AI Implementation Considerations Best of GSX 2024 Conference Recording
3.5 CPE
3.5 CPE
Discover how AI is revolutionizing the world of security. This Best of GSX package includes 4 recordings that delve into the intricacies of leveraging AI to enhance security operations, from addressing data privacy concerns to ensuring ethical AI development. Hear from industry experts as they unpack the potential and perils of AI in the cyber frontier. Learn how to effectively integrate AI/ML into physical security systems, leveraging the technology for noise reduction and data-driven decision-making.
This package includes:
Revolutionizing Security Management: The AI Edge
Revolutionizing Security Management: The AI Edge presents a comprehensive analysis of artificial intelligence’s pivotal role in modern security management. This session offers an in-depth exploration of AI’s application in enhancing operational capabilities, focusing on practical implementations such as advanced risk assessment, real-time surveillance optimization, and efficient incident response strategies. The presentation methodically examines AI’s contribution to increasing work capacity, streamlining decision-making processes, and augmenting human expertise in critical security operations. It also thoughtfully addresses the complexities surrounding ethical implications, data privacy concerns, and the necessity for professional development in the AI landscape. Participants will acquire valuable insights into effectively integrating AI tools to achieve heightened security effectiveness and operational resilience in an increasingly digitalized world.
AI Unleashed: Navigating the Cyber Frontier with Asimov's Ethical Compass
This presentation delves into the potential and perils of AI in the context of cyber security, referencing Asimov's Three Laws of Robotics and the Zeroth Law as guiding principles for responsible AI development. Attendees will gain insights into various AI-related threats— such as biased decision-making and privacy violations—and learn about the importance of cyber security measures in mitigating these risks. The discussion emphasizes the need for interdisciplinary collaboration, international standards, and ongoing dialogue to ensure a balanced approach to harnessing AI's potential while addressing its inherent dangers.
How to Navigate the Proper Usage of AI/ML and Emerging Tech in Security Operations
The buzz across the security industry is the use of artificial intelligence (AI) and machine learning (ML) capabilities as a force multiplier for security teams. But rarely do we know how many of these tools to use in emerging technology to augment and enhance security operations.
Panelists will discuss the use of AI/ML within physical security systems, the role the technology plays in noise reduction, and how it can be effectively applied to your security operation. The panelists will also discuss the role AI/ML plays in decision-making, appropriate ways that manufacturers can talk about capabilities (without overstating its capabilities), and the questions that security practitioners should ask before deciding on technology investments around AI/ML.
How Can You Trust AI?—A White Hat Identity, Surveillance, Security, and Privacy, Risk (WHiSSPR) Approach to Complement ESRM
The use of artificial intelligence (AI) is impacting physical security systems in a variety of important ways. As security professionals responsible for the design, installation, integration, operation and maintenance of these systems, it is critical to understand not only the potential use cases but also a means of measuring the risks that are associated with these systems, including business, operational, legal, technical, and social requirements (BOLTS) and impacts. This session provides a risk assessment framework to evaluate the risks associated with the deployment of physical security systems in general and specifically the risk associated with the use of AI in these use cases.
3.5 CPE