Tackle 3 Common AI Challenges to Build Effective Security Programs

Logo
Presented by

Mayra Paredes, Enterprise Information SecOps Manager | Manufacturing & Critical Infrastructure

About this talk

Artificial intelligence continues to reach new heights. But this technology can and frequently is misused for fraudulent activities. New attacks and modifications occur daily. For some, AI is a perceived boon. Others strongly argue that AI is a menace. Either way, AI is here to stay. By embracing this technology responsibly, we can effect a constructive change and enhance more efficient outcomes. Powerful AI can analyze, detect, and react against fraudulent activities. A holistic cybersecurity approach to build ethical AI can help mitigate various risks via a high quality, well-trained multimodal AI model, that includes threat detection and user and entity behaviors analytics that can respond efficiently, effectively and ethically against bad actors. In this talk, industry thought leader Mayra Paredes will describe three of the most repetitive challenges presented by AI and how the cybersecurity industry can embrace them to build a proactive response against the threat landscape. - AI Ethics: Morality Bias, weaponization, liability stereotypes. Integrate diverse contributors to build this technology. - AAA Systems: Authentication, Authorization and Accounting. Build an Ethical core system. - Lack of expertise in the workforce: Embrace AI to foster diverse talent. Readers will come away from this talk with the different nuances surrounding AI and its potential application in cybersecurity. They will also be able to create clear management policies to restore trust in digital environment by building ethical AI.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (617)
Subscribers (204655)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.