Download our new Personal Protection from CyberCrime ebook for free!

by
Den Jones

Shadow AI Is the New Shadow IT: How Enterprises Can Embrace AI Without Losing Control

Generative AI has moved from “interesting experiment” to “business-critical accelerator” in record time. Teams are using it to draft content, summarize meetings, write code, analyze data, and speed up customer support. And that’s the good news.

The hard truth: many enterprises are adopting AI faster than they can secure it — and they often don’t have the visibility needed to confidently answer a simple question:

“Where is AI being used in our business — and what data is going into it?” 👀

The enterprise AI visibility gap is real

According to Gartner, shadow AI is already widespread: a survey of cybersecurity leaders found 69% of organizations suspect or have evidence that employees are using prohibited public GenAI tools. Gartner also predicts that by 2030, more than 40% of enterprises will experience security or compliance incidents linked to unauthorized shadow AI. (Gartner)

This aligns with what we’re seeing in the field: AI is being adopted bottom-up, often outside approved workflows, because it’s fast, easy, and genuinely useful.

Why this is happening (and why it’s dangerous) ⚠️

Most “AI risk” conversations start with model attacks and prompt injection. Those matter — but the most common enterprise problem is usually more basic:

1) Sensitive data is being pasted into public tools

Multiple industry reports show employees routinely copy/paste or upload corporate data into GenAI applications, sometimes using personal accounts that bypass corporate controls. For example, LayerX reported broad copy/paste behavior into GenAI tools and noted that a portion of that shared content includes sensitive categories like PII/PCI. (TechRadar)

2) Data policy violations are rising fast

Netskope Threat Labs highlighted a sharp increase in GenAI-related data policy violations and described recurring patterns of regulated data being shared with AI tools, including via unmanaged accounts. (IT Pro)

3) “Human-driven” risk hasn’t gone away — it’s accelerating

The Verizon 2024 DBIR reminds us that the human element remains involved in 68% of breaches, and errors are a growing share of breaches (28%). (Verizon)

AI doesn’t replace these risks — it amplifies them:

  • “Misdelivery” becomes “misprompting”
  • “Oversharing” becomes “model training exposure”
  • “Shadow IT” becomes “shadow AI,” at scale

The strategy challenge: enable AI… without opening the floodgates 🧠

Many enterprises are stuck between two bad options:

  • Block everything (and watch teams route around controls)
  • Allow everything (and accept unknown exposure)

Forrester captures the tension: organizations are sprinting to secure GenAI even as use cases evolve and regulations tighten. (Forrester)

In practice, most companies still struggle with:

  • Inventory: Which AI tools are being used (sanctioned and unsanctioned)?
  • Data flow: What data is going into prompts, uploads, plugins, and connectors?
  • Identity + access: Who can use which tools, from what devices, under what conditions?
  • Governance: Which teams own AI policy, approvals, and exceptions?
  • Measurement: Can you prove compliance and reduce risk over time?

A practical path forward: “Secure AI Enablement” (not just AI security) ✅

At 909Cyber, our perspective is straightforward:

The goal isn’t to slow AI down — it’s to give the business safe lanes to move fast. 🚀

Here’s the approach we recommend and implement:

1) Discover and map AI usage (including shadow AI)

  • Identify GenAI apps in use across web, endpoint, and SaaS
  • Detect personal vs managed accounts
  • Map common use cases by business unit (engineering, sales, finance, HR, support)

2) Establish clear AI policy that people can actually follow

Gartner explicitly recommends enterprise-wide policies, regular audits for shadow AI, and incorporating GenAI risk evaluation into SaaS assessment processes. (Gartner)
We translate that into:

  • Approved tools list (and approved use cases)
  • “Never share” data categories (CUI, secrets, credentials, customer PII, regulated data)
  • Guidance for safe prompting and safe sharing (including templates)
  • A real exception process (so teams don’t go rogue)

3) Put controls where the data moves

This is where most programs become real:

  • Data Loss Prevention (DLP) aligned to AI workflows (prompt + upload)
  • SSE/CASB-style visibility and control for GenAI SaaS usage
  • Identity-based policies (who/what/where) tied to business roles
  • Logging + monitoring that integrates into your SOC

4) Secure AI integrations and “agentic” workflows

AI value increasingly comes from connectors (Google Drive, SharePoint, Jira, GitHub, CRM) and agents that can act on behalf of users. That expands the blast radius:

  • Over-permissioned connectors
  • Token leakage
  • Unintended data access paths
  • Automated actions with inadequate oversight

5) Operationalize: test, measure, and improve

  • Tabletop exercises for AI-related incidents (data exposure, credential leakage, risky outputs)
  • Red-team style testing of high-value workflows
  • Metrics: adoption in approved lanes, reduction in policy violations, time-to-detect, time-to-contain

Where 909Cyber helps 🧰

909Cyber works with enterprises that want to accelerate AI adoption while reducing risk — with a program that’s built for how work actually happens.

We bring:

  • Proven security strategy and implementation experience across modern enterprise stacks
  • Tooling and operational workflows to increase visibility, control data movement, and reduce shadow AI
  • Practical governance that supports business velocity (not a 40-page “thou shalt not” policy)

If you’re wrestling with AI visibility, data exposure risk, or the “block vs enable” dilemma — we can help you move from uncertainty to confident scale.

Quick self-check: 8 questions every enterprise should answer 📝

  1. Do we know which GenAI tools are used across the org?
  2. Can we detect personal/unmanaged accounts accessing GenAI tools?
  3. Do we have an approved set of tools + use cases by function?
  4. Do we have AI-specific DLP controls for prompts/uploads?
  5. Are GenAI interactions logged in a way our SOC can monitor?
  6. Are connectors (Drive/SharePoint/Jira/GitHub) least-privileged and governed?
  7. Do we have an incident playbook for AI-related data exposure?
  8. Can we show measurable improvement month over month?

If any of these are “not sure,” that’s the signal — not the failure. It simply means it’s time to build the secure AI enablement foundation.

Want help turning AI into a competitive advantage without losing control?
Reach out to 909Cyber and we’ll walk you through a pragmatic roadmap to secure AI adoption. 🤝🔐

#AI #GenAI #ShadowAI #CyberSecurity #DataProtection #DLP #ZeroTrust #CISO #EnterpriseSecurity #RiskManagement #SOC #SaaSSecurity #Governance #909Cyber

About our Author
About our guest
Den Jones

Den Jones is a recognized leader in Zero Trust security with over 35 years of IT and cybersecurity experience spanning the tech, finance, and manufacturing industries.  Den is the host of the podcast 909Exec, focusing on helping executives in technology.  He is also an evangelist on the speaking circuit from keynote events to moderation; his blend of Scottish humor and decades of experience leaves lasting memories and education.

Prior to founding 909Cyber Den ran Enterprise Security at Adobe and Cisco and was the Chief Security Officer at SonicWall and Banyan Security.  Den’s organizations led the pro-active strategies, execution, and operation of mission critical services.  

His leadership has shaped forward-thinking cybersecurity programs, and his influence extends into the broader industry through contributions to the Identity Defined Security Alliance, Microsoft’s Cybersecurity Council, and multiple Zero Trust advisory boards.

Known for building pragmatic and scalable security solutions, Den blends technical depth with real-world execution. Outside of cybersecurity, he's a passionate music producer with vinyl releases to his name, and an avid fan of soccer, snowboarding, golf, fishing, and food—bringing creativity and balance to every challenge he tackles.

Connect with
Den Jones
on
LinkedIn

Still have questions?