This article is based on a presentation at the Fall 2023 Institute of Business Analytics Conference on Generative AI and Cybersecurity: Navigating the New Era of Threats and Safeguards by Alie Fordyce, a product policy manager at Robust Intelligence. If you ask Alie Fordyce, product policy manager for Robust Intelligence, there’s a readiness gap in… Read more »
Information Systems
Assessing the Vulnerabilities of the Open-Source AI Landscape: A Large-Scale Analysis of the Hugging Face Platform
This article is based on a presentation at IBA’s Fall 2023 Analytics Conference on Generative AI & Cybersecurity by Ben Lazarine, Kelley Doctoral Student and part of Kelley’s Data Science and Artificial Intelligence Lab (DSAIL). In the past few years, access to artificial intelligence models has been democratized as the AI community has leveraged open-source… Read more »
Panel Discusses Best Practices in Cybersecurity Data Sharing and Governance
This article is based on a panel discussion at IBA’s Fall 2022 Analytics Conference on Cybersecurity. This panel featured comments from Wayne Selk, Executive Director of CompTIA Information Sharing and Analysis Organization (ISAO) and Vice President of Cybersecurity Programs, Susannah Hope, manager in Deloitte’s Risk and Financial Advisory practice, and Kim Milford, who served as… Read more »
Moving From Subjective to Objective Measurements of Mental Health
This article is based on a presentation at IBA’s 2023 Spring Conference on Healthcare Analytics by Sagar Samtani, Assistant Professor of Operations and Decision Technologies, Weimer Faculty Fellow and Director of Kelley’s Data Science and Artificial Intelligence Lab (DSAIL). Sagar Samtani admitted during his presentation during the Spring 2023 Institute of Business Analytics Conference on… Read more »
The Shortcomings of Modern Authentication Mechanisms
This is article is based on a presentation given by Tom Stewart, Senior Director of Protiviti’s Attack and Penetration team at IBA’s 2022 Analytics Conference on Cybersecurity. In 2017, Tom Stewart, the now Senior Director of Protiviti’s Attack and Penetration team, wrote an article titled “The 8 Character Password is Dead.” In the article, Stewart… Read more »
Panel Explores Opportunities, Challenges, and Career Opportunities in NLP
This article is based on a panel discussion at IBA’s Fall 2022 Analytics Conference on Cybersecurity including Scott Curtis, VP of Service Delivery at Deloitte Consulting, Greg Hayworth, Associate VP of Enterprise Data Science at Humana, Ergin Soysal, Senior Advisor – NLP, Eli Lilly & Company and Akanksha Mansharamani, M.S. in Information Systems student and… Read more »
The Future of Analytics in Cybersecurity
This article is based on a presentation at IBA’s Analytics Conference on Cybersecurity given by Scott Shakelford, Professor of Business Law & Ethics; Executive Director, Ostrom Workshop; Director, Ostrom Workshop Program on Cybersecurity & Internet Governance; Executive Director, Center for Applied Cybersecurity Research; Provost Professor. According to Scott Shackelford, Professor of Business Law and Ethics… Read more »
Measuring Adversarial Attacks Against Deep Learning Models
This article features the work of Sagar Samtani, Assistant Professor of Operations and Decision Technologies; Weimer Faculty Fellow; Director, Kelley’s Data Science and Artificial Intelligence Lab (DSAIL) at the Kelley School of Business. As machine learning has advanced, Deep Learning (DL) models, which are used to perform machine learning that is inspired by the structure of… Read more »
The Security of Machine Learning: A Risk Management Perspective
This article is based on a presentation at IBA’s Analytics Conference on Cybersecurity given by Hyrum Anderson, Distinguished Engineer at Robust Intelligence. If you ask Dr. Hyrum Anderson, Artificial Intelligence (AI) is eating the world. AI capabilities are being adopted at a rapid pace. According to Anderson, Distinguished Engineer at the machine learning integrity platform… Read more »