How Can You Trust AI?—A White Hat Identity, Surveillance, Security, and Privacy, Risk (WHiSSPR) Approach to Complement ESRM

Event Time

Originally Aired - Tuesday, September 24 11:15 AM - 12:15 PM Eastern Time (US & Canada)

Info Alert

Create or Log in to My Show Planner to see Videos and Resources.

Info Alert

Your account does not have access to this session.

Videos

Resources


{{video.title}}

Log in to your planner to join the zoom meeting!

{{chatHeaderContent}}

{{chatBodyContent}}

Resources

Info Alert

This Session Has Not Started Yet

Be sure to come back after the session starts to have access to session resources.

Event Location

Location: S320AB


Event Information

Title: How Can You Trust AI?—A White Hat Identity, Surveillance, Security, and Privacy, Risk (WHiSSPR) Approach to Complement ESRM

Description:

The use of artificial intelligence (AI) is impacting physical security systems in a variety of important ways. As security professionals responsible for the design, installation, integration, operation and maintenance of these systems, it is critical to understand not only the potential use cases but also a means of measuring the risks that are associated with these systems, including business, operational, legal, technical, and social requirements (BOLTS) and impacts. This session provides a risk assessment framework to evaluate the risks associated with the deployment of physical security systems in general and specifically the risk associated with the use of AI in these use cases.

Learning Objective #1: How to measure the risk associated with artificial intelligence and its implications when introduced into physical security systems. Depending on the artificial intelligence tools used the control and sharing of sensitive information varies greatly. This session provides the attendees with a checklist to help achieve this.

Learning Objective #2: Security as a service (SaaS) is becoming more common, whether it is video surveillance, visitor management, or identity credentials, all of which increasingly are using machine learning and artificial intelligence. This session provides attendees with basic evaluation tools to analyze the risk of outsourced security technology.

Learning Objective #3: Come away with a better understanding of the legal AI framework in place, including U.S. and global privacy legislation and the Executive Order on Artificial Intelligence issued in October 2023.

Type: All Access Education


Notes

Create or Log in to My Show Planner to add notes.


Speakers


Tracks


Supported by ASIS Community(ies)