Your Best Cyber Defense Against Emerging Technologies Like ChatGPT
In the past few months since it was introduced in November 2022, ChatGPT has: 1) experienced its own data breach, 2) seen a lawyer submit a brief that used fake ChatGPT generated case citations, 3) seen a Texas judge require lawyers to complete a certification that they haven’t used ChatGPT (or other generative AI solutions) to draft filings without human QC, and 4) seen the first libel case filed against OpenAI for alleged hallucinations that claimed the claimant was sued for fraud in a case within which he wasn’t a party.
Threats from Emerging Technologies Today
- Automated Hacking: Hackers can leverage generative AI technologies to automate the identification and exploitation of network and software vulnerabilities. By using machine learning, they can create convincing and accurate phishing and social engineering messages that are more likely to trick their intended targets into taking their desired action.
- Malware Adaptability: AI can be used to create malware that adapts and learns from the defenses it encounters. For example, it can be used to create mutating malware that can avoid detection by endpoint detections and response (EDR) applications.
- Poisoning Attacks: Data poisoning occurs when attackers tamper with the training data used to create deep-learning models. Cyber attackers can use sophisticated techniques to “poison” the data used to train an AI system, causing it to make incorrect decisions or behave unpredictably. Hackers could literally use your AI solution against you!
- Deepfakes: Generative AI technologies can create highly realistic videos, audio, and images, known as “deepfakes”. Those deepfakes can be used to create convincing fake videos or voice recordings of CEOs to trick employees into releasing confidential information or transferring money. AI-powered social engineering deepfakes are becoming a significant challenge for organizations, even if they have well-established procedures that require authorization from C-Suite executives to execute these tasks.
The Importance of Information Governance to Reduce Risk
In most of the examples above, cyber attackers are after one thing – your data. The more data you have, the more difficult it is to protect the important and sensitive data you have. Holding data creates risk – the more data your organization holds, the greater the risk it engenders. Data can literally be toxic to your organization!
That’s why a sound information governance program is the foundation of your approach to reduce cyber risk. Sound information governance practices include:
- Data Classification and Management: Protecting your data begins with understanding what you have, where it’s stored, how sensitive it is, and who has access to it. Good information governance includes a thorough data classification process (including the creation of a data map), which aids organizations in determining risks associated with different types of data and establishing security measures to suit. You can’t protect your most important and sensitive data if you don’t know where it is.
- Encryption and Other Data Protection Measures: Encrypting sensitive data and other security measures such as firewalls and intrusion detection systems are “table stakes” today for organizations. A key part of information governance is ensuring that data is stored securely, both at rest and in transit.
- Implementing Access Controls: Implementing strict access controls includes ensuring that employees – and third parties such as suppliers or contractors – only have access to the data they need to do their job and that access rights are revoked promptly when an employee leaves the company or changes roles.
- Training and Documentation: A strong information governance program includes regular training and awareness programs – backed by thorough documentation updated regularly – to ensure that all employees understand the importance of data security and their role in protecting the organization’s data.
- Periodic Audits: Your information governance program should include periodic audits to ensure compliance with your policies which will identify any irregularities that could lead to a security breach.
- Data Lifecycle Management: More than ever today, data must be managed from creation or acquisition, through its active use, to its eventual disposal. By regularly reviewing data (including conducting privacy risk assessments on sensitive data) and deleting unnecessary data, organizations can reduce the ‘attack surface’ available to cybercriminals.
Your Best Cyber Defense Against ChatGPT and Other Emerging Technologies
Expect rapid evolution with emerging technologies like ChatGPT and other generative AI technologies. It’s going to be crazy and unpredictable for the foreseeable future! You can’t control how those technologies are going to evolve and how they can be used – maliciously – to attack your organization.
What you can control is what you do to protect your organization’s data from attacks. A sound information governance program is the foundation of your approach in protecting your data and reducing cyber risk. The more uncontrolled data you have in your organization, the more likely that data could be toxic to your organization. Your best cyber defense against ChatGPT and other emerging technologies is to minimize the amount of toxic data in your organization through a sound information governance program!