article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

Now, generative AI use has infiltrated the enterprise with tools and platforms like OpenAI’s ChatGPT / DALL-E, Anthropic’s Claude.ai, Stable Diffusion, and others in ways both expected and unexpected. Not all companies have security systems that can detect, block, or remediate this type of behavior. Stay tuned!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Success With Zero Trust Lives And Dies By Executive Support

Forrester IT

Forrester originated the Zero Trust Model over a decade ago and defines Zero Trust as: An information security model that denies access to applications and data by default.

article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

The CCSO oversees and coordinates all security efforts across the Internet2 infrastructure and is accountable and responsible for setting organizational policies and approaches while engaging with the Internet2 member community. Practical experience designing and implementing enterprise information technology security solutions.

Security 293
article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

Leon Panetta, Secretary of Defense (2011-2013), Director, CIA (2009-2011) & Co-founder, Panetta Institute for Public Policy. Track C: Creating an Agile Enterprise. Track D: Securing Your Infrastructure. Track E: Understanding Cyber Policy. Daniel Lohrmann , Chief Security Officer, State of Michigan.

Symantec 261
article thumbnail

What is GRC? The rising importance of governance, risk, and compliance

CIO Business Intelligence

Governance, risk, and compliance (GRC) is an operational strategy for managing an organization’s overall governance, enterprise risk management , and regulation compliance efforts. In the IT context, this means having a comprehensive IT risk management process that rolls into an organization’s enterprise risk management function.

article thumbnail

How digital workspaces can secure hybrid work

CIO Business Intelligence

The enterprise workplace has changed significantly over the past few years with the rapid adoption of hybrid work. The way forward is implementing a digital workspace solution that can deliver a high-quality user experience for a wide variety of employee needs and keep business information secure.