AI Revolutionizing Governance, Risk, and Compliance (GRC) in the Modern World | Cyber Security

Skillweed
26 Feb 202423:44

Summary

TLDRThe speaker leads an interactive session on leveraging AI tools like Chat GPT for security incident analysis, policy compliance, and employee training. They demonstrate how to use prompts to analyze data from security incident reports, identify policy deficiencies concerning GDPR, and assess vendor risk. The session emphasizes the importance of hands-on practice with these tools for real-time data analysis and decision-making in cybersecurity.

Takeaways

  • 🔐 The session focused on utilizing AI tools like Chat GPT for analyzing security incidents, policy changes, and compliance.
  • 📈 AI can be prompted to identify patterns and provide recommendations for incident containment strategies and employee training.
  • 📊 AI tools can analyze compliance data to highlight trends and suggest best practices for improving compliance within an organization.
  • 📋 The script demonstrated how to use AI to review and suggest improvements to IT policies, specifically regarding GDPR compliance.
  • 🔗 AI can map cybersecurity policies to industry frameworks like ISO 27001 or NIST CSF, aiding in policy benchmarking and alignment.
  • 🛠 AI can analyze vulnerability reports to recommend fixes and help in developing incident response strategies.
  • 📝 The session showcased real-time analysis of sample security incident reports, policy changes, and employee training data using AI.
  • 💡 AI's ability to analyze large datasets and provide actionable insights was emphasized, highlighting its potential in cybersecurity and compliance.
  • 💼 The speaker encouraged the use of AI tools for practical exercises to enhance understanding and proficiency in leveraging these technologies.
  • 📢 The importance of hard work, discipline, and commitment was stressed over seeking shortcuts or guarantees of success in professional development.

Q & A

  • What is the main focus of the working session described in the transcript?

    -The main focus of the working session is to explore the use of AI tools, specifically for analyzing security incidents, policy changes, compliance reviews, and other cybersecurity-related tasks.

  • What does the speaker suggest using CHUT for in the context of security incidents?

    -The speaker suggests using CHUT for baseline recommendations on policy changes, containment strategies for security incidents, and employee training.

  • How can CHUT be utilized for compliance reviews according to the transcript?

    -CHUT can be used to analyze compliance data and provide trends on best practices to ensure people are more in compliance based on the data available.

  • What is the purpose of mapping cyber policies to industry frameworks as mentioned in the transcript?

    -Mapping cyber policies to industry frameworks like ISO 27001 or NIST CSF is done to benchmark a cybersecurity policy against certain industry standards for alignment and effectiveness.

  • What is the benefit of mapping vulnerabilities to recommendations as discussed?

    -Mapping vulnerabilities to recommendations allows for the identification of patterns and provides a strategy on how to fix known vulnerabilities, enhancing security measures.

  • How does the speaker propose analyzing incident response reports?

    -The speaker proposes analyzing incident response reports by uploading the data into CHUT and prompting it to analyze the data for patterns and trends in real-time.

  • What is the significance of the speaker's mention of using CHUT for policy compliance with GDPR?

    -The mention of using CHUT for GDPR compliance signifies the tool's capability to review and identify any deficiencies in existing policies concerning GDPR regulations, ensuring data protection standards are met.

  • What is the 'data analyst' tool mentioned in the transcript and how is it used?

    -The 'data analyst' tool is an AI feature within CHUT that allows users to upload documents and analyze data for patterns, trends, and recommendations without manual data entry.

  • Why does the speaker recommend subscribing to the premium version of CHUT?

    -The speaker recommends the premium version of CHUT because it offers advanced features like data analysis, which is crucial for handling real-time data analysis tasks in cybersecurity.

  • What is the GRC CL program mentioned in the transcript and how can one register for it?

    -The GRC CL program is a professional development course, and one can register for it through the SKI.com site by viewing all courses and selecting the appropriate program.

  • What is the speaker's stance on guarantees and shortcuts in professional development?

    -The speaker emphasizes that there are no guarantees or shortcuts for success in professional development. They advocate for hard work, discipline, and commitment as the keys to achieving excellence.

