Charting a Trustworthy AI Journey

Its direct impact on people's lives has raised considerable questions around AI ethics, data governance, trust and legality.
There are risks that large language models will be used to manipulate data in ways that will make us question the veracity of all sorts of information.
Vulnerabilities and the proliferation of the knowledge on how to use them means that well-meaning initiatives without the right security may put relationships at risk and proprietary data exposed.
Using gen AI in the organization also put trust at risk.
The leaders apply a cyber risk-based framework that is completely integrated into their enterprise risk management program.
They consider cybersecurity risk to a great extent when evaluating overall enterprise risk.
Business leaders and the board need non-technical explanation and a common understanding to agree on governance guardrails and appreciate the risks of having actual business data compromised.
Stories and what-if scenarios can help users gain a gut-level appreciation about the risks of undermining trust.
Users need to appreciate that once corporate data is out in the public environment, it is not coming back.
Legal, Risk, IT, Information Security, Marketing and HR should all be engaged in charting the gen AI journey.
To get ahead of the risks of rogue efforts, establish an environment for users to test the appropriate uses and limitations of various models, and of the data that trained the model.
Identify the prerequisites for sustainable generative AI success-A strategic discussion with business leaders is required to ensure that the generative AI journey actually leads to business value.
A modern data foundation is required to create measurable business value from proprietary data in your model.
A well planned and executed security strategy can mitigate the risk of compromise that comes with generative AI products.
Develop use cases that reinforce trust-Demonstrate to the CEO, the board and other leaders what is possible with generative AI. Also, highlight the privacy and intellectual property risks and propose criteria for evaluating the value of use cases that will inevitably be brought forward by other areas of the business.
In time, generative AI could support enterprise governance and information security, protecting against fraud, improving regulatory compliance, and proactively identifying risk by drawing cross-domain connections and inferences both within and outside the organization.
Know data sources and data lineage-Monitor network traffic and shadow models to prevent data from leaving the enterprise.
Database records, system files, configurations, user files, applications, and customer data may all be at risk of leakage in a public large language model environment.
Not understanding or curating the training data set can lead to inaccuracies, misinformation, discrimination, bias, harm, lack of fairness or adversarial actions like data poisoning.
Lisa O'Connor is Accenture's Managing Director, Global Security Research and Development, a visionary leader who understands both the opportunities and risks of emerging technologies to the business.


This Cyber News was published on www.cyberdefensemagazine.com. Publication date: Fri, 05 Jan 2024 06:13:06 +0000


