Remove Intellectual Property Remove Management Remove Security
article thumbnail

EU taps AI experts to develop compliance framework for AI regulations

CIO

They will oversee four working groups, each focusing on different aspects of AI governance — transparency and copyright, risk identification and assessment, technical risk mitigation, and internal risk management for general-purpose AI providers. The code will outline exactly how companies can comply with the broad set of regulations.

article thumbnail

Given IBM consulting’s genAI rollout, should CIOs rethink consulting strategies for 2025?

CIO

I believe that managed business services-as-software — aka BPO — is a big driver of consulting revenues going forward. There is a cost arbitrage and a quality play that can be built into a well-structured managed services deal,” Schadler said. “As Another critical factor is data management and mechanisms to prevent data leakage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New trade body wants to license training data for AI use

CIO

Seven companies that license music, images, videos, and other data used for training artificial intelligence systems have formed a trade association to promote responsible and ethical licensing of intellectual property. The situation could become even more complex for multinational companies.

article thumbnail

3 things to get right with data management for gen AI projects

CIO

According to Kari Briski, VP of AI models, software, and services at Nvidia, successfully implementing gen AI hinges on effective data management and evaluating how different models work together to serve a specific use case. Data management, when done poorly, results in both diminished returns and extra costs.

article thumbnail

Implications of generative AI for enterprise security

CIO

Providing sensitive information to Generative AI programs such as personally identifiable data (PII), protected health information (PHI), or intellectual property (IP) needs to be viewed in the same lens as other data processor and data controller relationships. As such, proper controls must be in place.

Security 779
article thumbnail

AI will evolve the role of the CIO

CIO

Langer, Associate Vice Provost, Professor of Practice and Director, Center for Technology Management and Digital Leadership at Northeastern University. “So As a support technology, AI works on data that is dependable, proven, and secure,” says Langer. says Dr. Arthur M. So there is fear in the boardroom.”

article thumbnail

Bridging the gap between legacy tools and modern threats: Securing the cloud today

CIO

However, the swift adoption of cloud infrastructure has also introduced expanded enterprise attacks, the rate at which is often outpacing security precautions. Securing cloud environments is complicated and can seem daunting. Each team has distinct responsibilities and tools, leading to fragmented security efforts that can leave gaps.

Security 696