Generative AI – Block, Allow…or Educate?

Neil Thacker, CISO EMEA, Netskope

The use of Generative AI apps in the enterprise continues to grow monthly and the increase in sensitive data being posted to apps and services continues to increase. So what is the answer? With businesses demanding they need to utilise the latest technical advancements from GenAI, how does an organisation protect themselves from services that may misuse the data beyond the usual block or allow control.

Join Neil Thacker, CISO EMEA for Netskope, as he discusses the latest findings in Netskope’s “AI Apps in the Enterprise” study conducted over the past 6 months to identify how organisations are controlling these services today and what the optimal future strategy looks like in the form of block, allow and/or educate.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

What’s New In The Cato CTRL SASE Threat Report?
Cato’s Cyber Threat Research Lab (Cato CTRL) recently unveiled its first SASE threat report, issuing a comprehensive and exhausting insight into issues and insights with enterprise and network threats.  Based on Cato’s ability to analyse networks extensively and granularly, the report pinpoints threats by combining strategic, tactical, and operational standpoints via the MITRE ATT&CK framework....
Platform-Wide AI and Enterprise Security: The Recall Issue
Whenever an AI product due for rollout is delayed suddenly, many questions begin circulating in the media. The official reasoning why will open the floodgates of many people online spouting their ideas of what the problem has been. Microsoft has recently revealed the delay of their controversial artificial intelligence (AI) powered Recall feature for Copilot+PCs....
Enterprise Security
Incognito Mode Won’t Protect Your Enterprise Security
Many enterprises have set a precedent that online browsing within IT departments or other company-based computers should be performed under incognito windows, such as those offered by Google Chrome browsers and other providers. While online search and work activity may feel secure with your identity and preferences set to a private mode, according to research...