Outlines

00:00

🔐 Utilizing AI for Cybersecurity and Compliance

The speaker introduces a session focused on utilizing AI for cybersecurity and compliance tasks. They discuss using AI to baseline security policies, adapt to policy changes, and provide recommendations based on new regulations. The AI can analyze security incidents, suggest containment strategies, and assist with employee training for compliance. It can also review compliance data to identify trends and best practices. Additionally, the AI can map cyber policies to industry frameworks like ISO 27001 or NIST CSF 2.0, and provide recommendations for fixing known vulnerabilities. The speaker emphasizes the ability to analyze incident reports and policy changes in real-time, showcasing the practical application of AI in cybersecurity management.

05:01

📊 Real-Time Data Analysis with AI

The speaker demonstrates how AI can be used to analyze data in real-time without the need for manual copying and pasting. They explain that by uploading a file into an AI tool like Chat GPT, the AI can analyze the data and provide insights. The speaker illustrates this by showing how to use the AI to analyze security incidents, identify patterns, and suggest mitigation strategies. They also discuss how AI can be used to review policy changes for compliance with regulations like GDPR, and how it can analyze employee training and compliance data to suggest improvements. The speaker highlights the efficiency and power of AI in handling large datasets and providing actionable insights.

10:01

🖥️ Demonstrating AI's Data Analysis Capabilities

The speaker shares a live demonstration of using AI to analyze a document, specifically focusing on security incidents. They show how to prompt the AI to analyze the document and provide known patterns, such as types of threats and their impact. The AI is shown to summarize and contextualize the data, making it easier for users to understand and act upon. The speaker also discusses how the AI can analyze policy changes, employee training data, and vendor risk assessments to provide recommendations. The demonstration aims to showcase the practical application of AI in analyzing and deriving insights from complex data sets.

15:04

💼 Emphasizing the Importance of Hard Work and Discipline

The speaker transitions to discussing the importance of hard work, discipline, and commitment in professional development. They stress that there are no shortcuts to success and that putting in the effort is crucial for achieving excellence. The speaker discourages seeking easy ways out, such as asking for help with exams or interviews, and instead encourages taking pride in one's work and being committed to continuous learning and improvement. They also mention the GRC CL program, highlighting its value and the need for registration to access its materials. The speaker concludes by urging participants to maintain high standards and to hold themselves accountable for their growth and success.

20:05

🚀 Encouraging Excellence and Self-Reliance

In the final paragraph, the speaker continues to emphasize the values of excellence, quality, and self-reliance. They make it clear that the community they are part of does not support mediocrity and that there is no room for games or shortcuts. The speaker passionately advocates for individuals to take pride in their work, to be disciplined, and to be committed to their craft. They also mention that they do not support or participate in activities that undermine the integrity of learning and professional growth, such as assisting with exams or interviews. The speaker concludes by encouraging everyone to keep striving for greatness and to enjoy their weekend, reflecting the community's focus on balance and well-being alongside professional development.

Mindmap

Keywords

💡Security Incidents

Security incidents refer to events that compromise the integrity, availability, or confidentiality of a system. In the context of the video, the speaker discusses analyzing security incident reports to identify patterns and types of threats, which is crucial for developing effective containment strategies and enhancing overall security measures.

💡Policy Changes

Policy changes involve updates or modifications to existing rules and regulations within an organization. The video script mentions using AI tools to baseline and review policy changes, particularly in relation to compliance with regulations like GDPR. This process ensures that the organization's policies remain up-to-date and adhere to legal requirements.

💡Compliance

Compliance refers to an organization's adherence to laws, regulations, and guidelines that govern its operations. The speaker in the video talks about using AI to analyze compliance data and identify trends to ensure that employees are following the necessary protocols and standards.

💡Vendor Risk Assessment

Vendor risk assessment is the process of evaluating the potential risks associated with doing business with third-party vendors. The video script includes an example where the AI is asked to review a vendor risk assessment report and provide recommendations for mitigating identified risks, which is essential for managing the security and reliability of external partnerships.

💡Cybersecurity Frameworks

Cybersecurity frameworks are structured sets of guidelines, procedures, and best practices aimed at helping organizations manage cybersecurity risks. The script discusses mapping cybersecurity policies to industry frameworks like ISO 27001 or NIST CSF, which allows organizations to benchmark their security posture against recognized standards.

💡Vulnerabilities

Vulnerabilities are weaknesses in a system that can be exploited by attackers. The video mentions mapping known vulnerabilities to recommendations for fixing them, which is a critical step in proactive cybersecurity management. Identifying and addressing vulnerabilities helps to prevent potential security breaches.

