
- This event has passed so registration is closed.
Overview
Existing risk management policies, and the related business processes, which may have been appropriate for the traditional information technology environment, will not be workable in the AI environment. In this presentation, we’ll discuss what’s markedly different between the traditional information technology risk management environment, and the new AI risk management environment. For example, there is a risk of model stealing with publicly facing AI systems, but no such risk is found in traditional publicly facing systems. Likewise, the result provided by a certain query submitted to a Generative Artificial Intelligence (GAI) system may not be the same from day to day, but no such phenomenon is present with traditional information systems. Similarly, the great power of AI systems can be used to overcome traditional privacy-protection mechanisms such as anonymization, and this has not been previously encountered with traditional information systems. Also covered in this presentation will be suggested managerial and technical responses to these differences, such as an AI Acceptable Use Policy and an AI Life Cycle Process. Some recent legal developments in the AI risk management area will also be briefly covered.
Moderator
Alex Grohmann – Founder, Sicher Consulting
Mr. Grohmann (CISSP, CISA, CISM and CIPT) is founder of Sicher Consulting and a member of the ISSA international board of directors. He is a long time member of ISSA including being president of the Northern Virginia chapter for three years. He is also a member of the ISSA Honor Roll.
Speaker/s
Charles Cresson Wood, Esq.
Charles Cresson Wood, Esq., JD, MBA, MSE, CISM, CISSP, CGEIT, CIPP/US, CISA, is a risk management attorney and management consultant. His most recent book is entitled “Internal Policies for Artificial Intelligence Risk Management.” That book provides a compendium of already-written policies which can be adapted to any user organization’s environment, approved, and internally published at licensee organizations. Charles is best known for his book entitled “Information Security Policies Made Easy,” which has been purchased by 70%+ of the Fortune 500 companies. Charles is also the author of the recent book entitled “Corporate Directors’ & Officers’ Legal Duties for Information Security & Privacy.” He has over 40 years in the information systems risk management field, and can be reached through his web site www.internalpolicies.com.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.