You’re not doing enough to educate insiders about data protection

corporate security insider threat hacker spy cybersecurity human resources



Indeed, during the most recent RSA Conference I had executives remark on more than one occasion how marketing plans were being revealed through AI engine queries such as “how does Xyz Inc. plan to go to market?” The engine had been schooled on the content previously and presented it in the response — someone somewhere had loaded the go-to-market into the AI to refine and the AI engine spat it back out, a bonanza for a competitor making such a query.

Similarly, professional social networks, such as LinkedIn thrive on encouraging individuals to highlight what they are working on, what they are researching, where they are traveling, and who is on their team.

From a competitive intelligence perspective, the urge to engage in sharing is directly filling the blanks for those who may wish to garner information about the referenced entity, and in the event a piece of unreleased or private technology is shared, the trade secret protection goes out the window as the content was not adequately protected.



Source link
lol

Indeed, during the most recent RSA Conference I had executives remark on more than one occasion how marketing plans were being revealed through AI engine queries such as “how does Xyz Inc. plan to go to market?” The engine had been schooled on the content previously and presented it in the response — someone somewhere…

Leave a Reply

Your email address will not be published. Required fields are marked *