SlideShare a Scribd company logo
1
SECURITY AND GOVERNANCE
FOR GENERATIVE AI
http://AGATSoftware.ai
SECURITY
GOVERNANCE
THE
PROBLEMS
Usage control and data
protection concerns limit
companies from leveraging
Generative AI.
1 in 3 enterprises prohibit using
public Generative AI
Source : Gartner 2023
AI Governance webinar
Connecting AI models to company data can lead to
data privacy violations
AI models and applications aren’t innately reliable and
secure.
Employees rely on AI for business operations.
can lead to Business Financial or reputational harm
3
Solution Overview
• Governance:
Risk management Firewall ensuring Compliance
and Responsible AI usage with real-time AI usage
control.
• Security:
Securely use AI with zero data exposure
with a private AI solution.
Empower users with responsible and secure AI
for generating insights from your company’s data.
Cloud AI Services
AI Firewall
Gemini Copilot
ChatGPT Custom AI
Private AI
Local AI Services
BusinessGPT
AI Firewall
Gemini Copilot
ChatGPT Custom AI
5
BusinessGPT AI Firewall
Audit and monitoring AI usage
Measure risk based on defined company
policies.
Manage risks by defining rules
blocking/allowing AI usage.
Compliance – Maintain compliance with
regulations like EU AI ACT and AI RMF.
Define Responsible AI for your company.
AI Governance for on-prem and public service like ChatGPT
Mitigating AI risks with visibility and control of AI
usage
6
BusinessGPT Supported Use Cases
6
Questions & documents
ChatGPT
Gemini
Copilot
Custom
AI
In-house AI
Third-party AI
External user
Internal user
Connecting company data
Using public Chatbots
Grounding
Using custom systems
1
4
3
2
Sales/support
Chatbot
Using Company Chatbot
Internal user
7
AI Firewall
Auditing Policies
Responsible AI by Safeguard and Monitoring Risks
Data Classification
Monitor and
measure usage.
Data Classification
Usage classification
Define risks and actions
for AI usage
Firewall modules
AI Firewall for Risk Management and Prevention
Record every question/answer
AUDITING
Automatic usage classification by
topics
Identify usage risk levels per
user
8
AI GOVERNANCE FEATURES
AI POLICIES
Define action – Block/Allow
Define risk-based company AI usage
policies
Inspect and apply rules based on source
data and Q&A content.
Set rules per user/ group
Permitted / Forbidden Access
Regular expression
Natural language AI
System rules (PII, HIPPA, Finance, Self-
harm, Sexual , Violence etc)
Content Sensitivity classification
Company Data Sensitivity level
Questions and answers topics
Questions and answers categories
DATA CLASSIFICATION
Classification of data and Q&A
Use data classification for policy risk
AI Usage detection and
classification
9
Benefits of BusinessGPT
Control AI usage across platforms:
ChatGPT, Gemini, Copilot, Internal and external
AI systems
Secure sensitive data by regulations
PII, HIPPA, Finance
Mitigate OWASP risks:
Prompt injection, Prompt leak, Jailbreak,
DDoS.
Manage AI Usage:
Users, Content, Activity
Handle risks:
Reputational damage, IP lost, Financial
Business Loss
Meet industry standards:
NIST AI RMF and ISO standards.
Implement AI Governance
Internal Policies
Meet industry standards:
NIST AI RMF (Risk
Management Framework) and ISO
42001 (Artificial intelligence
Management system)
10
BusinessGPT Governance Topologies
Forward traffic to BusinessGPT Proxy
Captures all browsers and applications
BusinessGPT
API Service
Existing AI System
Network Proxy Browser Extension
AI Firewall
Service API
Connect your AI system with
restAPI
Open Ai
Copilot
Gemini
Open Ai
Copilot
Gemini
BusinessGPT
Proxy
BusinessGPT
Firewall
Browsers and
apps
Browsers
BusinessGPT
Private AI
12
Secure on-prem/ Private Cloud.
Data does not leave company control.
Data connectors – Grounding.
Connect to main company data sources
Manage sensitivity classification.
Prevent the use of sensitive data in AI
Sync source Access Control permissions
Generate answers based on data access.
Private AI module- Capabilites
End-to-end private AI solution
BusinessGPT Private AI
Supported Data Sources
Microsoft:
Teams chats, Team
channels, Teams
meeting transcripts,
One Drive,
SharePoint, Email
(Exchange /Outlook),
Planner.
Google:
Meeting
transcripts, Drive,
Gmail.
Slack:
Channels,
Chats.
Zoom:
Meeting
transcripts.
Webex:
Spaces, Direct
messages,
Meeting
transcripts.
CRM & Tasks
Planner,
Monday, Asana
Coming soon:
Secure AI on prem topology
14
AI Models supported:
• Mistral
• Llama2
Start your
AI Business Journey
Contact Details:
www.agatsoftware.ai

More Related Content

Similar to BusinessGPT - Security and Governance for Generative AI

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
HajeJanKamps
 
Common - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptxCommon - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptx
Alok Ranjan
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AITrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
David J Rosenthal
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
Maarten Werff
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
Darryl Miles
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
Gokul Alex
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
UlfMattsson7
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
ResearchFox
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
John M Walsh
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays
 

