{"id":1461,"date":"2024-03-21T13:19:41","date_gmt":"2024-03-21T13:19:41","guid":{"rendered":"https:\/\/d3mlabs.de\/?p=1461"},"modified":"2024-03-21T13:45:50","modified_gmt":"2024-03-21T13:45:50","slug":"brave-questions-about-ai-information-and-cyber-security-round-table-1","status":"publish","type":"post","link":"https:\/\/d3mlabs.de\/?p=1461","title":{"rendered":"Brave Questions About AI &#038; Information and Cyber Security Round Table # 1"},"content":{"rendered":"\n<p>AI is in its inception phase in terms of industrialization. Individuals and organizations are experimenting with applications of AI. One participant said it is a bit \u201cWild West\u201d when it comes to security.&nbsp;<\/p>\n\n\n\n<p>On March 20, 2024 <a href=\"https:\/\/www.linkedin.com\/in\/ACoAAAASfokBCuJPldb-3U-MBCCdwGzDLeiliMU\">Elizabeth Press<\/a>&nbsp;from&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/d3m-associates\/\">D3M Labs<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/ACoAAAEsLHkB7Yo_BFEyfxzzAJYpzCCrQgRtQzs\">Hannah Suarez<\/a>&nbsp;from&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/superuser-space\/\">Superuser O\u00dc<\/a> co-hosted a round table about AI &amp; Information and Cyber Security with Founders, Data Leaders and Cyber Security Leaders.<\/p>\n\n\n\n<p><strong>What are the new Risks and Opportunities with using AI in my company\/organization?&nbsp;<\/strong><\/p>\n\n\n\n<p><em>Large Language Models<\/em><\/p>\n\n\n\n<p>Open LLMs are trained on a wide range of data sources, offering versatility across tasks. However, their use may inadvertently lead to information leakage. Moreover, concerns exist regarding data poisoning, hallucinations, and transparency regarding input and data quality. Notably, not all companies, particularly smaller organizations, can leverage Local LLMs. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.ciodive.com\/news\/Samsung-Electronics-ChatGPT-leak-data-privacy\/647137\/#:~:text=OpenAI%20conducted%20an%20investigation%20into%20the%20issue%20that,date%2C%20OpenAI%20said%20in%20a%20March%20blog%20post.\" title=\"\">Samsung <\/a>had highly publicized information leakages due to employees inputing sensitive data into ChatGPT.<\/p>\n\n\n\n<p><em>The Blackwell Superchip<\/em><\/p>\n\n\n\n<p>Microsoft Azure announced that it will adopt NVIDIA Grace Blackwell Superchip, which will advance AI Architecture that is available on the market, availing trillion-parameter foundation models through the Grace Blackwell.&nbsp;<\/p>\n\n\n\n<p>The potential impact of Generative AI on employment poses a significant social risk. Presently, the quality of the output is limited, and use of Generative AI often serves to enhance efficiency, such as using Copilot for code generation. Human intervention remains essential for ensuring output quality. Yet, the question remains: for how long will this reliance on human intervention remain?<\/p>\n\n\n\n<p><em>The Modern Data Stack and Cloud-based Supply Chains<\/em><\/p>\n\n\n\n<p>In the dynamic landscape of modern data teams, data science competencies, and digital enterprises, supplier risk looms large. The \u201cmodern data stack,\u201d cloud-based supply chains, and interdependencies introduce complexities. Organizations rely on various vendors for critical components, from storage to analytics. However, this reliance comes with inherent risks. Vendors\u2019 reliability, security vulnerabilities, data privacy compliance all impact data continuity.&nbsp; <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/massive-trello-user-data-leak-hacker-lists-15-million-records-on-a-dark-web-hacking-forum\/\" title=\"\">Trello<\/a>, a popular project management software platform, was scraped and leaked on the dark web. Approximately 15 million users were affected by this breach.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>How do you foster a cyber and information security aware culture in a digital organization, especially in a data team?<\/strong><\/p>\n\n\n\n<p><em>Standardized Work<\/em>,<em> Documentation, Transparency<\/em><\/p>\n\n\n\n<p>A culture characterized by standardized work, meticulous documentation, and adherence to best practices establishes a solid groundwork for fostering a healthy work environment conducive to heightened security awareness. Additionally, promoting transparency simplifies the path to frameworks such as ISO 27001:2022 and SOC 2 Type 2.<\/p>\n\n\n\n<p><em>Acceptable Usage <\/em><\/p>\n\n\n\n<p>Policies on acceptable usage of LLMs is also a great way to foster a security aware culture when it comes to Generative AI.&nbsp; The International Society of Computational Biology (ISCB) has published a <a href=\"https:\/\/www.iscb.org\/iscb-policy-statements\/iscb-policy-for-acceptable-use-of-large-language-models\" title=\"\">Policy for Acceptable Use of Large Language Models<\/a>.<\/p>\n\n\n\n<p><em>Empowered CISO<\/em><\/p>\n\n\n\n<p>Empowering the CISO with accountability and responsibility to create a security aware culture and adhere to frameworks is also important.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>How can AI be used to enhance cybersecurity?<\/strong><\/p>\n\n\n\n<p>AI can be very effective in detecting phishing, often better than humans.&nbsp;<\/p>\n\n\n\n<p>Cyber attackers frequently innovate at a pace surpassing that of cyber defenders. Cybercrime has evolved into a significant industry, sometimes backed by state actors. The methods and sophistication exhibited by attackers in your organization&#8217;s threat landscape are contingent upon the profile and nature of your organization.<\/p>\n\n\n\n<p>AI-powered features are indeed becoming an expected standard in cybersecurity and among various digital service providers, including those operating in the cloud<\/p>\n\n\n\n<p>Conducting due diligence on third-party suppliers is crucial. Both SOC 2 Type 2 and ISO 27001:2022 emphasize the importance of evaluating and managing third-party suppliers effectively. They require organizations to assess the security posture and practices of their suppliers to ensure they meet certain standards and requirements. This includes conducting risk assessments, implementing controls, and establishing agreements to address security concerns associated with third-party relationships.<\/p>\n\n\n\n<p>Do you want to create a security-aware AI-ready organization? Would you like an assessment, roadmap and assistance getting ISO 27001 : 2022 certified? Email: Elizabeth.Press@d3mlabs.de <\/p>\n\n\n\n<p>The German version: <a href=\"https:\/\/d3mlabs.de\/?p=1466\">Mutige Fragen zu KI &amp; Information und Cybersicherheit Round Table # 1 &#8211; The Data-Driven Decision Making Blog (d3mlabs.de)<\/a><\/p>\n\n\n\n<p>Read <a href=\"https:\/\/d3mlabs.de\/?p=1449\">Bridging the Gap: AI and Information &amp; Cybersecurity<\/a><\/p>\n\n\n\n<p>Watch &#8222;Unlocking Business Value Through Cyber and Information Security,&#8220; and conversation with Hannah Suarez and Elizabeth Press. <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n\t\t<div class=\"embed-privacy-container is-disabled embed-youtube\" data-embed-id=\"oembed_9f244fbe49ed6ad071085865395fbed5\" data-embed-provider=\"youtube\" style=\"aspect-ratio: 500\/281;\">\t\t\t\t\t\t<button type=\"button\" class=\"embed-privacy-enable screen-reader-text\">\u201eUnlocking Business Value Through Cyber and Information Security\u201c von YouTube anzeigen<\/button>\t\t\t\t\t\t<div class=\"embed-privacy-overlay\">\t\t\t\t<div class=\"embed-privacy-inner\">\t\t\t\t\t<div class=\"embed-privacy-logo\" style=\"background-image: url(https:\/\/d3mlabs.de\/wp-content\/plugins\/embed-privacy\/assets\/images\/embed-youtube.png?ver=1.12.3);\"><\/div>\t\t<p>\t\tHier klicken, um den Inhalt von YouTube anzuzeigen.\t\t\t\t\t<br>\t\t\t\t\tErfahre mehr in der <a href=\"https:\/\/policies.google.com\/privacy?hl=de\" target=\"_blank\">Datenschutzerkl\u00e4rung von YouTube<\/a>.\t\t<\/p>\t\t<p class=\"embed-privacy-input-wrapper\">\t\t\t<input id=\"embed-privacy-store-youtube-9f244fbe49ed6ad071085865395fbed5\" type=\"checkbox\" value=\"1\" class=\"embed-privacy-input\" data-embed-provider=\"youtube\">\t\t\t<label for=\"embed-privacy-store-youtube-9f244fbe49ed6ad071085865395fbed5\" class=\"embed-privacy-label\" data-embed-provider=\"youtube\">\t\t\t\tInhalt von YouTube immer anzeigen\t\t\t<\/label>\t\t<\/p>\t\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t<div class=\"embed-privacy-footer\"><span class=\"embed-privacy-url\"><a href=\"https:\/\/youtu.be\/DjKfF1Wn9UE\">\u201eUnlocking Business Value Through Cyber and Information Security\u201c direkt \u00f6ffnen<\/a><\/span><\/div>\t\t\t<\/div>\t\t\t\t\t\t<div class=\"embed-privacy-content\">\t\t\t\t<script>var _oembed_9f244fbe49ed6ad071085865395fbed5 = '{\\\"embed\\\":\\\"&lt;iframe title=&quot;Unlocking Business Value Through Cyber and Information Security&quot; width=&quot;500&quot; height=&quot;281&quot; src=&quot;https:\\\\\/\\\\\/www.youtube-nocookie.com\\\\\/embed\\\\\/DjKfF1Wn9UE?feature=oembed&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;\\\\\/iframe&gt;\\\"}';<\/script>\t\t\t<\/div>\t\t<\/div>\t\t\n<\/div><\/figure>\n\n\n\n<p>Interview with Hannah Suarez from Superuser O\u00dc about how ISO 27001 : 2022 certification drives business value. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s dynamic environment, both individuals and organizations are embarking on innovative experiments with AI applications. However, amidst this exploration, concerns about security linger. In the first Brave Questions about AI &#038; Information and Cyber Security Round Table # 1, we delved into the burgeoning AI landscape, where one participant likened the journey to the unpredictable nature of the &#8222;Wild West.&#8220;<\/p>\n","protected":false},"author":1,"featured_media":1462,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19,59,57,63,62,56,55],"tags":[],"class_list":["post-1461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-strategy","category-cybersecurity","category-generative-ai","category-information-security","category-iso-27001","category-large-language-models","category-vendor-management","wpcat-19-id","wpcat-59-id","wpcat-57-id","wpcat-63-id","wpcat-62-id","wpcat-56-id","wpcat-55-id"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/posts\/1461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1461"}],"version-history":[{"count":3,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/posts\/1461\/revisions"}],"predecessor-version":[{"id":1471,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/posts\/1461\/revisions\/1471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=\/wp\/v2\/media\/1462"}],"wp:attachment":[{"href":"https:\/\/d3mlabs.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/d3mlabs.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}