Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AMD’s powerful AI chips can finally be unleashed on Windows PCs

    Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

    Microsoft’s AI helper, Copilot Vision, is now live

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025

      Trump tariffs reignite Europe’s push for cloud sovereignty

      April 17, 2025
    • Crypto

      XRP Price Slips as Bears Tighten Grip and Short Bets Surge

      June 12, 2025

      HTX Launches TRX Options, Empowering Users with Flexible and Diversified Trading Strategies

      June 12, 2025

      Ethereum Leverage At All-Time High as BlackRock Ramps Up Accumulation

      June 12, 2025

      HBAR Price Downtrend Set To Face Volatility Explosion; Recovery Likely

      June 12, 2025

      Aura (AURA) Token Skyrockets Over 3,500%, But Analysts Urge Caution Amid Rug Pull Fears

      June 11, 2025
    • Technology

      AMD’s powerful AI chips can finally be unleashed on Windows PCs

      June 13, 2025

      Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

      June 13, 2025

      Microsoft’s AI helper, Copilot Vision, is now live

      June 13, 2025

      Microsoft throws shade at macOS Tahoe’s familiar new vista

      June 13, 2025

      WTF is sell-side decisioning?

      June 12, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Fortifying the future: The pivotal role of CISOs in AI operations
    Technology

    Fortifying the future: The pivotal role of CISOs in AI operations

    TechAiVerseBy TechAiVerseJune 9, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Fortifying the future: The pivotal role of CISOs in AI operations
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Fortifying the future: The pivotal role of CISOs in AI operations

    The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions.

    By

    • Aditya K Sood, Aryaka

    Published: 04 Jun 2025

    The widespread adoption of artificial intelligence (AI) applications and services is driving a fundamental shift in how chief information security officers (CISOs) structure their cyber security policies and strategies.

    The unique characteristics of AI, its data-intensive nature, complex models, and potential for autonomous decision-making introduce new attack surfaces and risks that necessitate immediate and specific policy enhancements and strategic recalibrations.

    The primary goals are to prevent inadvertent data leakage by employees using AI and Generative AI (GenAI) tools and to ensure that decisions based on AI systems are not compromised by malicious actors, whether internal or external. Below is a strategic blueprint for CISOs to align cybersecurity with the secure deployment and use of GenAI systems.

    • Revamp acceptable use and data handling policies for AI: Existing acceptable use policies (AUPs) must be updated specifically to address the use of AI tools, explicitly prohibiting the input of sensitive, confidential, or proprietary company data into public or unapproved AI models. Sensitive data could include customer personal information, financial records or trade secrets. Policies should clearly define what constitutes ‘sensitive’ data in the context of AI. Data handling policies must also detail requirements for anonymisation, pseudonymisation, and tokenisation of data used for internal AI model training or fine-tuning.
    • Mitigate AI system compromise and tampering: CISOs must focus on AI system integrity and security. Deploy security practices into the entire AI development pipeline, from secure coding for AI models to rigorous testing for vulnerabilities like prompt injection, data poisoning and model inversion. Implement strong filters and validators for all data entering the AI system (prompts, retrieved data for RAG) to prevent adversarial attacks. Similarly, all AI-generated outputs must be sanitised and validated before being presented to users or used in downstream systems to avoid malicious injections. Wherever feasible, deploy AI systems with XAI capabilities, allowing for transparency into how decisions are made. For high-stakes decisions, mandate human oversight when handling sensitive data or performing irreversible operations to provide a final safeguard against compromised AI output. 
    • Building resilient and secure AI development pipelines: Securing AI development pipelines is paramount to ensuring the trustworthiness and resilience of AI applications integrated into critical network infrastructure, security products and collaborative solutions. It necessitates embedding security throughout the entire AI lifecycle. GenAI code, models and training datasets are part of the modern software supply chain. Secure AIOps pipelines with CI/CD best practices, code signing and model integrity checks. Scan training datasets and model artifacts for malicious code or trojaned weights. Vet third-party models and libraries for backdoors and licence compliance.
    • Implement a comprehensive AI governance framework: CISOs must champion the creation of an enterprise-wide AI governance framework that embeds security from the outset. AI risks should not be isolated but woven into enterprise-wide risk management and compliance practices. This framework should define explicit roles and responsibilities for AI development, deployment and oversight to establish an AI-centric risk management process. A centralised inventory of approved AI tools should be maintained, along with their risk classifications.  The governance framework helps substantially in managing the risk associated with “shadow AI”, the use of unsanctioned AI tools or services. Mandate only approved AI tools and block all other AI tools and services.
    • Strengthen data loss prevention tools (DLPs) for AI workflows: DLP strategies must evolve to detect and prevent sensitive data from entering unauthorised AI environments or being exfiltrated via AI outputs. This involves configuring DLP tools to specifically monitor AI interaction channels (eg chat interfaces and API calls to LLMs), identifying patterns indicative of sensitive data being input. AI-specific DLP rules must be developed to block or flag attempts to paste PII, intellectual property or confidential code into public AI prompts.
    • Enhance employee and leadership AI awareness training: Employees are often the weakest link in the organisation. CISOs must implement targeted, continuous training programmes on the acceptable use of AI, identify AI-centric threats, promote engineering best practices, and provide education on reporting security incidents related to the misuse of AI tools and potential compromise.
    • Institute vendor risk management for AI services: As companies increasingly rely on third-party AI services, CISOs must enhance their third-party risk management (TPRM) programmes to address these risks. They should define standards for assessing the security posture of the AI vendor’s supply chain, adhering to robust contractual clauses that mandate security standards, data privacy, liability for breaches, and audit rights for AI service providers. There should be in-depth security assessments of AI vendors, scrutinising their data handling practices, model security, API security, and AI-specific incident response capabilities. 
    • Integrate continual monitoring and adversarial testing: In the ever-evolving landscape of AI threats and risks, static security measures are insufficient. CISOs should stress the importance of continual monitoring of AI systems to detect potential compromises, data leaks or adversarial attacks – signalled by unusual prompt patterns, unexpected outputs or sudden changes in model behaviour. Regular red teaming and adversarial testing exercises, specifically designed to exploit AI vulnerabilities should help organisations to spot weaknesses before malicious actors.

