AI in check

August 2024 AI & Data Analytics, IoT & Automation


Ryan Boyes.

Artificial Intelligence (AI) is rapidly becoming embedded in our everyday lives, from the apps we use, to search engines, facial recognition, smart devices in our homes, and more. However, while AI has many applications and benefits, and businesses are exploring its use in various ways, there is also a level of risk involved, particularly when it comes to the data that AI uses. Risk management around AI is critical for any business, whether you have an AI strategy or not, because AI, simply put, is everywhere.

Global standardisation

Having an international standard in place to manage the long-term risk of AI is critical, especially because of companies like OpenAI recently disbanding their long-term risk team. The need for this is highlighted by the introduction of the International Standards Organisation (ISO) 42001 standard in December 2023. ISO 42001 provides organisations with best practices for governing AI effectively, with formalised standards around AI management systems and a focus on understanding the risk of AI. It offers a comprehensive approach to managing AI systems throughout their lifecycle.

While ISO 42001 is a separate standard and certification, it is also intrinsically linked to ISO 27001, the standard for information security, because AI relies on data to perform its functions. It is, therefore, impossible to effectively manage AI without also addressing information management systems. Every time anyone makes use of any AI system, whether this is part of corporate strategy or not, information is used and processed. It has become imperative that this is better understood and better managed; otherwise, organisations run the risk of information leaks, compliance breaches, and other issues around data security.

Intelligence requires information

The reality is that AI and automation are frequently applied to information in today’s world, often without our noticing or being fully aware. For example, if you use an AI platform like ChatGPT to build a document or help construct an email, which is something many people do without thinking, what information are you inputting to do this? If there is sensitive data like client names or company intellectual property, there is a risk of compliance breaches, as this information is now no longer under your control and could be stored, processed, and used in a way that goes against local legislation.

Even storing information in SharePoint, and then using Microsoft Copilot, could potentially be problematic, as the AI servers may be located outside of your jurisdiction, and this may breach laws that your company is required to adhere to. If there is an information breach, the potential implications could be dire. Organisations today need to be aware of how to manage the risks around AI when it comes to their information, and this needs to form an intrinsic part of both compliance and cybersecurity strategy.

Not just an IT problem

Information and information security are no longer just an IT problem; everyone uses information, and it must be managed and protected effectively. From an organisational perspective, this means businesses need to be aware of what AI tools are out there and freely available, what is being used in the company, how to manage potential risk, and, importantly, where it fits in with their overall security strategy. The borders between roles and responsibilities are blurring, and both information and compliance officers need to understand how AI is being used and ensure appropriate security controls are in place.

While becoming certified on ISO standards is not a legal requirement, they provide excellent frameworks to guide the risk mitigation process and ensure that effective, holistic information and cybersecurity strategies are in place. An experienced third-party security and risk provider can be an invaluable partner on this journey, helping businesses to understand risks and their impact, how to manage, mitigate, or accept risk, and implement the systems and controls to manage information security effectively as part of a holistic, overarching cybersecurity and cyber resilience strategy.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
The AI goldrush has a credibility problem
Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Understanding the promise and perils of AI
AI & Data Analytics
Samuel Turcotte believes AI may kill us all. In this article, a condensed version of a white paper, he discusses AI's development and associated risks, all the while still hoping for a bright future.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.