Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How to Back Up Your Android Phone (2025)

    Your Body Ages Faster Because of Extreme Heat

    Ride1Up TrailRush Electric Mountain Bike Review: Quality Components, Bargain Price

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Former Indian Politician Convicted in Bitcoin Extortion Case

      August 30, 2025

      Top 3 Real World Asset (RWA) Altcoins to Watch in September

      August 30, 2025

      Ethereum Dip May Be Temporary with $1 Billion Whale Buys and Slower Profit Taking

      August 30, 2025

      Everything We Know So Far About the Bitcoin Thriller “Killing Satoshi”

      August 30, 2025

      Why HBAR’s Bearish Sentiment Might Be Its Trigger for a Price Rebound

      August 30, 2025
    • Technology

      How to Back Up Your Android Phone (2025)

      August 30, 2025

      Your Body Ages Faster Because of Extreme Heat

      August 30, 2025

      Nothing Phone (3) smartphone review: Top-class hardware combined with unrivaled design and secondary display

      August 30, 2025

      Gigabyte Gaming A16 GA63H

      August 30, 2025

      Metroid Prime 4: Beyond release date leaked and it’s sooner than expected

      August 30, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Fortifying the future: The pivotal role of CISOs in AI operations
    Technology

    Fortifying the future: The pivotal role of CISOs in AI operations

    TechAiVerseBy TechAiVerseJune 9, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Fortifying the future: The pivotal role of CISOs in AI operations
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Fortifying the future: The pivotal role of CISOs in AI operations

    The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions.

    By

    • Aditya K Sood, Aryaka

    Published: 04 Jun 2025

    The widespread adoption of artificial intelligence (AI) applications and services is driving a fundamental shift in how chief information security officers (CISOs) structure their cyber security policies and strategies.

    The unique characteristics of AI, its data-intensive nature, complex models, and potential for autonomous decision-making introduce new attack surfaces and risks that necessitate immediate and specific policy enhancements and strategic recalibrations.

    The primary goals are to prevent inadvertent data leakage by employees using AI and Generative AI (GenAI) tools and to ensure that decisions based on AI systems are not compromised by malicious actors, whether internal or external. Below is a strategic blueprint for CISOs to align cybersecurity with the secure deployment and use of GenAI systems.

    • Revamp acceptable use and data handling policies for AI: Existing acceptable use policies (AUPs) must be updated specifically to address the use of AI tools, explicitly prohibiting the input of sensitive, confidential, or proprietary company data into public or unapproved AI models. Sensitive data could include customer personal information, financial records or trade secrets. Policies should clearly define what constitutes ‘sensitive’ data in the context of AI. Data handling policies must also detail requirements for anonymisation, pseudonymisation, and tokenisation of data used for internal AI model training or fine-tuning.
    • Mitigate AI system compromise and tampering: CISOs must focus on AI system integrity and security. Deploy security practices into the entire AI development pipeline, from secure coding for AI models to rigorous testing for vulnerabilities like prompt injection, data poisoning and model inversion. Implement strong filters and validators for all data entering the AI system (prompts, retrieved data for RAG) to prevent adversarial attacks. Similarly, all AI-generated outputs must be sanitised and validated before being presented to users or used in downstream systems to avoid malicious injections. Wherever feasible, deploy AI systems with XAI capabilities, allowing for transparency into how decisions are made. For high-stakes decisions, mandate human oversight when handling sensitive data or performing irreversible operations to provide a final safeguard against compromised AI output. 
    • Building resilient and secure AI development pipelines: Securing AI development pipelines is paramount to ensuring the trustworthiness and resilience of AI applications integrated into critical network infrastructure, security products and collaborative solutions. It necessitates embedding security throughout the entire AI lifecycle. GenAI code, models and training datasets are part of the modern software supply chain. Secure AIOps pipelines with CI/CD best practices, code signing and model integrity checks. Scan training datasets and model artifacts for malicious code or trojaned weights. Vet third-party models and libraries for backdoors and licence compliance.
    • Implement a comprehensive AI governance framework: CISOs must champion the creation of an enterprise-wide AI governance framework that embeds security from the outset. AI risks should not be isolated but woven into enterprise-wide risk management and compliance practices. This framework should define explicit roles and responsibilities for AI development, deployment and oversight to establish an AI-centric risk management process. A centralised inventory of approved AI tools should be maintained, along with their risk classifications.  The governance framework helps substantially in managing the risk associated with “shadow AI”, the use of unsanctioned AI tools or services. Mandate only approved AI tools and block all other AI tools and services.
    • Strengthen data loss prevention tools (DLPs) for AI workflows: DLP strategies must evolve to detect and prevent sensitive data from entering unauthorised AI environments or being exfiltrated via AI outputs. This involves configuring DLP tools to specifically monitor AI interaction channels (eg chat interfaces and API calls to LLMs), identifying patterns indicative of sensitive data being input. AI-specific DLP rules must be developed to block or flag attempts to paste PII, intellectual property or confidential code into public AI prompts.
    • Enhance employee and leadership AI awareness training: Employees are often the weakest link in the organisation. CISOs must implement targeted, continuous training programmes on the acceptable use of AI, identify AI-centric threats, promote engineering best practices, and provide education on reporting security incidents related to the misuse of AI tools and potential compromise.
    • Institute vendor risk management for AI services: As companies increasingly rely on third-party AI services, CISOs must enhance their third-party risk management (TPRM) programmes to address these risks. They should define standards for assessing the security posture of the AI vendor’s supply chain, adhering to robust contractual clauses that mandate security standards, data privacy, liability for breaches, and audit rights for AI service providers. There should be in-depth security assessments of AI vendors, scrutinising their data handling practices, model security, API security, and AI-specific incident response capabilities. 
    • Integrate continual monitoring and adversarial testing: In the ever-evolving landscape of AI threats and risks, static security measures are insufficient. CISOs should stress the importance of continual monitoring of AI systems to detect potential compromises, data leaks or adversarial attacks – signalled by unusual prompt patterns, unexpected outputs or sudden changes in model behaviour. Regular red teaming and adversarial testing exercises, specifically designed to exploit AI vulnerabilities should help organisations to spot weaknesses before malicious actors.

