MAC Tech Days Video Links
Keynote Presentation: Responsible AI: Managing AI Risks in This Digital Era
Preeti Shivpuri, Senior Manager, Deloitte and Michael Vinelli, Sr. Manager | Omnia AI, Deloitte
Video Link - Click here
Increasing digital transformation has led to the tremendous growth of business data volumes and increased the investment of disruptive technologies such as artificial intelligence (AI) and machine learning (ML) to generate data-driven insights and business efficiencies. This change has shifted the risk landscape (privacy, data biases, and discrimination, etc.) and has emphasized how organizations are responsibly using, protecting, and governing data assets.
This session will begin with a primer on AI and how various disruptive technologies tend to shape the organization’s strategy; will then introduce a framework for understanding risks; following by a discussion of leading practices for how organizations should address these risks with the right balance of innovation, risk management, and ethically scaled AI.
Trevor Foskett, Director of Solutions Engineering, Virtru
As organizations continue to adapt to a distributed workforce, there’s an increased need for secure data sharing that doesn’t slow down productivity. And, while many organizations focus on mitigating external threats, 30% of data breaches actually involve internal actors. Join this session to learn about the most common data sharing risks among distributed teams, best practices for secure collaboration and data encryption, and how to mitigate internal risks so that you can maintain confidentiality, compliance, and control over your most sensitive data
From China to Africa to Mexico and many other places on our planet, the money laundering
and cyber threat risks affecting the USA have dynamically changed. This is mostly due to
advances in technology and changes in the global geopolitical and geo-economic landscape.
Mike Emmerman will address several of the risks and threats that should be on your radar
when judging the nature and validity of transactions.
Bill Newhouse, Cybersecurity Engineer, National Cybersecurity Center of Excellence
This presentation will use the NIST Cybersecurity Framework to provide a lens that leverages the framework’s five functions:
- Identify: Develop an organizational understanding
- Protect: Develop and implement appropriate safeguards to ensure delivery of critical services
- Detect: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event
- Respond: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident
- Recover: Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident