The Incident Response Team Episode
Transcript
-
What is generative AI?: Generative AI is a subset of artificial intelligence focused on creating new content based on existing content. The core technology behind it is Large Language Models (LLMs), which are sophisticated software systems that predict a sequence of words based on a given prompt. These are not magic but rather complex tools that require proper management.
-
How do you keep up with evolving AI?: It’s a significant challenge as security teams often lag behind business units in adopting new technologies. A common, but ineffective, reaction is to ban AI tools like ChatGPT. This often leads to “shadow IT,” where employees use unmanaged tools anyway, putting company data at risk. The better approach is to establish a consolidated and logical framework for using these technologies safely.
-
Pros and cons of AI for businesses?:
-
Benefits: The primary advantage is the ability to process large amounts of unstructured data (such as emails, Slack messages, and documents) and automate tasks that were previously manual and time-consuming, leading to significant productivity gains.
-
Disadvantages (Old Challenges): Using third-party AI tools (from OpenAI, Google, Microsoft, etc.) introduces supply chain security risks. Companies must rely on these vendors to protect their data, which requires proper vetting, understanding their data retention policies, and ensuring adequate security measures are in place.
-
Disadvantages (New Challenges): By default, many AI models use the data they are fed for training purposes. This can lead to the AI learning and potentially exposing sensitive company information, intellectual property, or even internal processes like interview questions, as was reportedly the case with Amazon.
-
-
What is StackAware’s AI protocol?:
-
The protocol is a comprehensive checklist and standard operating procedure (SOP) that provides a structured approach for companies to manage AI risks.
-
It emphasizes creating a specific, detailed policy for generative AI rather than just giving vague guidelines.
-
It includes steps for vendor management, risk registration, business analysis (cost-effectiveness), and privacy reviews.
-
Aggregation Risk: The protocol specifically calls out the need to analyze for “aggregation risk,” which is when an AI tool combines multiple, seemingly innocuous pieces of public information to infer sensitive, non-public details about a company.
-
Notes
Show notes
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission
Our rapid response team had three specialized roles on it:
- Duncan – pen testing
- Eric – IT
- Alan – privacy
The first step in responding to this incident was discovery. This is part of the phase known as detection and identification. Duncan identified what type of data was taken and what methods were used.
Communication is a critical piece for incident response. Communicating with the coworkers who reported the incident, executive management to get context about the issue, technical personnel to know what controls are in place, etc.
The reason a privacy specialist was involved with the team was to analyze what kind of data was involved and what regulatory requirements might apply. This is important because it affects notification responsibilities.
Prepare
The best time for incident response is BEFORE an incident occurs. Prepare now by making decisions about how you’ll react WHEN an incident occurs. You can walk through a scenario today for what you’ll do if an employee takes data they shouldn’t.
Lessons Learned
- What policies and procedures need to change?
- What controls should be adjusted?
- Are there areas where response time could have been different?
- What training is needed?
Incident Response Recommendations and Considerations for Cybersecurity Risk Management – NIST 800-62r3
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf
SANS Incident Response Framework
https://www.sans.org/security-resources/glossary-of-terms/incident-response
Send a Question
Do you have a question for our podcast? Send it to us here.