One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8456899
Date de publication 2024-02-29 11:00:00 (vue: 2024-02-29 11:08:54)
Titre Gouvernance de l'IA et préservation de la vie privée
AI governance and preserving privacy
Texte AT&T Cybersecurity featured a dynamic cyber mashup panel with Akamai, Palo Alto Networks, SentinelOne, and the Cloud Security Alliance. We discussed some provocative topics around Artificial Intelligence (AI) and Machine Learning (ML) including responsible AI and securing AI. There were some good examples of best practices shared in an emerging AI world like implementing Zero Trust architecture and anonymization of sensitive data. Many thanks to our panelists for sharing their insights. Before diving into the hot topics around AI governance and protecting our privacy, let’s define ML and GenAI to provide some background on what they are and what they can do along with some real-world use case examples for better context on the impact and implications AI will have on our future. GenAI and ML  Machine Learning (ML) is a subset of AI that relies on the development of algorithms to make decisions or predictions based on data without being explicitly programmed. It uses algorithms to automatically learn and improve from experience. GenAI is a subset of ML that focuses on creating new data samples that resemble real-world data. GenAI can produce new and original content through deep learning, a method in which data is processed like the human brain and is independent of direct human interaction. GenAI can produce new content based on text, images, 3D rendering, video, audio, music, and code and increasingly with multimodal capabilities can interpret different data prompts to generate different data types to describe an image, generate realistic images, create vibrant illustrations, predict contextually relevant content, answer questions in an informational way, and much more.    Real world uses cases include summarizing reports, creating music in a specific style, develop and improve code faster, generate marketing content in different languages, detect and prevent fraud, optimize patient interactions, detect defects and quality issues, and predict and respond to cyber-attacks with automation capabilities at machine speed. Responsible AI Given the power to do good with AI - how do we balance the risk and reward for the good of society? What is an organization’s ethos and philosophy around AI governance? What is the organization’s philosophy around the reliability, transparency, accountability, safety, security, privacy, and fairness with AI, and one that is human-centered? It\'s important to build each of these pillarsn into an organization\'s AI innovation and business decision-making. Balancing the risk and reward of innovating AI/ML into an organization\'s ecosystem without compromising social responsibility and damaging the company\'s brand and reputation is crucial. At the center of AI where personal data is the DNA of our identity in a hyperconnected digital world, privacy is a top priority. Privacy concerns with AI In Cisco’s 2023 consumer privacy survey, a study of over 2600 consumers in 12 countries globally, indicates consumer awareness of data privacy rights is continuing to grow with the younger generations (age groups under 45) exercising their Data Subject Access rights and switching providers over their privacy practices and policies.  Consumers support AI use but are also concerned. With those supporting AI for use: 48% believe AI can be useful in improving their lives  54% are willing to share anonymized personal data to improve AI products AI is an area that has some work to do to earn trust 60% of respondents believe the use of AI by organizations has already eroded trust in them 62% reported concerns about the business use of AI 72% of respondents indicated that having products and solutions aud
Envoyé Oui
Condensat “more “somewhat “very  54  there 2023 2600 ability about academia access account accountability accountable across activities address addresses adopt adoption advantages age agencies ai/ml akamai algorithms alliance allows along already also alto among announced that anonymization anonymize anonymized answer applications applications: appropriately architecture and are area around artificial assessment at&t attacks audio audited auditing automatically automation awareness away background balance balancing based because before beginning being believe benchmark benefits best better bias brain brand build building burgeoning business but can capabilities case cases categories center centered centric challenges characteristics close cloud code collaboration collaborative come comfortable” commerce common communities companies company competitive compliance compromising concerned concerned” concerns consequential considerations consortium consulting consumer consumer’s consumers content context contextually continue continuing controls conversations core could countries course create creating critical crucial cultivate cultural cyber cybercriminal cybersecurity damaging data datasets decades decision decisions deep defects define department deploy describe design designers detect detrimental develop developers development different digital direct discussed discussions diving dna durable dynamic each earn economic ecosystem educate effects efforts emerging enable enabled engineers enhanced ensure entered environmental equality along eroded establish ethics ethos european evaluating everlasting everyone evolution evolving examples exciting exercising existence experience experts explainable explicitly explore exposed factors fair fairness faster featured financial focuses following forefront four framework frameworks fraud from full functions future gen genai generate generations geopolitical get given global globally going gold good govern governance government government’s groups grow guardrails guide harmful has have having health help hoc hot how human humanity hyperconnected identity illustrations image images impact impacted imperative implemented implementing zero implications important improve improving in cisco’s include including increasingly independent indicated indicates individuals industry influence information informational innovating innovation innovators insights institute instrumental integrity intelligence interaction interactions interest interesting interests interpret interpretable issues its just landscape languages laws lead leaders leadership learn learning legal let’s lifecycle like lives llm local machine maintain maintaining make making manage managed management many map marketing mashup matters measure method mid misuse mitigating ml  model models monitor more most much multimodal music names national need needed networks new nist not numbers occurring one only operate optimize organization organization’s organizations original our cybersecurity outlines over own palo panel panelists parliament part partnerships patient performed perhaps personal philosophy pillarsn place play policies post potential power practices predict predictions present preserving prevent primary principles prioritization prioritizes priority privacy private process processed produce products professionals profound programmed promote prompts proper protecting protection protections provide provided providers provocative public quality questions real realistic realizing recently regular regulating regulation relevant reliability reliable relies religion/ethnicity remain remediation rendering reported reports reputation researchers resemble resilient respond respondents responsibility responsible reward rights risk risks risks:  govern rmf role safe safety said samples scientists secure securing security sensitive sentinelone services to share shared sharing should significant social society solutions som
Tags Studies Prediction Cloud Technical
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: