
The CISO's Guide to Securing Artificial Intelligence
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $14.99
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Virtual Voice
-
By:
-
Russell Nomer

This title uses virtual voice narration
About this listen
With the rapid adoption of AI across industries, it is imperative for organizations to understand and address the unique security challenges associated with this transformative technology. This book offers a deep dive into the AI threat landscape, including targeted attacks, data poisoning, evasion attacks, and more. Readers will gain a comprehensive understanding of the vulnerabilities in AI algorithms and models and learn techniques to mitigate these risks.
"The CISO's Guide to Securing Artificial Intelligence" emphasizes the importance of incorporating security into the AI development life cycle, outlining best practices for integrating security requirements at each stage. From secure coding and model development practices to collaboration between security and AI teams, readers will discover practical approaches to building robust and resilient AI systems.
Furthermore, the book explores the ethical and privacy concerns surrounding AI and provides guidance on ensuring fairness, accountability, and transparency in AI decision-making processes. It delves into privacy risks, data protection, and compliance with regulations, enabling readers to establish privacy-centric AI governance frameworks.
"The CISO's Guide to Securing Artificial Intelligence," authored by Russell D. Nomer, CISSP and published by Russell Nomer Consulting, Inc., also addresses the management of third-party AI providers, emphasizing the evaluation, assessment, and monitoring of their security practices. It equips CISOs with the knowledge to select trustworthy vendors and establish robust contractual agreements that prioritize security and data privacy.
Throughout the book, real-world examples, case studies, and practical recommendations illustrate the concepts, making it accessible to both technical and non-technical readers. Whether you are a cybersecurity professional, CISO, or an executive responsible for AI initiatives, this guide empowers you to proactively secure AI systems, protect sensitive data, and navigate the ethical and privacy challenges associated with AI adoption.
Stay ahead of the rapidly evolving AI threat landscape and safeguard your organization's AI investments with "The CISO's Guide to Securing Artificial Intelligence" by Russell D. Nomer, CISSP. Published by Russell Nomer Consulting, Inc., it is a trusted resource that combines expertise and practical advice to help you confidently navigate the intersection of AI and cybersecurity, ensuring the integrity, privacy, and trustworthiness of your AI systems.
Pre-order your copy today and gain exclusive access to practical insights, real-world examples, and expert recommendations to safeguard your organization's AI investments. With its in-depth coverage of AI security risks, mitigation strategies, and privacy considerations, this book is a must-have resource for anyone involved in AI implementation and security.
In addition to the book, Russell Nomer offers consulting and advisory services tailored to your organization's specific needs. Leverage his extensive experience and expertise to assess your AI security posture, develop robust governance frameworks, and establish effective collaboration between security and AI teams.
People who viewed this also viewed...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- By: Taimur Ijlal
- Narrated by: Sean Oblak
- Length: 1 hr and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced. However, this topic can be quite challenging for newcomers who want to understand the governance and cyber-security risks that AI introduces. This book assumes zero prior knowledge of AI or machine learning and explains in an easy-to-understand way how to govern and secure AI.
-
-
Recommended for anyone who is interested in Artificial Intelligence
- By Anonymous User on 07-18-22
By: Taimur Ijlal
-
Artificial Intelligence for Dummies
- By: John Mueller, Luca Massaron
- Narrated by: Chris Sorensen
- Length: 13 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll get a clear overview of artificial intelligence technology, the common misconceptions surrounding it, and a fascinating look at its applications in everything from self-driving cars and drones to its contributions in the medical field.
-
-
Outdated
- By Timothy C. on 05-31-23
By: John Mueller, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
-
-
This is cyber security not minority politics.
- By Mama on 02-06-25
By: Helen Patton
-
Cyber Python
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 17 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
From the author "Python Programming" comes "Cyber Python," a book that offers a comprehensive guide to cybersecurity tailored for Python programmers, yet remains accessible to those using other languages. This book covers Blue Team defensive strategies, Red Team offensive techniques, and Purple Team integration, blending practical coding examples with in-depth theoretical insights. Designed for advanced students and professionals in computer science and cybersecurity, this book equips readers with the skills to identify, counter, and mitigate cyber threats effectively, regardless of their ...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
Artificial Intelligence (AI) Governance and Cyber-Security
- A Beginner’s Handbook on Securing and Governing AI Systems
- By: Taimur Ijlal
- Narrated by: Sean Oblak
- Length: 1 hr and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
Artificial Intelligence (AI) is causing massive changes in our lives, both at the individual and societal level, with the global AI market expected to reach around 126 billion US dollars by 2025. As more and more decision-making moves to AI systems, unique risks are being introduced. However, this topic can be quite challenging for newcomers who want to understand the governance and cyber-security risks that AI introduces. This book assumes zero prior knowledge of AI or machine learning and explains in an easy-to-understand way how to govern and secure AI.
-
-
Recommended for anyone who is interested in Artificial Intelligence
- By Anonymous User on 07-18-22
By: Taimur Ijlal
-
Artificial Intelligence for Dummies
- By: John Mueller, Luca Massaron
- Narrated by: Chris Sorensen
- Length: 13 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this audiobook, you'll get a clear overview of artificial intelligence technology, the common misconceptions surrounding it, and a fascinating look at its applications in everything from self-driving cars and drones to its contributions in the medical field.
-
-
Outdated
- By Timothy C. on 05-31-23
By: John Mueller, and others
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
-
-
This is cyber security not minority politics.
- By Mama on 02-06-25
By: Helen Patton
-
Cyber Python
- By: Jean-Jacques Reibel
- Narrated by: Virtual Voice
- Length: 17 hrs and 22 mins
- Unabridged
-
Overall
-
Performance
-
Story
From the author "Python Programming" comes "Cyber Python," a book that offers a comprehensive guide to cybersecurity tailored for Python programmers, yet remains accessible to those using other languages. This book covers Blue Team defensive strategies, Red Team offensive techniques, and Purple Team integration, blending practical coding examples with in-depth theoretical insights. Designed for advanced students and professionals in computer science and cybersecurity, this book equips readers with the skills to identify, counter, and mitigate cyber threats effectively, regardless of their ...