        CISOs who make these changes will be better able to manage the risks associated with AI, enabling security practices to keep pace with or get ahead of AI deployment. This requires a shift from reactive defence to a proactive, adaptive security posture woven into the fabric of AI initiatives.

        Aditya K Sood is vice president of security engineering and AI strategy at Aryaka.

        Read more on Business continuity planning


        • Preparing for AI: The CISO’s role in security, ethics and compliance


        • Podcast: RSA 2025 – AI’s risk surface and the role of the CISO

          By: Antony Adshead


        • Signalgate: Learnings for CISOs securing enterprise data

          By: Todd Thiemann


        • DeepSeek will help evolve the conversation around privacy

        BMI Calculator – Check your Body Mass Index for free!

        Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
        Previous ArticleDutch university’s rapid response saved it from ransomware devastation
        Next Article European Commission should rescind UK data adequacy
        TechAiVerse
        • Website

        Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

        Related Posts

        How to Back Up Your Android Phone (2025)

        August 30, 2025

        Your Body Ages Faster Because of Extreme Heat

        August 30, 2025

        Nothing Phone (3) smartphone review: Top-class hardware combined with unrivaled design and secondary display

        August 30, 2025
        Leave A Reply Cancel Reply

        Top Posts

        Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

        April 22, 2025168 Views

        6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

        April 14, 202548 Views

        New Akira ransomware decryptor cracks encryptions keys using GPUs

        March 16, 202530 Views

        Is Libby Compatible With Kobo E-Readers?

        March 31, 202528 Views
        Don't Miss
        Technology August 30, 2025

        How to Back Up Your Android Phone (2025)

        How to Back Up Your Android Phone (2025)All products featured on WIRED are independently selected…

        Your Body Ages Faster Because of Extreme Heat

        Ride1Up TrailRush Electric Mountain Bike Review: Quality Components, Bargain Price

        Nothing Phone (3) smartphone review: Top-class hardware combined with unrivaled design and secondary display

        Stay In Touch
        • Facebook
        • Twitter
        • Pinterest
        • Instagram
        • YouTube
        • Vimeo

        Subscribe to Updates

        Get the latest creative news from SmartMag about art & design.

        About Us
        About Us

        Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

        Facebook X (Twitter) Pinterest YouTube WhatsApp
        Our Picks

        How to Back Up Your Android Phone (2025)

        August 30, 20250 Views

        Your Body Ages Faster Because of Extreme Heat

        August 30, 20250 Views

        Ride1Up TrailRush Electric Mountain Bike Review: Quality Components, Bargain Price

        August 30, 20250 Views
        Most Popular

        Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

        March 12, 20250 Views

        Apple thinks people won’t use MagSafe on iPhone 16e

        March 12, 20250 Views

        French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

        March 12, 20250 Views
        © 2025 TechAiVerse. Designed by Divya Tech.
        • Home
        • About Us
        • Contact Us
        • Privacy Policy
        • Terms & Conditions

        Type above and press Enter to search. Press Esc to cancel.