        CISOs who make these changes will be better able to manage the risks associated with AI, enabling security practices to keep pace with or get ahead of AI deployment. This requires a shift from reactive defence to a proactive, adaptive security posture woven into the fabric of AI initiatives.

        Aditya K Sood is vice president of security engineering and AI strategy at Aryaka.

        Read more on Business continuity planning


        • Preparing for AI: The CISO’s role in security, ethics and compliance


        • Podcast: RSA 2025 – AI’s risk surface and the role of the CISO

          By: Antony Adshead


        • Signalgate: Learnings for CISOs securing enterprise data

          By: Todd Thiemann


        • DeepSeek will help evolve the conversation around privacy

        Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
        Previous ArticleDutch university’s rapid response saved it from ransomware devastation
        Next Article European Commission should rescind UK data adequacy
        TechAiVerse
        • Website

        Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

        Related Posts

        AMD’s powerful AI chips can finally be unleashed on Windows PCs

        June 13, 2025

        Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

        June 13, 2025

        Microsoft’s AI helper, Copilot Vision, is now live

        June 13, 2025
        Leave A Reply Cancel Reply

        Top Posts

        New Akira ransomware decryptor cracks encryptions keys using GPUs

        March 16, 202523 Views

        OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

        April 19, 202518 Views

        Rsync replaced with openrsync on macOS Sequoia

        April 7, 202514 Views

        Arizona moves to ban AI use in reviewing medical claims

        March 12, 202511 Views
        Don't Miss
        Technology June 13, 2025

        AMD’s powerful AI chips can finally be unleashed on Windows PCs

        AMD’s powerful AI chips can finally be unleashed on Windows PCs Skip to content Image:…

        Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

        Microsoft’s AI helper, Copilot Vision, is now live

        Microsoft throws shade at macOS Tahoe’s familiar new vista

        Stay In Touch
        • Facebook
        • Twitter
        • Pinterest
        • Instagram
        • YouTube
        • Vimeo

        Subscribe to Updates

        Get the latest creative news from SmartMag about art & design.

        About Us
        About Us

        Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

        Facebook X (Twitter) Pinterest YouTube WhatsApp
        Our Picks

        AMD’s powerful AI chips can finally be unleashed on Windows PCs

        June 13, 20250 Views

        Imilab C30 Dual review: 2 lenses, 1 smart monitoring solution

        June 13, 20250 Views

        Microsoft’s AI helper, Copilot Vision, is now live

        June 13, 20250 Views
        Most Popular

        Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

        March 12, 20250 Views

        Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

        March 12, 20250 Views

        Apple thinks people won’t use MagSafe on iPhone 16e

        March 12, 20250 Views
        © 2025 TechAiVerse. Designed by Divya Tech.
        • Home
        • About Us
        • Contact Us
        • Privacy Policy
        • Terms & Conditions

        Type above and press Enter to search. Press Esc to cancel.