Page 145 - Cyber Defense eMagazine July 2024
P. 145

Identifying Emerging Cyber Risks

            In the fast-paced cybersecurity landscape, organizations must also be well-educated on emerging cyber
            trends and associated risks their organizations may be susceptible to. The development of generative AI
            technology  presents new risks and data privacy concerns that companies of all sizes and all industries
            must proactively  address. For example,  cybercriminals  are increasingly  using phishing campaigns  and
            deepfakes  to target vulnerable  employees  and gain access to a company’s  system and steal sensitive
            data.

            Organizations  must  quickly  harness  generative  AI  before  threat  actors  can  use  it to  their  advantage.
            Navigating  these  developments  necessitates  the  formulation  of  comprehensive  policies  and  diligent
            education initiatives to ensure safe and responsible utilization of AI tools.

            Security leaders should create an acceptable use policy for AI within the organization and communicate
            to all levels of the organization.  If employees  are not properly guided on how to use AI tools, there is a
            risk of losing control over the organization’s data and creating an insider threat or a vulnerability for bad
            actors  to  exploit.  Establishing  clear  guidelines  and  guardrails  ensures  that  employees  can  use  AI
            productively while maintaining data security.

            Organizations must embrace a proactive security approach that includes risk and threat management in
            order to transcend reactive tactics. The ability to adjust and take preventative  action will be essential to
            resilience in the face of a future potential cyber-attack.  Those that fail to prioritize both risk assessment
            and threat mitigation will fall behind in the rapidly evolving digital world.



            About the Author

            George  Jones,  Chief  Information  Officer,  Critical  Start:  In  his  role  as  the  CISO,
            George defines and drives the strategic direction of corporate IT, information security
            and compliance initiatives for the Critical Start, while ensuring adherence and delivery
            to the firm’s massive growth plans. George was most recently the Head of Information
            Security  and Infrastructure  at Catalyst  Health  Group, responsible  for all compliance
            efforts  (NIST,  PCI,  HITRUST,  SOC2)  as  well  as  vendor  management  for  security-
            based programs.  George  brings more  than 20 years of experience  with technology,
            infrastructure, compliance, and assessment in multiple roles across different business
            verticals. Recently as Chief Information Officer and Founder of J-II Consulting Group,
            a  security  &  compliance  consultancy,  George  was  responsible  for  the  design  and  implementation  of
            security and compliance  programs for various  organizations.  He also delivered programs  to implement
            Agile  methodologies,  DevSecOps  programs,  and  Information  Security  Policy  and  Procedure
            Plans.  During his time at Atlas Technical  Consultants,  George  drove multiple  M&A due diligence  and
            integration efforts, consolidating nine acquired business units into a single operating entity, enabling the
            organization to leverage greater economies of scale and more efficient operations.

            George grew up in Austin and is a recent transplant to the Plano area. He attended Texas A&M University
            and graduated Magna Cum Laude from St. Edward’s University.






            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          145
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   140   141   142   143   144   145   146   147   148   149   150