OpenAI’s ‘AI in the Enterprise’ Report: A Must-Read – But One Crucial Piece Is Missing

May 12, 2025

We are standing at the threshold of one of the most transformative technological shifts in modern enterprise history. AI is no longer on the horizon – it’s here, it’s powerful, and it’s already reshaping the way businesses think about productivity, creativity, and competitive advantage.

OpenAI’s recent report, ‘AI in the Enterprise‘, offers a concise and thoughtful roadmap for leaders seeking to implement AI within their organizations. It explores practical applications, change management strategies, and foundational operating models.

If you’re currently evaluating how AI can be embedded into your enterprise, this is essential reading.

But amid the optimism and operational insight, there is a conspicuous silence – one that technology and security leaders must address with urgency: cybersecurity.

AI Without Security Is a Risk Multiplier

While the report gives excellent advice on responsible usage and internal adoption, it does not go far enough in emphasizing the architectural, policy, and operational changes required to safeguard AI-powered systems.

Deploying AI into a corporate environment doesn’t just introduce new efficiencies. It creates new attack surfaces, introduces complex data flows, and, if mishandled, amplifies existing vulnerabilities. The absence of security-by-design principles in AI adoption planning isn’t just an oversight – it’s a potential liability.

What’s Missing: A Secure AI Operating Model

To truly operationalize AI in a secure and scalable way, organizations must start treating cybersecurity as a first-class citizen in AI deployment, not a bolt-on or afterthought. Here’s what needs to be embedded into the enterprise AI model:

1) Data Governance and Access Control

AI thrives on data, but not all data is equal, and not all should be accessible. A strong data classification framework and identity-driven access controls and audit trails are essential.

2) Model Integrity and Supply Chain Security

Enterprises must protect against model poisoning, prompt injection, and unauthorized fine-tuning. The AI supply chain — including third-party models and datasets — needs the same scrutiny as traditional software dependencies.

3) Shadow AI Detection

Just as shadow IT once created security blind spots, unapproved AI tools and integrations can create policy violations and data leakage risks. Visibility is critical.

4) Policy Frameworks for Responsible Use

OpenAI emphasizes responsible usage, but this needs translation into enforceable policy, covering acceptable use, data handling, output validation, and incident response protocols.

5) AI-Specific Threat Modeling

Traditional threat modeling doesn’t fully account for adversarial ML, prompt-based exploits, or LLM misuse. We need threat models that evolve alongside AI capabilities.

Leading the Secure AI Conversation

The takeaway isn’t to criticize the value of OpenAI’s report – far from it. It’s one of the most accessible and actionable resources available to business leaders. But as we evangelize AI’s benefits, our responsibility as technology leaders is to broaden the conversation.

AI is not just a technical opportunity – it’s a strategic inflection point. And just like Cloud and DevOps before it, its true value will only be realized when it’s built on a foundation of trust, governance, and security.

At Teneo, we help enterprises assess and evolve their infrastructure to unlock the full potential of AI. Schedule a free no-obligation consultation with Teneo today. 

Contact us - We’d love to help you





    Teneo collects your personal data when you complete our online forms. We will use this information to provide an accurate response to your questions or requests and we will keep a record of your form completion in our CRM system. By submitting this form, you agree to us contacting you for the purpose of our response. For more information explaining how we use your personal data, please see our Privacy Policy.

    Cookie Policy

    This website uses cookies so we can provide you with the best user experience possible.

    Cookies are small files containing information that enables a website to recognise you. They’re downloaded to the device you use when you visit a website and sent back to that website each time you re-visit, or sent to another website that recognises the same cookie.

    Our cookie policy tells you how and why we use cookies, and how this allows us to improve your online experience. You can read our full Cookie Policy here.

    Strictly Necessary Cookies

    Strictly necessary cookies include session cookies and persistent cookies. Session cookies keep track of your current visit and how you navigate the site. They only last for the duration of your visit and are deleted from your device when you close your Internet browser. Persistent cookies last after you’ve closed your Internet browser and enable our website to recognise you as a repeat visitor and remember your actions and preferences when you return.

    Third Party Cookies

    Third party cookies include performance cookies and targeting cookies. Performance cookies collect information about how you use a website, e.g. which pages you go to most often, and if you get error messages from web pages. These cookies don’t collect information that identifies you personally as a visitor, although they might collect the IP address of the device you use to access the site. Targeting cookies collect information about your browsing habits. They are usually placed by advertising networks such as Google. The cookies remember that you have visited a website and this information is shared with other organisations such as media publishers.

    Keeping these cookies enabled helps us to improve our website and display content that is more relevant to you and your interests across the Google content network.