Similar to BusinessGPT - Security and Governance for Generative AI (20)

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
PDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdfPDT 88 - 4 million seed - Seed - Protecto.pdf
PDT 88 - 4 million seed - Seed - Protecto.pdf
 
Common - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptxCommon - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptx
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AITrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AI
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020Imagining Intelligent Information Machines for 2020
Imagining Intelligent Information Machines for 2020
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
 

Recently uploaded

Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 

Recently uploaded (20)

Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 

BusinessGPT - Security and Governance for Generative AI

  • 1. 1 SECURITY AND GOVERNANCE FOR GENERATIVE AI http://AGATSoftware.ai
  • 2. SECURITY GOVERNANCE THE PROBLEMS Usage control and data protection concerns limit companies from leveraging Generative AI. 1 in 3 enterprises prohibit using public Generative AI Source : Gartner 2023 AI Governance webinar Connecting AI models to company data can lead to data privacy violations AI models and applications aren’t innately reliable and secure. Employees rely on AI for business operations. can lead to Business Financial or reputational harm
  • 3. 3 Solution Overview • Governance: Risk management Firewall ensuring Compliance and Responsible AI usage with real-time AI usage control. • Security: Securely use AI with zero data exposure with a private AI solution. Empower users with responsible and secure AI for generating insights from your company’s data. Cloud AI Services AI Firewall Gemini Copilot ChatGPT Custom AI Private AI Local AI Services
  • 5. 5 BusinessGPT AI Firewall Audit and monitoring AI usage Measure risk based on defined company policies. Manage risks by defining rules blocking/allowing AI usage. Compliance – Maintain compliance with regulations like EU AI ACT and AI RMF. Define Responsible AI for your company. AI Governance for on-prem and public service like ChatGPT Mitigating AI risks with visibility and control of AI usage
  • 6. 6 BusinessGPT Supported Use Cases 6 Questions & documents ChatGPT Gemini Copilot Custom AI In-house AI Third-party AI External user Internal user Connecting company data Using public Chatbots Grounding Using custom systems 1 4 3 2 Sales/support Chatbot Using Company Chatbot Internal user
  • 7. 7 AI Firewall Auditing Policies Responsible AI by Safeguard and Monitoring Risks Data Classification Monitor and measure usage. Data Classification Usage classification Define risks and actions for AI usage Firewall modules AI Firewall for Risk Management and Prevention
  • 8. Record every question/answer AUDITING Automatic usage classification by topics Identify usage risk levels per user 8 AI GOVERNANCE FEATURES AI POLICIES Define action – Block/Allow Define risk-based company AI usage policies Inspect and apply rules based on source data and Q&A content. Set rules per user/ group Permitted / Forbidden Access Regular expression Natural language AI System rules (PII, HIPPA, Finance, Self- harm, Sexual , Violence etc) Content Sensitivity classification Company Data Sensitivity level Questions and answers topics Questions and answers categories DATA CLASSIFICATION Classification of data and Q&A Use data classification for policy risk AI Usage detection and classification
  • 9. 9 Benefits of BusinessGPT Control AI usage across platforms: ChatGPT, Gemini, Copilot, Internal and external AI systems Secure sensitive data by regulations PII, HIPPA, Finance Mitigate OWASP risks: Prompt injection, Prompt leak, Jailbreak, DDoS. Manage AI Usage: Users, Content, Activity Handle risks: Reputational damage, IP lost, Financial Business Loss Meet industry standards: NIST AI RMF and ISO standards. Implement AI Governance Internal Policies Meet industry standards: NIST AI RMF (Risk Management Framework) and ISO 42001 (Artificial intelligence Management system)
  • 10. 10 BusinessGPT Governance Topologies Forward traffic to BusinessGPT Proxy Captures all browsers and applications BusinessGPT API Service Existing AI System Network Proxy Browser Extension AI Firewall Service API Connect your AI system with restAPI Open Ai Copilot Gemini Open Ai Copilot Gemini BusinessGPT Proxy BusinessGPT Firewall Browsers and apps Browsers
  • 12. 12 Secure on-prem/ Private Cloud. Data does not leave company control. Data connectors – Grounding. Connect to main company data sources Manage sensitivity classification. Prevent the use of sensitive data in AI Sync source Access Control permissions Generate answers based on data access. Private AI module- Capabilites End-to-end private AI solution
  • 13. BusinessGPT Private AI Supported Data Sources Microsoft: Teams chats, Team channels, Teams meeting transcripts, One Drive, SharePoint, Email (Exchange /Outlook), Planner. Google: Meeting transcripts, Drive, Gmail. Slack: Channels, Chats. Zoom: Meeting transcripts. Webex: Spaces, Direct messages, Meeting transcripts. CRM & Tasks Planner, Monday, Asana Coming soon:
  • 14. Secure AI on prem topology 14 AI Models supported: • Mistral • Llama2
  • 15. Start your AI Business Journey Contact Details: www.agatsoftware.ai

Editor's Notes

  1. vv