Show cover of Emerging Cyber Risk

Emerging Cyber Risk

Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.

Tracks

Anthropics Responsible AI Scaling Policy
In this episode of the Emerging Cyber Risk podcast, Joel and Max explore Anthropic's responsible AI scaling policy. They discuss the practicality and strategic nature of the framework, which aims to ensure the safety of AI models as they push the boundaries of capabilities. They highlight the commitments made by Anthropic and the public disclosure aspect, emphasizing the importance of responsible AI development.
47:26 12/18/23
Joel's Book Review (Secure Intelligent Machines)
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast episode features Max Aulakh and Joel Yonts talk about Joel's book, which explores the security aspects of AI and how to build a cyber protection program for it. They highlight the lack of literature on this topic and explain why they felt the need to fill this gap. The hosts emphasize the importance of finding trustworthy sources of information in the midst of the noise surrounding AI and cybersecurity.The touchpoints of our discussion include:The purpose for Secure Intelligent Machines Nothing written about how to “secure” AI?Why is Joel qualified to write?When did Joel start writing this book?Who is this book written for?Get to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams WebsiteResources:Secure Intelligent Machines
35:04 11/27/23
Developing an AI Policy
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss what an AI policy is, how do you know if your company needs an AI policy and what contents would go inside of this policy.  AI is here to stay, and whether you are using it or not, you need to help prepare your team and develop policies around the use of AI.The touchpoints of our discussion include:What is an AI Policy? Why do you need one?What goes inside of an AI policy?Can we enforce this? Or is it wishful thinking from a technical perspective?What type of liability is an organization facing not having an AI policy?Get to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams WebsiteResources:Secure Intelligent MachinesLaure Whitt-Winyard
43:13 11/13/23
2024 Annual Planning for AI Enablement
On this episode of the Emerging Cyber Risk podcast, we discuss the AI planning that is going into 2024 and how this may affect our business. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss the upcoming year’s initiatives and what you, as a business leader, should be planning for concerning AI development. AI is here to stay, and whether you are using it or not, you need to help prepare your team and develop safeguards around the use of AI.The touchpoints of our discussion include:Having an AI StrategySecurity Development & AI - Building and ConstructingSupplier/Procurement/Legal Reviews of ContractsGet to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams WebsiteResources:Walmart Rolling out AI OWASPScott KollarAdobe Photoshop AIZoom’s Latest Terms of ServiceSecure Intelligent Machines
32:43 10/30/23
The Intersection of AI and the Military: A Discussion with Taylor Johnston, Former Chief of Innovation for the U.S. Air Force
On this episode of the Emerging Cyber Risk podcast, our guest is Taylor Johnston, Chief Operations Officer at the USF Institute of Applied Engineering and former Chief of Innovation for the United States Air Force. Join us as we investigate the integration of artificial intelligence and automation into the air force and the wider military. Tune in to discover the potential applications and use cases, as well as the already existing benefits; the current focus on autonomous systems; and the similarities between AI and the atomic bomb.The podcast is brought to you by Ignyte and Secure Robotics, we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. The touch points of our discussion include:1. Where AI fits into the US government’s operations2. Balancing efficiency and effectiveness when applying AI to military settings3. Adoption of robotic process automation across sectors4. The potential of autonomous systems in the military5. The interoperability of different AI models6. How AI mirrors the atomic bomb7. The evolution of regulations in the military and how they apply to AI Taylor Johnston Bio:Taylor Johnston is currently the Chief of Operations for the USF Institute of Applied Engineering where leads a multi-disciplinary team in solving complex problems for the Department of Defence, US Government Agencies, and a variety of businesses. Prior to this, he served in the United States Air Force for over twenty years, most recently as the Chief of Innovation. Across his career, he has led diverse teams across different cultures within government and the Air Force, specializing in projects involving collaboration with private sector companies seeking to innovate with the military.Taylor Johnston on LinkedInGet to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams Website
31:39 10/16/23
The Biden Administration Hands the Safety & Security of AI to Industry Leaders!
