compromise as a major attack vector. These breaches are typically more complex, harder to detect, and more expensive to remediate. In the UK public sector, such attacks added an estimated £240,000 to average breach costs.
Mitigating this risk requires extending security tooling beyond the perimeter. Vendor risk assessments, continuous monitoring of partner access, and secure data-sharing platforms are now indispensable parts of a modern defence architecture.
IBM Guardium: A Data Security Platform for the Modern Era
Among the most effective approaches to mitigating breach risk is the deployment of data-centric security platforms. IBM Guardium is a prime example of a solution that addresses many of the challenges highlighted in the 2025 Cost of a Data Breach Report.
Guardium focuses specifically on data activity monitoring, compliance, and protection; areas often under-served by conventional perimeter or endpoint defences. Key benefits include:
-
- Real-Time Data Visibility – Guardium continuously monitors data activity across diverse environments, including databases, data warehouses, cloud platforms, and big data systems. This visibility ensures organisations can identify unusual behaviour at its source, whether malicious insiders, compromised accounts, or unsanctioned AI activity.
- Advanced Threat Detection – Through analytics and machine learning, Guardium identifies patterns indicative of misuse or exfiltration. For example, it can flag an abnormal number of records being exported, or irregular query behaviour that might signal preparation for a breach.
- Automated Compliance Reporting – Regulatory fines are a significant cost driver in breach incidents. Guardium provides built-in compliance capabilities, generating reports that align with GDPR, PCI DSS, HIPAA, and other frameworks, reducing both manual effort and the risk of oversight.
- Policy Enforcement and Access Control – Guardium enables granular policy enforcement, ensuring that only authorised users access sensitive data, and that access is monitored, logged, and audited. This directly addresses the governance gap identified in IBM’s 2025 study, particularly around AI use.
- Integration Across the Security Ecosystem – Guardium integrates with SIEM systems, incident response platforms, and AI-driven security orchestration tools, ensuring that data protection is embedded across the broader cyber defence stack.
- AI Security – Guardium detects AI usage across the enterprise (including shadow AI), identifies misconfigurations and vulnerabilities, and inspects AI prompts and data inputs to ensure no policy breaches for safe AI use.
Guardium illustrates what “data protection in practice” looks like: a platform designed to accelerate detection, reduce compliance exposure, and materially lower breach costs.
Summary: A Senior Leadership Mandate
The 2025 IBM report offers both warning and encouragement. While the global cost of a data breach has fallen for the first time in years, this is not evidence of reduced risk. Instead, it demonstrates the tangible benefit of investing in modern security tools, AI-enabled detection, and governance frameworks. Organisations that have not taken these steps remain exposed – financially, operationally, and reputationally.
The message for senior leaders is clear:
-
- Deploy advanced data protection platforms such as IBM Guardium.
- Establish AI governance to manage both opportunity and risk.
- Extend security visibility across supply chains and third-party systems.
- Prioritise automation and intelligence to accelerate breach detection and response.
In a world where cyber adversaries are increasingly well-funded and technologically sophisticated, effective data protection is a strategic differentiator and a fiduciary responsibility.
Now is the time to move from awareness to action.
Make data security a priority. Contact Responsiv, today.



