Q.1) How AI mitigate security risks?
Artificial intelligence can help augment organizations existing capabilities when it comes to mitigating security risk. So it doesn’t work on its own. It works in Congress with the teams that are working to protect the information to augment their capabilities, provide them with better targets for information and provide them with better capabilities so, they can choose which areas to focus on.
Iit augments the team’s capabilities rather than replaces them and allows them to focus on what’s important versus waste their time on just looking at a lot of noise.
Q.2) How safegaurding personal data and handling the risk of mining large data sets of personal information for the purpose of analytics, fraud prevention or undirected discovery?
The use of data in terms of analytics obviously has a lot of impact on how personal information is managed and the impact on individuals. Most organizations before they use data for heavy analytics will anonymous ize it in a way so as to limit or remove the risk to individual privacy.
Q.3 ) Personal data predication in the era of privacy regulation.
Over the course of the last year and a half privacy regulation has advanced far more than it has for the century preceding that. We’ve seen laws introduced in Europe, Brazil, Egypt, Bahrain and multiple other laws coming in India and across the globe to introduce stronger controls when it comes to handling personal information.
This is now the new normal. Personal information is the new oil for many organizations to generate revenue and to increase their market capitalization. So, the handling of person information needs to be regulated so as not to infringe on individual privacy.
Q.4) How IoT, AI & Blockchain technologies compliment each other?
IoT, AI and block chain are all disruptive technologies. They have evolved substantially over the past five years into the operational space. So, they’re moving from just being buzz words that are being thrown around by vendors to actual functional capabilities.
Block chain is used heavily to store log information and to guarantee that it’s not being modified , artificial intelligence is used to great success in the medical field to identify as yet unknown markers for cancer and IOT is increasing everything we know about the environment around us by injecting these sensors into everything that we interact with.
Q.5) What are the best practices CISOs adopt to balance business growth & security threats arising from new technology models?
The best thing CISOs can do is introduce a risk assessment when it comes to introduction of new technologies. They shouldn’t just adopt new technologies because of the hype or because it’s the new shiny object that’s on the market. They should look at the cost benefit analysis. What is the benefit? The true benefit this technology brings to my enterprise? Does it address a challenge we currently face or are we just adopting it because that’s what other organizations are doing. So, CISOs when they’re adopting new technologies, they need to look at the benefits of those new technologies and balance that against the risk these new technologies bring into the equation and that’s always going to happen.