Rapid adoption of AI and lack of comprehensive risk management strategies can add significant risk to organisations, warns Professor Jason Lau, Board Director, ISACA. He suggests eight foundational protocols for creating an AI security programme. These include continual audits of AI-generated output, developing acceptable use policies, designating an AI Lead, performing a cost-benefit analysis, updating cybersecurity programs, implementing regular audits and traceability, creating AI ethics, and adapting society.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some