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss the new initiative that President Biden has introduced concerning controlling OpenAI and the 3 pillars around which it will be based — safety, security, and trust. We discuss each of these pillars in detail, as well as the 8 commitments that were made. The touchpoints of our discussion include:Why would the government do this?Who is part of this initial group of voluntary members?What countries are involved?What is the scope of this agreement?Resources:Whitehouse Briefing DocumentsEnsuring Safe, Secure, and Trustworthy AI PDFGet to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams WebsiteResources:President Biden’s AnnouncementWhitehouse Briefing DocumentsEnsuring Safe, Secure, and Trustworthy AI PDF
35:04 10/2/23
Navigating the Legal Challenges of Artificial Intelligence with Scott Koller of Baker & Hostetler LLP
On this episode of the Emerging Cyber Risk podcast, our guest is Scott Koller, a skilled privacy and data security attorney and Partner at Baker & Hostetler LLP. Join us as we navigate the legal challenges posed by artificial intelligence (AI), delving into the associated risks and possible future solutions. We further explore the ownership and copyright challenges that are currently facing the court systems and how these could trigger court reform. Tune in to discover how different Global Perspectives on AI regulations can help bridge the gap between the legal sector and the quickly developing technology sector. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. The touch points of our discussion include:1. Bridging the gap between the legal sector and AI 2. Why the legal world is struggling to keep up with rapid technology advancements 3. The question of AI ownership and copyright issues4. Asking whether trust and security in AI models are due to biassed data 5. Unpacking the global perspective on AI regulations 6. The impact of GDPR on AI 8. The need for responsible development of AI technologiesScott Koller Bio:Scott Koller is a skilled privacy and data security attorney whose practice focuses on data breach response and security compliance issues. A Partner at Baker & Hostetler LLP, Scott has extensive experience on privacy and data protection issues, including data breach response, cybersecurity risk management, incident response planning and preparedness, vendor management, and regulatory investigations.Scott Koller on LinkedInGet to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams Website
38:31 9/18/23
Exploring the Adoption of AI in the Defense Industry with Ron Fehlen of L3Harris Technologies
On this episode of the Emerging Cyber Risk podcast, our guest is Ron Fehlen, VP and GM of USAF Programs and Broadband Communication Systems at L3Harris Technologies, the trusted disruptor for the global aerospace and defense industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss the adoption of artificial intelligence, including both the negatives and the upsides. Discover the opportunities for AI adoption in the defense industry, and whether it is likely that machines can ever be truly trusted for critical missions. Explore the importance of public discussions around the ethical implications of AI adoption and the use of synthetic data for training larger models. The touchpoints of our discussion include:Can synthetic data be used to fill the gaps when training larger AI models?Trusting machines in critical missionsPublic discussions on the ethical considerations of AIWhether AI adoption can, or even should, be avoidedInnovative projects L3Harris are working on with the governmentRon Fehlen Bio:Ron Fehlen is the VP and GM of USAF Programs and Broadband Communication Systems at L3Harris Technologies, the trusted disruptor for the global aerospace and defense industry. Prior to this he worked at Raytheon Technologies as Executive Director of ISR & Comm at Raytheon Intelligence & Space. He also previously served as the Deputy Director, Advanced Space Capabilities Directorate, Air Force Rapid Capabilities Office at United States Air Force where he oversaw $21 billion plus of classified technology programs and over ten high performance teams at the premier USAF acquisition organization.Ron Fehlen on LinkedInGet to Know Your Hosts:Max Aulakh Bio:Max is the CEO of Ignyte Assurance Platform and a data security and compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.Max Aulakh on LinkedInIgnyte Assurance Platform WebsiteJoel Yonts Bio:Joel is CEO & Research Scientist at Secure Robotics and the Chief Research Officer & Strategist at Malicious Streams. Joel is a security strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over twenty-five years of diverse information technology experience with an emphasis on cyber security. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.Joel Yonts on LinkedInSecure Robotics WebsiteMalicious Streams Website
35:42 9/4/23
Exploring the Intersection of Cyber Security and AI: Insights from Phil Harris of IDC
On this episode of the Emerging Cyber Risk podcast, our guest is Phil Harris, Research Director, Cyber Security Risk Management Services at IDC, the premier global marketing intelligence platform. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss the fascinating intersection of cyber insurance and artificial intelligence (AI). Discover how the rise of ransomware attacks has influenced the cyber insurance landscape, resulting in higher premiums and demand for accurate security assessments. Explore the role of AI in the industry and the importance of relying on cyber security experts for assessments.
37:41 8/21/23
Transparency and Collaboration: Driving AI Adoption in the Military and Government with Aaron McCray of the US Navy
On this episode of the Emerging Cyber Risk podcast, our guest is Aaron McCray, a twenty-six-year veteran of the U.S. Navy. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss the challenges and potential of AI adoption in the US Navy. Aaron highlights the importance of collaboration between the military and commercial sectors and the need for validation and testing while adopting AI. He also touches on ethical considerations, potential applications, and the importance of transparency and prioritization in driving AI development.
