01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

usiness email communication, data sharing with third parties, or the utilization of established third-party<br />

code projects.<br />

Chief In<strong>for</strong>mation Security Officers (CISOs) should also consider running awareness campaigns to<br />

educate users about the inherent risks associated with this technology. Establishing a comprehensive<br />

rulebook that delineates who can utilize what and what should remain confidential will help.<br />

While international policymakers are actively <strong>for</strong>mulating strategies to foster a responsible AI ecosystem,<br />

organizations must align their ef<strong>for</strong>ts with government-endorsed approaches to fend off potential threats.<br />

It’s important to remember that GenAI risks extend beyond cybersecurity – they encompass privacy and<br />

data protection risks, regulatory compliance, legal exposure, and AI ethics. This means that CISOs must<br />

stay vigilant, not only regarding current risks but also those on the horizon.<br />

Redefining <strong>The</strong> Security Roadmap<br />

A big concern <strong>for</strong> enterprises is that employees dabble in GenAI away from the watchful eye of IT. In<br />

effect, it’s now a major vector of Shadow IT. Research found that 7 out of 10 folks who’ve jumped on the<br />

ChatGPT bandwagon aren’t telling their supervisors. While more than two-thirds of employees continue<br />

to engage in non-enterprise applications, CISOs need to question why such applications are gaining<br />

prominence and attain a clear picture of these users.<br />

Alarmingly, studies show that 4% of employees have placed sensitive corporate data into language<br />

models. <strong>Cyber</strong>security leaders can work on this by deploying protection tools to ensure safer transit of<br />

data, ensuring that sensitive in<strong>for</strong>mation remains shielded from unauthorized access or exposure.<br />

Finally, there are tools like unified endpoint management (UEM) that can restrict the transfer of sensitive<br />

data across unapproved devices or applications by defining accessibility. Admins can authorize device<br />

access to such applications based on the user’s role. Endpoint management solutions, when integrated<br />

with identity and access management (IAM), will flag admins if confidential data is shared. In the<br />

un<strong>for</strong>tunate event of a device with ChatGPT access being misplaced or stolen, UEM solutions can<br />

remotely erase data from the device, effectively shielding sensitive in<strong>for</strong>mation from falling into the wrong<br />

hands.<br />

GenAI is understandably gaining ground in the modern workplace. Corporations are taking these tools<br />

<strong>for</strong> a spin, developers are cozying up to them, and employees are experimenting with them. At the end<br />

of the day, CISOs must create a security-conscious environment without stifling the productivity of their<br />

work<strong>for</strong>ce. It’s there<strong>for</strong>e vital to find the perfect harmony between innovation and safety. End of article.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 79<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!