Account
Orders
Advanced search
A Roadmap for Secure, Responsible, and Resilient AI Adoption
Louise Reader
Read on Louise Reader App.
AI will fundamentally change the way business is conducted across most industries. Organizations that excel at leveraging secure, responsible AI to advance their strategic objectives will have a distinct advantage. Those that do not may see their market share erode.
This book provides a guide for organizations to integrate AI in alignment with the organization's strategic goals. The framework provides a roadmap for adopting secure, responsible, and resilient AI, from initial strategy development to ongoing operations that will help advance market leadership.
Part one of the book discusses laying a solid foundation to ensure successful AI integration, beginning with developing an AI strategy aligned with strategic business objectives, such as product and service differentiation, market expansion, and process optimization.
Part Two takes a deep dive into ensuring secure and safe AI adoption. It proposes a secure-by-design approach to AI development that considers AI-specific attack vectors and associated security practices throughout the AI lifecycle.
Developing and deploying secure, responsible, and resilient AI is not a one-time effort. Therefore, Part Three discusses operationalizing AI and integrating it throughout the enterprise to ensure continued success. This section focuses on scaling AI applications and continuous improvement, including establishing metrics and conducting a post-deployment ROI evaluation. Finally, it discusses how to foster a culture of AI innovation and excellence, ensuring that AI becomes a way of doing business.
What You Will Learn:
Who This Book is for:
The primary audience includes business leaders, AI practitioners, AI executives, AI governance professionals, and cybersecurity leaders looking to integrate AI as a strategic differentiator and to enhance business operations. Higher education would be a secondary audience.
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
This ebook is DRM protected.
LCP system provides a simplified access to ebooks: an activation key associated with your customer account allows you to open them immediately.
ebooks downloaded with LCP system can be read on:
Adobe DRM associates a file with a personal account (Adobe ID). Once your reading device is activated with your Adobe ID, your ebook can be opened with any compatible reading application.
ebooks downloaded with Adobe DRM can be read on:
mobile-and-tablet To check the compatibility with your devices,see help page
Donnie Wendt is a distinguished AI and cybersecurity professional with extensive expertise in researching security threats and pioneering innovative solutions. He is the author of The Cybersecurity Trinity: AI, Automation, and Active Cyber Defense (Apress) and co-author of the AI Adoption and Management Framework. He has broad practical experience implementing AI and cybersecurity solutions and is an accomplished presenter on AI adoption, securing machine learning, and security automation. In addition to his professional experience, Donnie is an adjunct professor of cybersecurity at Utica University. He earned a Doctorate in Computer Science from Colorado Technical University and a Master's in Cybersecurity from Utica University. Donnie is a Certified Information Systems Security Professional (CISSP) and AI Governance Professional (AIGP).
The initial concept for the book arose from Donnie's cybersecurity-focused AI research and his work as a fractional Chief AI Officer for clients. Donnie, an AI enthusiast, recognized the promise of AI to improve businesses across all industries; however, due to his extensive cybersecurity background, he understood the new attack vectors this might open. Also, he saw that many companies did not know where or how to start with AI integration. Therefore, Donnie created this guide to assist organizations to excel by aligning AI integration with strategic objectives while ensuring secure and responsible AI usage.
Sign up to get our latest ebook recommendations and special offers