44:14 8/7/23
Leveraging AI for Risk Management: Insights from Laura Whitt Winyard, VP of Security and IT at Hummingbird
On this episode of the Emerging Cyber Risk podcast, our guest is Laura Whitt Winyard, VP of Security and IT at Hummingbird. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. Join us as we discuss the future of AI and its role in risk management. We explore the responsible use of AI, the collaboration between teams, the validation of AI models, and the potential risks and benefits of AI applications in society. Listen to the full podcast to gain valuable insights into leveraging AI while nurturing human intelligence!
30:13 7/24/23
Navigating the Intersection of AI and Healthcare with Christopher Rogers
Today's guest is Christopher Rogers, COO at Carenet Health. In this episode, we discuss how healthcare companies and consumers should navigate the intersection of AI and healthcare. We cover multiple touchpoints, including AI's potential benefits and pitfalls in healthcare and the importance of using it responsibly. We also examine the need for collaboration and foresight in navigating the rapidly advancing field of AI
47:55 7/10/23
Incorporating AI in Risk Management: Challenges and Potential Benefits with Jeff Lowder, Co-Founder of The Society of Information Risk Analysts
Today's guest is Jeff Lowder, the Co-Founder and Past President of The Society of Information Risk Analysts, a society dedicated to continually improving the practice of information risk analysis. Our discussion today focuses on the emerging cyber risks and ethical concerns associated with AI in enterprise risk management, highlighting the challenges of managing risks, the need for interdisciplinary translation, and the importance of accurate language and calibrated estimations in risk management.
41:53 6/26/23
Challenges in Developing, Democratizing, and Adopting AI with Dr. Amit Shah, Founder and President of GNS-AI LLC
Today's guest is Dr. Amit Shah, Founder and President of GNA-AI LLC, a data science/ML/AI consulting business specializing in building data-based decision support systems. Our discussion focuses on the challenges in developing and adopting AI solutions, unifying democratized models, and the challenge of developing FDA-compliant models for the healthcare industry. We also touch on the GDPR challenges while building AI models.
38:57 6/12/23
Managing Cyber Security Challenges in the Retail Space with Ganjar Imansantosa, VP and CISO at Tropical Smoothie Cafe
Today's guest is Ganjar Imansantosa, VP and CISO at Tropical Smoothie Cafe, a nationally franchised quick-service restaurant.We discuss the challenges and solutions of implementing cybersecurity protocols in a shared risk environment between the brand and the franchisee. Ganjar covers multiple touchpoints, including managing cyber security in a shared risk environment, why the retail industry lags in adopting cybersecurity protocols, and maintaining customer data privacy at retail brands. He also covers the role played by legal teams in defining the cybersecurity strategy of an organization.
39:50 5/29/23
Opportunities and Challenges of AI in Cybersecurity with Phil Agcaoili, Entrepreneur and Former CISO at Elavon, Cox, and VeriSign
Our guest today is Phil Agcaoili, who is a recent Entrepreneur and a former Chief Information Security Officer at Dell. Together, we discuss the impact of AI on cybersecurity, compliance, and the workforce. Phil shares valuable insights on aligning emerging risks with technological advancements with protection software. Phil is an expert in cybersecurity risk management and shares his experience and knowledge on the copilot system. This tool helps organizations quantitatively measure their cybersecurity risk. Don't miss out on this informative and engaging podcast!
43:15 5/15/23
Emerging Cyber Risks and Zero Trust with Paul Miller, Zero Trust Architecture Expert at Appian Logic
Our guest today is Paul Miller, Zero Trust Architecture Expert at Appian Logic, a management consulting and IT security company. They unpack zero trust and ZTNA as a security shield, formulation of a national cybersecurity document, driving awareness and change at companies, and the legacy lag at companies that prevent the adoption of zero trust architecture.
38:33 5/1/23
The Need to Bring Cybersecurity Front and Center in the Healthcare Industry with Bill Scandrett, Chief Information Security Officer at Allina Health
Our guest today is Bill Scandrett, Chief Information Security Officer at Allina Health. Our discussion pivots around the awareness and implementation of cybersecurity protocols in the healthcare industry. The discussion focuses on oversight of the FDA on medical devices, best practices in operationalizing GRC, managing third-party risk, and protecting healthcare data while innovating new technologies.
20:36 5/1/23
Episode Zero - An Introduction to the Emerging Cyber Risk Podcast
Welcome to the first episode of the Emerging Cyber Risk podcast, brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts.
12:29 4/25/23