Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » How to manage the reception II: CISO Guide
Global Security

How to manage the reception II: CISO Guide

AdminBy AdminFebruary 12, 2025No Comments5 Mins Read
CISO Guide
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 12, 2025Hacker NewsAI safety / data protection

Guide ciso

Ciso relies themselves more involved in AI team, often leading interfunctional efforts and AI strategy. But not much resources that will guide them on how their role should look like and how they should bring to these meetings.

We have assembled the basis for security leaders to help push AI Committees and Committees further in accepting II – providing them with the necessary visibility and fences to succeed. Get acquainted with a clear basis.

If security groups want to play a key role in traveling on the II organization, they must take five steps clear to show the immediate value committees and AI leadership:

  • C . Create Inventory assets AI
  • L . Learn What do users do
  • Е . Amplify Your AI policy
  • A . Apply AI use cases
  • G . Reuse existing frames

If you are looking for a solution to help use Genai securely, check Harmonious security.

Okay, let’s break the clear base.

Create AI inventory

The main requirement for regulation and best practice-including the EU Law, ISO 42001 and Nist AI RMF-supporting AI assets.

Despite its importance, the organizations fight manual, unstable AI tool tracking methods.

Security teams can take six key approaches to improving AI asset visibility:

  1. Tracking based on purchases – Effective for monitoring new AI acquisitions, but does not reveal the functions of AI added to existing tools.
  2. Hand collection of magazines .
  3. Cloud safety and dlp – Such solutions as Casb and Netskope offer some visibility, but the implementation policy remains a problem.
  4. Identity and oaut – Review access logs from providers such as OKTA or Entra can help track the use of AI applications.
  5. Expanding existing stocks – AI risk -based tools provides a coordination with the management of the enterprise, but the adoption is fast moving.
  6. A specialized tool – Permanent monitoring tools reveal the use of II, including personal and free accounts, providing comprehensive supervision. Includes similar security.

Learn: Skip to Active ID Use II

Security teams should actively define AI applications that employees use instead of blocking them directly – users will find bypass ways otherwise.

By tracking why employees turn to AI tools, security leaders may recommend more secure, compatible alternatives that are in line with organizational policy. This understanding is invaluable in the AI ​​team discussions.

Secondly, if you know how employees use the AI, you can undergo better training. These training programs are becoming increasingly important against the background of the EU’s II Law, which obliges organizations to provide AI literacy programs:

“Providers and deployment of AI systems take measures to ensure the best level of literacy of their staff and other persons involved in the operation and use of AI systems …”

Apply AI Policy

Most organizations pursued AI policy, but compulsory implementation remains a problem. Many organizations choose to simply issue AI and hopes that employees are fulfilled by the leadership. While such an approach avoids friction, it provides little performance and visibility, leaving organizations that are exposed to potential safety and conservation risks.

Usually security groups take one of two approaches:

  1. A safe element of your browser management – Some organizations send AI traffic through a safe browser to control and management. This approach covers most AI generative traffic, but has deficiencies-it often limits the functionality of a copy, giving users to alternative devices or browsers to get around control.
  2. DLP or CASB solutions . These solutions can help track and adjust the use of AI tools, but traditional regex -based methods often create excessive noise. In addition, databases categorizing sites used for blocking are often outdated, leading to inconsistent execution.

Ensure the correct balance between control and convenience is key to successful AI policy.

And if you need help in building a Genai policy, read our free generator: Generator of the Genai Use Policy.

Apply AI use cases for security

Most of this discussion is about providing the AI, but we will not forget that the AI ​​team also wants to hear about steep, effective business use. What is the best way to show you what you care about traveling by II than actually realizing them yourself?

AI security cases are still in a position, but security teams are already seeing some benefits to detect and reaction, DLP security and email. Documenting them and attracting these cases at the AI ​​team meeting can be powerful – especially a reference to KPI for performance and improving efficiency.

Re -use the existing frame

Instead of rethinking management structures, security groups can integrate the II overseeing frames like Nist ai rmf and ISO 42001.

Practical example Nist CSF 2.0Which now includes a “management” feature that covers: AI Risk Management Strategies.

Take a leading role in management II for your company

Security teams have a unique opportunity to take a leading role in driving II, remembering Clear:

  • CReviewing AI inventory assets
  • LBy earning users’ behavior
  • ЕA policy that is engaged in learning
  • APLPLING AI Use cases for security
  • GEduc

Following these steps, Cisos can demonstrate the value of AI teams and play a crucial role in the AI ​​organization strategy.

To learn more about overcoming the Genai adoption barriers, check Harmonious security.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.