PodParley PodParley
#206 Securing GenAI

EPISODE · Jun 13, 2024 · 21 MIN

#206 Securing GenAI

from Embracing Digital Transformation

In this episode, Darren continues his interview with Steve Orrin, the CTO of Intel Federal. They discuss the paradigm shift in DevSecOps to handle Artificial Intelligence and the dynamic nature of application development that AI requires.We find the transformative power of Digital Transformation, DevOps, and Artificial Intelligence (AI) at the fascinating intersection of technology and business leadership. In this realm, we will delve into two crucial aspects: the significance of securing the AI development process and the imperative of responsible and ethical data use. By understanding these, we can harness AI's potential to not only revolutionize our organizations but also inspire trust and confidence, driving digital transformation to new heights.  Ethical Data Sourcing and AI TrainingAI has revolutionized the way we engage with technology. The crux of every AI system lies in data diversity. Why? Because an AI system learns from data, feeds on data, and performs based on the information provided. The more diverse the data is, the better the AI system learns and performs. However, the ethical aspect of data sourcing and AI training must be considered with utmost urgency. The AI system must be deployed only on populations that align with the datasets used in the training phase. The ethical use of AI involves deep trust and transparency, which can only be garnered through thorough visibility and control throughout the AI's development lifecycle. The Golden Rule: TrustBuilding trust in AI systems is a direct result of their foundation on a diverse range of data. This approach prevents any single type or data source from dominating and diluting any biases that may exist in any dataset. The golden rule of trust in AI systems starts with diversifying data sources, thereby reducing undue dominance. In addition, data provenance visibility is integral to ethical AI. It provides transparency to the deploying institution, showing what information went into the AI's training and thus ensuring its optimal performance. Scalability and TraceabilityOne of the main challenges with AI development is managing the scalability of training data. The ability to rollback to well-known states in training is critical, but how do you do that with petabytes of data? Hash functions or blockchain methods become essential in managing large data pools. Traceability, accountability, and audibility also take center stage in the AI development process. In the case of untrustworthy data sources, a system that enables data extraction from the pipeline is necessary to prevent their usage in ongoing training. The Road AheadThe journey to secure AI development is guided by the principles of transparency, trust, and ethics. These are not mere suggestions, but essential elements in fostering trust in AI systems while ensuring their effectiveness. The path may seem challenging, but these steps provide a clear roadmap to navigate the complexities of AI DevSecOps.Be it through diverse data sourcing, treating data with the respect it deserves, or consistently documenting the data lifecycle process, the principles of trust, visibility, and a dogged commitment to ethical practices lie at the heart of burgeoning AI technologies.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

NOW PLAYING

#206 Securing GenAI

0:00 21:33

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Managing Next Generation Energy Systems Cambridge University Background Stakeholders working with energy systems have to make complex decisions formulated from risk-based assessments about the future. The move towards more renewables in our energy systems complicates matters even further, requiring the development of an integrated power grid and continuous and steady transformation of the UK power system. Network flows must be managed reliably under uncertain demands, uncertain supply, emerging network technologies and possible failures and, further, prices in related markets can be highly volatile. Mathematicians working with engineers and economists, can make significant contributions to address such issues, by helping to develop fit-for-purpose models for next generation energy systems. These interdisciplinary approaches are looking to address a range of associated problems, including modelling, prediction, simulation, control, market and mechanism design and optimisation. This knowledge exchange workshop was part of the four months Res The Digital Resilience Show David Wild Podcast by David Wild Solving for Change MOBIA Technology Innovations Solving for Change welcomes business and technology leaders to share stories of bold business transformation within complex organizations. In an era when technology and markets are changing around businesses, the key to staying competitive is to evolve in response to those changes.  MOBIA’s Mike Reeves and Marc LeBlanc investigate business transformation, deconstructing the challenges, ambitions, and market disruptions that drive companies to embark on transformation journeys, and exploring their unique approaches to achieving meaningful outcomes.  What sparks leaders to pursue business transformation? How do they overcome the challenges along the way? What are the keys to creating enduring change?  Through in-depth conversations with business and technology leaders, Mike and Marc answer these questions and explore how businesses evolve by pulling four key transformation levers: people, process, technology, and culture. Darknet Discussions Darknet Discussions Welcome to "Darknet Discussions," the podcast that gets into the shadows of the internet to bring you the most intriguing, enlightening, and sometimes unsettling stories from the dark web. Hosted by seasoned darknet aficionados, each episode of "Darknet Discussions" explores the intricate dynamics of darknet markets, cybersecurity threats, and the digital underworld. Join us as we interview experts, discuss the latest trends in cybercrime, and shed light on the technologies that operate beneath the surface of everyday internet use. Also, we occasionally go off on a tangent about something completely unrelated.
URL copied to clipboard!