Helping CISOs Embrace Artificial Intelligence

The ever-evolving threat landscape and proliferation of data-generating apps and devices has had organisations grasping at Generative AI and Large Language Models (LLM) as the solution to the problems they face.

While AI has a major role to play in improving cyber security  customer experience, identifying insights and streamlining business processes, the pace of change, regulation, deployment by employees of ‘Shadow AI’, and ‘AI washing’ by marketers, can leave cyber security teams struggling to remain current.

Now, Crossword Cybersecurity  the cyber security solutions company has launched a new CyberAI Practice.  The practice, which sits within Crossword Cybersecurity’s Consulting business, consolidates Crossword’s Artificial Intelligence (AI) expertise into a centre of excellence that will deliver AI-focused cybersecurity consulting services and products to help clients harness the power of AI in the organisation.

The LLM dilemma

LLMs have led to the emergence of many new tools, which must be assessed and assured so that adoption is controlled and does not pose legal, reputational, or commercial threats.

Simultaneously, LLMs have empowered would-be attackers by lowering the barriers to launching successful attacks.

Crossword has already led a significant initiative in investigating the application of Generative AI to cyber security.

This has been conducted with major industry partners and leading universities, including academics from Oxford University and MIT in the USA and AI researchers from the world famous Alan Turing Institute.

Helping Enterprises Keep Pace With AI Innovation

The CyberAI Practice will provide organisations with advisory, security testing and engineering services, which will allow organisations to manage AI threats and grasp the opportunities to improve efficiency, cyber security, and create new experiences for end users.  

Following its launch, the CyberAI Practice is offering the following services:

  • Engineering:   Modular services designed to support the assessment and development of LLM architectures, LLM security testing, design and security architecture reviews, and wider LLM-related engineering services.
  • CyberAI onsite workshops:   Education and maturity workshops to help organisations understand the market, assess their needs and existing AI use, and consult on whether to ‘build or buy’.

Consulting Innovation Director at Crossword Cybersecurity, James Henry, commneted “The latest wave of AI technologies hit the security industry with such pace that many businesses have been struggling to keep up.  At Crossword it is our mission to provide businesses with the knowledge and tools needed to securely embrace the benefits of Generative AI technologies, whilst also managing the associated risks.”

For more  information abaour the CyberAI practice and Crossword Cybersecurity’s Consulting business  > click here <

Image: Ideogram

You Migh Also Read: 

The Changing Role Of The CISO:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Beware Scammers Imitating Bank Websites
Why Is Security Reporting Still Failing? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.