The world convenes to discuss AI protections and policies amid growing data asymmetries

Speaking at the World Economic Forum a few days ago, Liz Centoni explained a wide-angle view that it's about the data that feeds AI models.
Data and context to customize AI models derives distinction, and AI needs large amounts of quality data to produce accurate, reliable, insightful output.
Some of the work that's needed to make data trustworthy includes cataloging, cleaning, normalizing, and securing it.
It's underway, and AI is making it easier to unlock vast data potential.
AI has and will continue to be front-page news in the year to come, and that means data will also be in the spotlight.
Data is the backbone and the differentiator for AI, and it is also the area where readiness is the weakest.
The AI Readiness Index reveals that 81% of all organizations claim some degree of siloed or fragmented data.
While siloed data has long been understood as a barrier to information sharing, collaboration, and holistic insight and decision making in the enterprise, the AI quotient adds a new dimension.
With the rise in data complexity, it can be difficult to coordinate workflows and enable better synchronization and efficiency.
Leveraging data across silos will require data lineage tracking so that only the approved and relevant data is used, and AI model output can be explained and tracked to training data.
We'll look back a year from now and see 2024 as the beginning of the end of data silos.
Emerging regulations and harmonization of rules on fair access to and use of data, such as the EU Data Act which becomes fully applicable next year, are the beginning of another facet of the AI revolution that will pick up steam this year.
Unlocking massive economic potential and significantly contributing to a new market for data itself, these mandates will benefit both ordinary citizens and businesses who will access and reuse the data generated by their usage of products and services.
According to the World Economic Forum, the amount of data generated globally in 2025 is predicted to be 463 exabytes per day, every day.
The sheer amount of business-critical data being created around the world is outpacing our ability to process it.
It may seem counterintuitive that as AI systems continue to consume more and more data, available public data will soon hit a ceiling and high-quality language data will likely be exhausted by 2026 according to some estimates.
Both private and synthetic data, as with any data that is not validated, can also lead to bias in AI systems.
Misuse of private data can have serious consequences such as identity theft, financial loss, and reputation damage.
Organizations must ensure they have data governance policies, procedures, and guidelines in place, aligned with AI responsibility frameworks, to guard against these threats.
Recognizing the urgency that AI brings to the equation, the processes and structures that facilitate data sharing among companies, society, and the public sector will be under intense scrutiny.


This Cyber News was published on feedpress.me. Publication date: Fri, 26 Jan 2024 13:13:04 +0000


Cyber News related to The world convenes to discuss AI protections and policies amid growing data asymmetries

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
6 months ago Aws.amazon.com
The world convenes to discuss AI protections and policies amid growing data asymmetries - Speaking at the World Economic Forum a few days ago, Liz Centoni explained a wide-angle view that it's about the data that feeds AI models. Data and context to customize AI models derives distinction, and AI needs large amounts of quality data to ...
1 year ago Feedpress.me Equation
Create Highly Secure Applications in Mule 4 - Accessibility Control/Access Management Use Anypoint Access Management to create your Anypoint Platform account or configure a federated External Identity. Environment Management Anypoint Platform enables you to create and manage separate deployment ...
1 year ago Feeds.dzone.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
1 year ago Venturebeat.com
DP World confirms data stolen in cyberattack, no ransomware used - International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. The company says no ransomware payloads or encryption was used in the attack. On November ...
1 year ago Bleepingcomputer.com
Microsoft will roll out MFA-enforcing policies for admin portal access - Microsoft will soon start rolling out Conditional Access policies requiring multifactor authentication from administrators when signing into Microsoft admin portals such as Microsoft Entra, Microsoft 365, Exchange, and Azure. The company will also ...
1 year ago Bleepingcomputer.com
Protect Your Data: Why Data Is More Valuable Than You Realize - Data is more valuable than you realize, and protecting it should always be a top priority. Data privacy has never been more important, and organizations need to understand the risks of data exposure and implement measures to protect against data ...
2 years ago Welivesecurity.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
1 year ago Securityzap.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
1 year ago Securityzap.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
1 year ago Helpnetsecurity.com
Americans Deserve More Than the Current American Privacy Rights Act - EFF is concerned that a new federal bill would freeze consumer data privacy protections in place, by preempting existing state laws and preventing states from creating stronger protections in the future. The bill should limit sharing with the ...
1 year ago Eff.org
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
2 years ago Tripwire.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
1 month ago Cybersecuritynews.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
1 year ago Darkreading.com
Indian IT Leaders Identify Security Gap in Data Policies - A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization's data policies. This discovery ...
1 year ago Securityboulevard.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
1 year ago Securityboulevard.com
How To Implement Data Management Into Your AI Strategy - While an AI strategy has different components, including infrastructure, technology stack, organizational changes, and more, the most important is the data strategy. A well-defined data strategy is the foundation for successful AI implementation. AI ...
1 year ago Feeds.dzone.com
Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
10 months ago Helpnetsecurity.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
1 year ago Microsoft.com
Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid - Whether they're earned or not, there are certain stigmas associated with chief information security officers: They work in isolation, with only a vague sense of how various departments contribute to the organization's greater good. Does this describe ...
1 year ago Darkreading.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Business Data Encryption: Protecting Sensitive Information - In addition to implementing encryption technologies and policies, organizations should prioritize employee training on data encryption. By selecting the appropriate encryption technologies, implementing strong encryption policies, and training ...
1 year ago Securityzap.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
6 months ago Cyberdefensemagazine.com

Latest Cyber News


Cyber Trends (last 7 days)