AI: Experts Talk Ethical & Security Concerns

The future of artificial intelligence was a hot topic at the third annual CYBERSEC Cybersecurity Forum, where security professionals representing Poland, the Netherlands, Germany, and the United Kingdom discussed the pitfalls and potential of AI, and its role in the enterprise.

Is it too soon to have this discussion? Absolutely not, said Axel Petri, SVP for group security governance at Deutsche Telekom AG. "Now is the time to ask the questions we'll have answers for in ten, twenty years," he added. Cybersecurity supported by AI and machine learning can leverage data to generate more insight and fight fraud.

"The problem is, there are so many risks," said Noel Sharkey, professor of artificial intelligence and robotics at the University of Sheffield, who believes there are both opportunities and threats in the field. "There's not just one thing."

Sharkey presented an example in the medical field, where AI could help doctors research diseases. This is a good thing, he said, but what happens when the machine is right long enough and the doctor stops questioning it? Should a doctor automatically agree with a machine? What are the implications if they do, and the machine someday gets it wrong?

"What's core is making sure there's clear accountability, and being concerned with the types of controls we seek in AI," Sharkey continued.

There is a need for deep learning, and deep reinforcement learning, as we seek AI applications in child care, elder care, transport, and agriculture. "Future-proofing" AI should consider its implications for human rights.

"Artificial intelligence transforms everything around us; every industry, our health, our education," explained Aleksandra Przegalinska-Skierkowska, assistant professor at Kozminski University and research fellow for Collective Intelligence at MIT. "Especially if we want autonomous vehicles or virtual agents, we need a code of conduct for them."

We are at a point when people have begun to reflect on issues related to machine ethics and morality, she added. Building a structure for ethical AI systems should be a collaborative effort, especially as more businesses generate connected products.

"From the perspective of a company selling digital services, we should put one very important thing at the center of our attention, this is a customer using the AI," said Petri. "What we need is the trust of users in every technical system. If we don't have they trust, we don't have users."

The discussion of regulatory measures soon turned to threat actors who will break them. Almost every technology is dual-usage and can be weaponized, Zybertowicz pointed out. "We are here talking about rules, but we are dealing with a group of bad actors who don't play by the rules," said Petri. "The bad guys are innovating faster than the good guys."

Dark Reading:

You Might Also Read: 

Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent:

 

« Unstructured Data: Threats You Cannot See
Robots Could Join The Ukrainian Conflict »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.