Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Partnering to Achieve Low-Risk AI
In this blog post, we will explore how security organizations can successfully partner with development organizations to capture the power of AI-based systems within an enterprise while mitigating the risks.
Let’s first level set on the fact that artificial intelligence (AI) and machine learning (ML) are powerful. We have seen the use of publicly available tools such as ChatGPT explode over the last few quarters. Why? Because they are useful! People are using such tools for anything from writing college essays, to writing code, to solving complex engineering problems. The increased use of AI engines put us on the precipice of incredible breakthroughs.
In recent weeks, a study by The Journal of the American Medical Association noted that nearly 80% of patients preferred medical advice given by an AI chatbot over the advice given by actual doctors. This is but one example where AI technology can vastly improve operational efficiencies and potentially patient outcomes.
Despite the benefits of AI/ML, we must also consider the risk involved. Let’s zero in on machine learning, which is the ingestion of data to train the tool. When the data is ingested, it is used to refine the tool and its operation. Some recent examples of exploitations of these risks include:
It’s important to understand that AI as it exists today leverages IO (input/output), which means that ultimately, what goes in may eventually come out. Let’s pause for a minute on the research being done by Tencent. If the onboard AI of a vehicle can be tricked into performing arbitrary actions through specially crafted inputs to its sensors, imagine the ramifications. Imagine a bad actor injecting malicious images into a freeway sign on a major U.S. interstate highway where there is a high prevalence of AI driven vehicles.
Because of these risks, OWASP (Open Web Application Security Project) has developed the Machine Learning Top 10 list. This list provides a current look at risks as they exist today. However, as this is the first release of the ML Top 10, it is expected that these will change and evolve over time.
So how do security and development teams – two teams who are often at odds – work together to achieve the promised benefit of AL/ML while minimizing the risks? Let’s break down some recommended strategies.
By considering the risks and taking a common sense, security-first approach, an organization can unleash the power of AI within their organization while minimizing the risks.
Interested in learning more about AI? Check out this blog post by Randy Lariar, "AI and the Art of Avoiding Cyberattacks."
Optiv Security: Secure greatness.®
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Let us know what you need, and we will have an Optiv professional contact you shortly.