{"id":24655,"date":"2024-11-20T13:39:43","date_gmt":"2024-11-20T12:39:43","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=24655"},"modified":"2024-11-20T13:39:44","modified_gmt":"2024-11-20T12:39:44","slug":"artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/","title":{"rendered":"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State?"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">Artificial intelligence (AI) is transforming numerous sectors, including the industrial sector. The latest advancements, particularly those based on <\/span><i><span data-contrast=\"auto\">Machine Learning (ML)<\/span><\/i><span data-contrast=\"auto\"> like generative AI, are paving the way for new opportunities in process automation, supply chain optimization, personalization, and so on. These innovations enable companies to increase efficiency, reduce costs, enhance user experience, and foster innovative competitiveness.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, this evolution highlights specific cybersecurity challenges associated with these systems, prompting industrial companies to consider how to secure these applications.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What opportunities does Artificial Intelligence bring? And what are the potential cybersecurity risks that come with it? <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h1>AI &amp; Industry\u00a0<\/h1>\n<p><span data-contrast=\"auto\">To better understand the range of possibilities offered by these technologies, Wavestone has created the <\/span><i><span data-contrast=\"auto\">2024 Generative AI Use Case Radar for Operations<\/span><\/i><span data-contrast=\"auto\">. This radar lists the usage trends observed among its industrial clients, as well as other potential use cases that may develop in the coming years:\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24633 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-1.png\" alt=\"\" width=\"1709\" height=\"1039\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-1.png 1709w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-1-314x191.png 314w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-1-64x39.png 64w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-1-768x467.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-1-1536x934.png 1536w\" sizes=\"auto, (max-width: 1709px) 100vw, 1709px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">1<\/span><\/i><i><span data-contrast=\"none\"> \u2013 Generative AI use cases Radar for Operations<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Wavestone has identified four types of use cases (decision support, tool and process improvement, document generation, and task assistance) that impact various industrial functions (production, quality, maintenance, inventory management, supply chain, etc.).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24635 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-2.png\" alt=\"\" width=\"1564\" height=\"824\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-2.png 1564w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-2-363x191.png 363w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-2-71x37.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-2-768x405.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-2-1536x809.png 1536w\" sizes=\"auto, (max-width: 1564px) 100vw, 1564px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure 2 \u2013 Main uses of generative AI in industrial operations<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here are some concrete examples illustrating how these technologies integrate into the operations of various sectors, what they bring, and the potential impacts of cyberattacks on these systems:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24637 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-3.png\" alt=\"\" width=\"1872\" height=\"983\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-3.png 1872w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-3-364x191.png 364w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-3-71x37.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-3-768x403.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-3-1536x807.png 1536w\" sizes=\"auto, (max-width: 1872px) 100vw, 1872px\" \/><\/span><i><span data-contrast=\"none\">Figure 3 \u2013 Real AI use cases in industrial sector<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These systems provide significant technological and strategic advantages, as well as considerable financial or time savings.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, integrating these technologies can also introduce new risks that companies must consider.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>AI Cyber Risks\u00a0<\/h1>\n<h2>How can an attacker compromise these systems?\u00a0<\/h2>\n<p><span data-contrast=\"auto\">There are several categories of AI-specific attacks, all exploiting vulnerabilities present in different phases of these models\u2019 lifecycle, providing a broad attack surface: <\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24639 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-4.png\" alt=\"\" width=\"1629\" height=\"586\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-4.png 1629w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-4-437x157.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-4-71x26.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-4-768x276.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-4-1536x553.png 1536w\" sizes=\"auto, (max-width: 1629px) 100vw, 1629px\" \/><\/span><\/i><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure 4 \u2013 AI lifecycle: possible attacks <\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Most of these attacks aim to divert AI from its intended use. The objectives can include extracting confidential information or making the AI perform unauthorized actions, thereby compromising the security and integrity of the systems.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To understand these attacks in detail, Wavestone\u2019s experts have illustrated <\/span><i><span data-contrast=\"auto\">evasion <\/span><\/i><span data-contrast=\"auto\">and<\/span> <i><span data-contrast=\"auto\">oracle <\/span><\/i><span data-contrast=\"auto\">methods in this dedicated article<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2>What is the situation regarding these risks for industrial companies?\u00a0<\/h2>\n<p><span data-contrast=\"auto\">As it stands, the risks associated with AI in the industry vary greatly depending on the sector and its application.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To carry out <\/span><i><span data-contrast=\"auto\">oracle<\/span><\/i><span data-contrast=\"auto\">, <\/span><i><span data-contrast=\"auto\">manipulation<\/span><\/i><span data-contrast=\"auto\">, and <\/span><i><span data-contrast=\"auto\">prompt injection<\/span><\/i><span data-contrast=\"auto\"> attacks against an AI system, being able to interact with it by providing input data is crucial. This is feasible with some generative AIs, like <\/span><i><span data-contrast=\"auto\">ChatGPT<\/span><\/i><span data-contrast=\"auto\">, which require a user input to start operating. Conversely, other systems, such as those used for <\/span><i><span data-contrast=\"auto\">predictive maintenance<\/span><\/i><span data-contrast=\"auto\"> (AI based solutions that anticipate and prevent equipment failures), do not rely on human instructions to function, making interactions more complex. Moreover, the types of input data for these systems are often very specific, hard to obtain, and manipulate.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Data poisoning<\/span><\/i><span data-contrast=\"auto\"> attacks could be an alternative, as this method does not require interacting with the AI system. However, this would first require infiltrating the information system to gain access to the AI, deeply understanding its architecture, and then attempting to alter its behavior- with no guarantee of success. Moreover, companies with a good level of cybersecurity already have countermeasures and protection methods in place which significantly reduces the chances of such an attack succeeding.