Page 260 - Cyber Defense eMagazine August 2024
P. 260

(Algorithmic  Accountability  Act),  H.R. 3220  Deep  Fakes  Accountability  Act),  European  Union's
                   Artificial Intelligence Act are few of the recent regulations.
               5.  Continuous  Improvement  and Enablement  - With the continuous  evolution of AI processes  and
                   models,  the  security  of the  AI  ecosystem  is  a journey.  A significant  attempt  must  be made  to
                   frequently  provide  cybersecurity  training  to  not  only  the  data  scientist  and  engineers  but  also
                   developers and operations team building and supporting AI applications.
               6.  Balanced  Scorecard  based  approach  for  CISOs  -  CISOs  are  now  being  invited  to  boardroom
                   discussions to share their cybersecurity vision and align it with business priorities. A metrics driven
                   based balanced scorecard solution (How CISOs Can Take Advantage of the Balanced Scorecard
                   Method),  provides  a  holistic  approach  to  protect  enterprise  assets  from  malicious  threats.  A
                   balanced  scorecard-based  cybersecurity  strategy  map  can  reduce  business  risks,  increase
                   productivity, enhance customer trust, and help enterprises grow without the fear of a data breach.



            To  summarize,  it's  critical  to  safeguard  data  and  assets  by  compartmentalizing  AI  operations  and
            adopting a metrics driven approach. A balance between harnessing AI’s power and addressing its data
            security and ethical implications is crucial for a sustainable business solution.


            References-

            [1] https://blogs.nvidia.com/blog/ai-security-steps/

            [2] https://www.leewayhertz.com/ai-model-security/

            [3] https://www.hpe.com/in/en/what-is/ai-security.html

            [4]https://www.securityweek.com/major-organizations-using-hugging-face-ai-tools-put-at-risk-by-leaked-
            api-tokens/

            [5] https://www.wired.com/story/chatgpt-prompt-injection-attack-security/

            [6] https://www.computer.org/csdl/magazine/co/2022/02/09714079/1AZLiSNNvIk

            [7] https://snyk.io/series/ai-security/ai-bill-of-materials-aibom/

            [8] https://github.com/jasebell/ai-bill-of-materials

            [9]https://www.techtarget.com/searchenterpriseai/feature/AI-regulation-What-businesses-need-to-know

















            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          260
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   255   256   257   258   259   260   261   262   263   264   265