InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Why AI Needs Its Own Risk Management Policies and Processes

Presented by

Charles Cresson Wood, Esq., JD, MBA, MSE, CISSP, CISM, CIPP/US, CISA, CGEIT and Alex Grohmann, CISSP, CISA, CISM, CIPT

About this talk

Existing risk management policies, and the related business processes, which may have been appropriate for the traditional information technology environment, will not be workable in the AI environment. In this presentation, we’ll discuss what’s markedly different between the traditional information technology risk management environment, and the new AI risk management environment. For example, there is a risk of model stealing with publicly facing AI systems, but no such risk is found in traditional publicly facing systems. Likewise, the result provided by a certain query submitted to a Generative Artificial Intelligence (GAI) system may not be the same from day to day, but no such phenomenon is present with traditional information systems. Similarly, the great power of AI systems can be used to overcome traditional privacy-protection mechanisms such as anonymization, and this has not been previously encountered with traditional information systems. Also covered in this presentation will be suggested managerial and technical responses to these differences, such as an AI Acceptable Use Policy and an AI Life Cycle Process. Some recent legal developments in the AI risk management area will also be briefly covered.
Information Systems Security Association

Information Systems Security Association

40730 subscribers391 talks
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Related topics