00%
10%
20%
30%
40%
50%
60%
Advance of Adversarial capabilties-phishing,malware development,deepfakes
Data leakes-exposure of personally identifiable information through generative AI
Increased compalexity of security governance
Technical security of the ALI systems themselves
Software supply-chain and code development risk-potential backdoors
Legal concern of intellectual property and liabillty