InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Considerations: Securing the Cloud And In Specific AI

Presented by

Kathleen Mullin, vCISO and Consultant

About this talk

Organizations are rapidly adopting AI technologies without fully understanding the security implications. This is creating unprecedented vulnerabilities in cloud environments. In turn, with AI accessible to all stakeholders, the human factor has become the weakest link in cybersecurity defense strategies. This session addresses critical considerations for IT and cybersecurity leaders to balance business innovation with risk management. Learn how to establish ethical AI frameworks, implement proper access controls, and build awareness programs that protect your organization while enabling AI adoption. Join Kathleen Mullin, vCISO and Consultant, to explore practical strategies for securing AI in cloud environments while maintaining business agility. Key takeaways: • Define clear RACI matrices for AI business risk ownership and accountability • Assess whether AI solutions truly meet business requirements vs. alternative approaches • Establish data governance and access controls specifically for cloud-based AI systems • Develop comprehensive AI awareness programs for organizational stakeholders • Evaluate current and future cloud AI risks within your security framework
Information Security

Information Security

259132 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics