What Cybersecurity Guardrails Do CIOs and CISOs Want for AI? – InformationWeek
TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.
With more AI models emerging, how do CIOs and CISOs at enterprises go about establishing security guardrails to reduce risks as the technology gets deployed?
March 31, 2025
In the early months of the AI craze, the business world saw incidents where proprietary code got into the wild after being fed to AI. There have also been concerns about AI being tapped to launch cyberattacks, as well as AI used within organizations creating unintended access opportunities bad actors might leverage.
What top risks, internal and external, are CIOs and CISOs worried about when it comes to AI? What concerns do CIOs have about bringing a new, third-party AI model inhouse, especially as more models emerge?
Carl Froggett, CIO for Deep Instinct; Rob Lee, chief of research and head of faculty at SANS Institute; and Mike Levin, CISO and general counsel with Solera Health, tackled these and other questions in this episode of the DOS Won’t Hunt podcast.
What kind of vetting do CIOs put AI through before they feel relatively secure in deploying it? Are organizations juggling multiple AI models? Are they using different models for separate functions and needs within the organization? How can CIOs keep track of AI that is already at work across the organization? Is unauthorized AI more of an issue than shadow tech — unauthorized apps and devices — in the system?
Listen to the full episode here.
Editor’s Note: Due to a technical issue, there are several brief audio distortions in this episode that could not be readily resolved.
What You Should Know About Agentic AI
Joao-Pierre S. Ruth
Senior Editor
Joao-Pierre S. Ruth covers tech policy, including ethics, privacy, legislation, and risk; fintech; code strategy; and cloud & edge computing for InformationWeek. He has been a journalist for more than 25 years, reporting on business and technology first in New Jersey, then covering the New York tech startup community, and later as a freelancer for such outlets as TheStreet, Investopedia, and Street Fight.
Fortifying Your Unstructured Data: Cyber Resilience Across On-Prem and Cloud
Perfecting IT Automation in 2025: A Roadmap for CIOs
2022 State of ITOps and SecOps
You May Also Like
Jan 17, 2025
Jan 16, 2025
Jan 7, 2025
Nov 20, 2024
Jan 21, 2025
Fortifying Your Unstructured Data: Cyber Resilience Across On-Prem and Cloud
Perfecting IT Automation in 2025: A Roadmap for CIOs
Palo Alto Networks ranks #1 in Advanced Cloud Firewalls Tests
Enterprise WAN Simplicity, Performance and Security
A Growing Business: Nature Fresh Farms and VeloCloud
State of ITSM in Financial Services: Key Insights & Trends
Future-Proofing Public Sector IT with Automation and AI
Copyright © 2025. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.
source
This article was autogenerated from a news feed from CDO TIMES selected high quality news and research sources. There was no editorial review conducted beyond that by CDO TIMES staff. Need help with any of the topics in our articles? Schedule your free CDO TIMES Tech Navigator call today to stay ahead of the curve and gain insider advantages to propel your business!
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.
With more AI models emerging, how do CIOs and CISOs at enterprises go about establishing security guardrails to reduce risks as the technology gets deployed?
March 31, 2025
In the early months of the AI craze, the business world saw incidents where proprietary code got into the wild after being fed to AI. There have also been concerns about AI being tapped to launch cyberattacks, as well as AI used within organizations creating unintended access opportunities bad actors might leverage.
What top risks, internal and external, are CIOs and CISOs worried about when it comes to AI? What concerns do CIOs have about bringing a new, third-party AI model inhouse, especially as more models emerge?
Carl Froggett, CIO for Deep Instinct; Rob Lee, chief of research and head of faculty at SANS Institute; and Mike Levin, CISO and general counsel with Solera Health, tackled these and other questions in this episode of the DOS Won’t Hunt podcast.
What kind of vetting do CIOs put AI through before they feel relatively secure in deploying it? Are organizations juggling multiple AI models? Are they using different models for separate functions and needs within the organization? How can CIOs keep track of AI that is already at work across the organization? Is unauthorized AI more of an issue than shadow tech — unauthorized apps and devices — in the system?
Listen to the full episode here.
Editor’s Note: Due to a technical issue, there are several brief audio distortions in this episode that could not be readily resolved.
What You Should Know About Agentic AI
Joao-Pierre S. Ruth
Senior Editor
Joao-Pierre S. Ruth covers tech policy, including ethics, privacy, legislation, and risk; fintech; code strategy; and cloud & edge computing for InformationWeek. He has been a journalist for more than 25 years, reporting on business and technology first in New Jersey, then covering the New York tech startup community, and later as a freelancer for such outlets as TheStreet, Investopedia, and Street Fight.
Fortifying Your Unstructured Data: Cyber Resilience Across On-Prem and Cloud
Perfecting IT Automation in 2025: A Roadmap for CIOs
2022 State of ITOps and SecOps
You May Also Like
Jan 17, 2025
Jan 16, 2025
Jan 7, 2025
Nov 20, 2024
Jan 21, 2025
Fortifying Your Unstructured Data: Cyber Resilience Across On-Prem and Cloud
Perfecting IT Automation in 2025: A Roadmap for CIOs
Palo Alto Networks ranks #1 in Advanced Cloud Firewalls Tests
Enterprise WAN Simplicity, Performance and Security
A Growing Business: Nature Fresh Farms and VeloCloud
State of ITSM in Financial Services: Key Insights & Trends
Future-Proofing Public Sector IT with Automation and AI
Copyright © 2025. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.
source
This article was autogenerated from a news feed from CDO TIMES selected high quality news and research sources. There was no editorial review conducted beyond that by CDO TIMES staff. Need help with any of the topics in our articles? Schedule your free CDO TIMES Tech Navigator call today to stay ahead of the curve and gain insider advantages to propel your business!

