Share
Facebook Facebook icon Twitter Twitter icon LinkedIn LinkedIn icon Email

Uncategorized

AI and cybersecurity: Think like a thief to catch a thief

Published 5 December 2024 in Uncategorized • 3 min read

As digital tools become more sophisticated, it’s crucial to keep three key things in mind to protect your organization from cyber-attack.

1. Know AI’s capabilities and strengths so they can’t be used against you

Audio and video deepfakes can be used for fraud, phishing, and reputational damage. Executives should do two things to avoid being victimized:

  • Learn about what’s possible with the latest digital technologies and AI.
  • Have a secret codeword in place as an analog check in case of any doubts.

The basic lesson here is that, before launching their attacks, bad actors can gather a lot of information on your company and employees to find and exploit vulnerabilities. Prepare for this by putting some kind of multimodal authentication in place. The aim is twofold: to verify information that could be used to do harm, and keep that verification secret.

2. Know AI’s shortcomings and weaknesses so they can’t be used against you

Knowledge is power again here. There are all sorts of biases in AI (such as facial recognition technologies that recognize white faces with a higher degree of accuracy than black faces, and GenAI systems that read CVs differently depending on whether they are associated with male or female names.) Fix such biases by:

  • Paying close attention to the training-data curation process.
  • Putting carefully crafted governance mechanisms in place to mitigate the risks.

The lesson here is that even the most sophisticated GenAI tool is not foolproof. Companies must keep human beings in the loop to detect AI biases and blind spots, and have human oversight in their responsible AI governance processes.

3. Know that AI itself can be attacked

We are now seeing data-poisoning attacks where AI models are tricked into behaving badly. (This is a type of cyberattack in which an adversary intentionally compromises a training dataset used by an AI or machine-learning model to influence or manipulate it.) Hackers are also using “jailbreaking mechanisms” to evade the guardrails put in place to limit GenAI’s potential for harm. Two measures are useful to understand how AI systems can be attacked:

  • Attend hackathons to equip yourself with the latest cyber-security measures.
  • Invite digital experts to try to break your systems to find their vulnerabilities before actual cyber criminals do.

Key takeaway

By remaining vigilant and knowledgeable about AI’s strengths and weaknesses, organizations can mitigate risks. Think like your potential enemies to stay one step ahead in this new technological realm.

Authors

Oyku Isik IMD

Öykü Işık

Professor of Digital Strategy and Cybersecurity at IMD

Öykü Işık is Professor of Digital Strategy and Cybersecurity at IMD, where she leads the Cybersecurity Risk and Strategy program and co-directs the Generative AI for Business Sprint. She is an expert on digital resilience and the ways in which disruptive technologies challenge our society and organizations. Named on the Thinkers50 Radar 2022 list of up-and-coming global thought leaders, she helps businesses to tackle cybersecurity, data privacy, and digital ethics challenges, and enables CEOs and other executives to understand these issues.

Related

How to get power

17 December 2024 • by Jennifer Jordan in Uncategorized

Leaders are always trying to figure out how to get more social power at work. So, how do you develop your social power with the groups and teams around you? ...

Learn Brain Circuits

Join us for daily exercises focusing on issues from team building to developing an actionable sustainability plan to personal development. Go on - they only take five minutes.
 
Read more 

Explore Leadership

What makes a great leader? Do you need charisma? How do you inspire your team? Our experts offer actionable insights through first-person narratives, behind-the-scenes interviews and The Help Desk.
 
Read more

Join Membership

Log in here to join in the conversation with the I by IMD community. Your subscription grants you access to the quarterly magazine plus daily articles, videos, podcasts and learning exercises.
 
Sign up
X

Log in or register to enjoy the full experience

Explore first person business intelligence from top minds curated for a global executive audience