Cyber News related to Charting a Trustworthy AI Journey

Accelerating Your Journey to the 128-bit Universe - The 2023 National Cybersecurity Strategy requires acceleration of your agency's mission to go boldly into the 128-bit address space universe with greater speed and urgency. IPv6-only is the addressing standard for the U.S. Federal Government, ...
7 months ago Feedpress.me
Charting a Trustworthy AI Journey - Its direct impact on people's lives has raised considerable questions around AI ethics, data governance, trust and legality. There are risks that large language models will be used to manipulate data in ways that will make us question the veracity of ...
6 months ago Cyberdefensemagazine.com
Cisco Motific reduces GenAI security, trust, and compliance risks - Cisco announced Motific, Cisco's SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco's incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and ...
5 months ago Helpnetsecurity.com
Saudi Arabia's National Cybersecurity Authority Announces the GCF Annual Meeting 2024 - Under the theme 'Advancing Collective Action in Cyberspace,' the event will unite thought leaders, decision makers and experts across the global Cyberspace community to bolster international cooperation, address shared challenges, enhance ...
3 months ago Darkreading.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
6 months ago Hackread.com
SailPoint unveils two sets of new offerings to help companies grow their identity security program - SailPoint unveiled two sets of new offerings designed to give customers options as they build their identity program, while driving customer success throughout their identity journey. First, the company is extending the family of SailPoint Identity ...
5 months ago Helpnetsecurity.com
An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft - Bruce's early years were far from easy. At the tender age of 11, Bruce's mother brought home a discarded computer from his workplace. Like any child of the '90s, having a computer in his room made Bruce feel like he had struck gold. Bruce has ...
4 months ago Msrc.microsoft.com
Autonomous Vehicles: Driving the Future - The realm of autonomous vehicles presents a fascinating scenario where machines assume control of the wheel, ushering in a new era of transportation. The evolution of autonomous vehicles began quietly in the early days of the automotive industry, ...
3 months ago Securityzap.com
NIST Fortifies Chatbots and Self-Driving Cars Against Digital Threats - In a landmark move, the US National Institute of Standards and Technology has taken a new step in developing strategies to fight against cyber-threats that target AI-powered chatbots and self-driving cars. The Institute released a new paper on ...
6 months ago Infosecurity-magazine.com
Defining Good: A Strategic Approach to API Risk Reduction - A good API security strategy starts with a well thought out API security posture governance program that spans from design to deployment. That standard, if communicated and enforced effectively, will not only positively affect how a developer designs ...
5 months ago Securityboulevard.com
What we learned over coffee at the year's biggest healthcare event - Healthcare organizations are dedicated to providing exceptional care, prioritizing the patient's satisfaction and experience through a patient-centered approach. This approach ensures patients are firmly at the center of their care and engaged in ...
1 month ago Feedpress.me
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
1 week ago Techtarget.com
The Rise of Digital Customer Experience - Digital customer experience is a hot topic these days. In all seriousness, digital customer experience is one of the most important differentiators for your business. At its core, DCX is about the customer journey-a guided path for your customers to ...
7 months ago Feedpress.me
ZTNA over VPN Can Be a Good Place to Start Your Zero Trust Journey - Zero-trust network access has become the leading project for organizations looking to adopt zero-trust principles. Gartner predicts that 60% of organizations will be adopting zero trust by 2025,1 so there are lots of zero-trust projects going on. As ...
7 months ago Feeds.fortinet.com
Bringing Simplicity to Security: The Journey of the Cisco Security Cloud - In June of 2022 at the RSA Conference, we announced our vision for the Cisco Security Cloud Platform. Since the announcement, we've been working hard to deliver, and the core of what we've accomplished has been rooted in how we can bring simplicity ...
6 months ago Feedpress.me
Join Customer Experience for Cisco Live EMEA Demos - In her blog, Countdown to Cisco Live EMEA, Adele Trombetta, SVP, Cisco Customer Experience EMEA, mentioned how excited she is for Cisco Live EMEA in just a little more than a week, and I agree. I want to go a little deeper and give you some more ...
5 months ago Feedpress.me
Future Health: AI's Impact on Personalised Care in 2024 - As we dive into the era of incorporating Artificial Intelligence into healthcare, the medical sector is poised for a profound transformation. AI holds immense potential in healthcare, offering groundbreaking advancements in diagnostics, personalised ...
6 months ago Cysecurity.news
Biden Issues Executive Order on Safe, Secure AI - President Biden has issued an Executive Order to establish new standards for AI safety and security. The order follows previous actions the President has taken on responsible innovation, including work that led to 15 leading tech companies pledging ...
7 months ago Infosecurity-magazine.com
Microsoft Disables Verified Partner Accounts Used for OAuth Phishing - Microsoft has disabled multiple fraudulent, verified Microsoft Partner Network accounts for creating malicious OAuth applications that breached organizations cloud environments to steal email. In a joint announcement between Microsoft and Proofpoint, ...
1 year ago Bleepingcomputer.com
Smishing: SMS Phishing Attacks And How to Thwart Them - Smishing is a fast growing version of one of the most established and lucrative scams on the internet. Smishing, like other forms of phishing, aims to trick you into revealing sensitive data and information; however, instead of email, cybercriminals ...
6 months ago Cysecurity.news
Cybersecurity For Remote Hiring: How To Ensure Data Protection - Remote hiring is surging, reshaping how companies attract and onboard new talent. According to IBM's 2023 Cost of a Data Breach report, the global average data breach cost in 2023 was $4.45 million, a 15% increase over three years. The urgency for ...
5 months ago Forbes.com
For the Love of Learning: We're Here for You at Cisco Live 2024 Las Vegas! - Cisco Live is all about learning, as are Cisco Learning & Certifications and Cisco U. We're here to provide the opportunities you need to learn everything you can and apply your newfound knowledge as soon as possible in the tech career you want. ...
1 month ago Feedpress.me
Java 11 to 21: A Visual Guide for Seamless Migrati - One such significant transition is the migration from Java 21 to Java 11. In this comprehensive article, we embark on a journey to explore the intricacies of migrating from the cutting-edge Java 21 to the robust and widely adopted Java 11. Beyond the ...
7 months ago Feeds.dzone.com
Imperva & Thales: Pioneering a New Era in Cybersecurity - Imperva has been a beacon of excellence for over twenty years in the digital protection landscape, where innovation is paramount. Renowned for its groundbreaking products, Imperva has not just secured applications, APIs, and data for the world's ...
7 months ago Imperva.com
Sekoia.io achieves PCI-DSS compliance - These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors ...
7 months ago Blog.sekoia.io

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)