Intelligent CISO Issue 82 | Page 29

EDITOR ’ S question

CHINTAN PATEL , CHIEF TECHNOLOGY OFFICER , CISCO UK & IRELAND isco welcomes the

C recommendations laid out in the ‘ AI Opportunities Action Plan ’ and is encouraged that the government has responded so positively to the proposals from Matt Clifford . Having a clearly defined roadmap is critical for the UK to achieve its ambition to become an AI superpower and a leading destination for AI investment .

We are at an inflection point with AI ; what we do now will shape the next decade and beyond . Advances in AI are changing how we live , work and engage with public services , but there are foundational aspects that we must address now – from the infrastructure these models are built on , to the security that is core in ensuring models work as intended and data remains secure , and the skills required in the workforce to truly benefit from this technology .
The promise of AI is immense , but we are still in its infancy with our most recent AI Readiness Index revealing that only 10 % of UK organisations are fully ready to capture AI ’ s potential .
There are foundational aspects that we must address now – from the infrastructure these models are built on , to the security that is core in ensuring models work as intended and data remains secure .
MICHAEL ADJEI , DIRECTOR , SYSTEMS ENGINEERING AT ILLUMIO
he government ’ s AI plan is a positive

T step , boosting job creation and improving public services . However , it will test the robustness of the government ’ s data privacy frameworks .

Many governments , including the UK , have not covered themselves in glory when it comes to cyber and data for various reasons . It will therefore be vital to establish clear guidelines for acceptable use and protection to safeguard citizens and AI systems .
Researchers and innovators with access to NHS data will become prime targets for cyberattacks which in itself can have legal and ethical considerations . Cybercriminals will look to exploit the hidden layers of AI , which are often proprietary and insufficiently scrutinised . Vulnerabilities and coding flaws in these layers may remain undiscovered longer than in other AI layers , leaving third parties open to exploitation .
Before any data is made available to researchers and innovators , it ’ s essential that their standards and policies are thoroughly checked and approved . No data should be handed over if a third party does not have an AI framework or fails to meet the required standards .
WWW . INTELLIGENTCISO . COM 29