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Comparatively, other methods that do not specifically target the AI system can be easier to implement and may provide an attacker with a greater opportunity to cause harm to a company.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, some AI applications, like generative AI assistants, are vulnerable to input-based attacks mentioned above.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here is an example of an attack scenario on the vaccine production assistant shown in <\/span><span data-contrast=\"auto\">Figure 3<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h3>Context of the use-case\u00a0<\/h3>\n<p><span data-contrast=\"auto\">Employees write their request to the assistant, attaching the specifications of the vaccine to be produced. The assistant runs the analysis and, using a RAG module (which provides the AI with additional data without retraining), cross-references this information with the company&#8217;s database. Finally, the assistant returns a machine instruction file to employees, which they can use directly to launch production.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h3>Attack scenario\u00a0<\/h3>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24641 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-5.png\" alt=\"\" width=\"1767\" height=\"395\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-5.png 1767w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-5-437x98.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-5-71x16.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-5-768x172.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/AIIndustry-en-5-1536x343.png 1536w\" sizes=\"auto, (max-width: 1767px) 100vw, 1767px\" \/>\u00a0<\/span><i><span data-contrast=\"none\">Figure 5\u00a0\u2013 Attack scenario killchain on vaccine production assistant<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The consequences of a theft of trade secrets such as this could include the resale of this information to competitors or its public disclosure, which could have significant financial and reputational implications. However, conventional access management security measures can help to reduce the risk of this type of attack.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, although some AI applications are vulnerable to new attacks, specific security measures tailored to the weaknesses of each system ensure effective protection.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1>So, what are the points to remember?\u00a0<\/h1>\n<p><span data-contrast=\"auto\">After all, the risks associated with AI technologies for industrial companies are not fundamentally new.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Although some AI systems are vulnerable to new attacks, the cybersecurity principles for protecting against them and limiting their impact remain unchanged.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It therefore remains essential to adopt a risk-based approach and integrate <\/span><i><span data-contrast=\"auto\">cybersecurity by design<\/span><\/i><span data-contrast=\"auto\"> for any AI application.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI) is transforming numerous sectors, including the industrial sector. The latest advancements, particularly those based on Machine Learning (ML) like generative AI, are paving the way for new opportunities in process automation, supply chain optimization, personalization, and so&#8230;<\/p>\n","protected":false},"author":1499,"featured_media":24654,"comment_status":"open","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3274],"tags":[],"coauthors":[4560,4561,4562],"class_list":["post-24655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence (AI) is transforming numerous sectors, including the industrial sector. The latest advancements, particularly those based on Machine Learning (ML) like generative AI, are paving the way for new opportunities in process automation, supply chain optimization, personalization, and so...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T12:39:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T12:39:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"St\u00e9phane RIVEAUX, Emeline LEGRAND, Mathieu BRICOU\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"St\u00e9phane RIVEAUX, Emeline LEGRAND, Mathieu BRICOU\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\"},\"author\":{\"name\":\"Madeline Salles\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\"},\"headline\":\"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State?\",\"datePublished\":\"2024-11-20T12:39:43+00:00\",\"dateModified\":\"2024-11-20T12:39:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\"},\"wordCount\":829,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\",\"name\":\"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg\",\"datePublished\":\"2024-11-20T12:39:43+00:00\",\"dateModified\":\"2024-11-20T12:39:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg\",\"width\":1920,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\",\"name\":\"Madeline Salles\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/","og_locale":"en_US","og_type":"article","og_title":"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State? - RiskInsight","og_description":"Artificial intelligence (AI) is transforming numerous sectors, including the industrial sector. The latest advancements, particularly those based on Machine Learning (ML) like generative AI, are paving the way for new opportunities in process automation, supply chain optimization, personalization, and so...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/","og_site_name":"RiskInsight","article_published_time":"2024-11-20T12:39:43+00:00","article_modified_time":"2024-11-20T12:39:44+00:00","og_image":[{"width":1920,"height":1920,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg","type":"image\/jpeg"}],"author":"St\u00e9phane RIVEAUX, Emeline LEGRAND, Mathieu BRICOU","twitter_misc":{"Written by":"St\u00e9phane RIVEAUX, Emeline LEGRAND, Mathieu BRICOU","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/"},"author":{"name":"Madeline Salles","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8"},"headline":"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State?","datePublished":"2024-11-20T12:39:43+00:00","dateModified":"2024-11-20T12:39:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/"},"wordCount":829,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/","name":"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg","datePublished":"2024-11-20T12:39:43+00:00","dateModified":"2024-11-20T12:39:44+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8846860_1920.jpg","width":1920,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/artificial-intelligence-industrials-and-cyber-risks-whats-the-current-state\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Artificial Intelligence, Industrials, and Cyber Risks: What\u2019s the Current State?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8","name":"Madeline Salles","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=24655"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24655\/revisions"}],"predecessor-version":[{"id":24660,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24655\/revisions\/24660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/24654"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=24655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=24655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=24655"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=24655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}