💡Incident Response

Incident response is the process of addressing and managing the aftermath of a security breach or incident. The speaker in the video talks about analyzing incident response reports to understand the effectiveness of containment strategies and to improve future responses to similar incidents.

💡Employee Training

Employee training refers to the process of educating and preparing staff to perform their job tasks effectively and efficiently. In the context of the video, the AI is used to analyze training data and suggest ways to increase completion rates, highlighting the importance of continuous learning and development in maintaining a secure workplace.

💡Data Protection

Data protection involves采取措施来确保数据不被未授权访问、泄露、篡改或破坏。在视频中,提到了数据保护部分,特别是在讨论GDPR合规性时,强调了实施加密标准以保护个人数据的重要性,这体现了数据保护在维护信息安全中的核心作用。

💡AI Tools

AI tools are software applications that utilize artificial intelligence to perform tasks, such as data analysis, pattern recognition, and predictive modeling. The video script showcases the use of AI tools like Chat GPT to analyze various reports and data sets, demonstrating how these tools can streamline processes and provide valuable insights in the field of cybersecurity.

💡GDPR

GDPR stands for the General Data Protection Regulation, a regulation in EU law on data protection and privacy for individuals within the European Union and the European Economic Area. The video discusses the importance of ensuring policy compliance with GDPR, which includes requirements for protecting personal data and obtaining consent for its use.

Highlights

Introduction to using AI for security incident analysis and policy change recommendations.

Utilizing AI to baseline new policies and provide recommendations for regulation changes.

AI assistance in developing containment strategies for security incidents.

Employee training and compliance review through AI analysis of data trends.

AI's role in vendor risk assessment and providing mitigation strategies.

Mapping cybersecurity policies to industry frameworks using AI.

AI's capability to analyze and provide recommendations from incident response reports.

Demonstration of real-time AI analysis of a sample security incident report.

AI's application in identifying policy deficiencies concerning GDPR compliance.

Using AI to analyze vulnerabilities and suggest fixes based on known issues.

AI's potential in automating the analysis of large volumes of compliance data.

The importance of using AI tools like Data Analyst for real-time data analysis.

Practical demonstration of AI analyzing security incident patterns from a document.

AI's ability to suggest containment strategies for security incidents based on data.

AI's utility in increasing employee compliance rates through data analysis.

AI's role in vendor risk assessment and providing overall risk posture.

Mapping vulnerabilities to industry standards using AI for better cybersecurity.

Encouragement for participants to practice using AI tools for data analysis.

Discussion on the availability of AI models for personal use and their potential impact.

Emphasis on the importance of hard work and discipline for success in using AI tools.

Information on upcoming GRC CL program and its registration process.

Clarification on the no guarantee policy and the focus on excellence and quality in training.

Final thoughts on the commitment to excellence and the refusal to support shortcut methods.

Transcripts

play00:00

all right once again thank you everybody

play00:01

so what we're going to do is just going

play00:02

to be a working session and we're just

play00:04

going to see some of those prompts out

play00:06

there some of those um best practices

play00:07

out there so first I talked about

play00:10

security incidents policy changes if

play00:12

there are new policies out there we can

play00:14

use chut to Baseline and give us some of

play00:17

the um recommendations in terms of those

play00:19

changes in regulation we talk about

play00:22

security incident so if I have a dump of

play00:24

security incident I could ask it to give

play00:27

me some of the best practice of

play00:29

containment strategy for those

play00:31

recommendation employee training

play00:33

compliance review I can actually look at

play00:35

all our compliance data and ask chat J2

play00:38

to give me a trend on some of the best

play00:41

practices in terms of how to make sure

play00:43

people are more in compliance based on

play00:45

the data I have I can also look at

play00:47

vendor risk assessment report I can look

play00:49

at mapping cyber policies to best

play00:52

framework out there so I can actually

play00:54

take a cyber security policy

play00:57

and ask

play01:00

GPT or any of those model to Benchmark

play01:04

it

play01:05

to certain industry framework and that

play01:08

can be ISO 27,1 that could be n CSF 2.0

play01:12

whatever it is you could actually use it

play01:14

for any mapping you choose to do so

play01:18

that's really cool another thing out

play01:20

there is that we can actually map

play01:22

vulnerabilities and say okay based on

play01:25

these known vulnerabilities out there

play01:27

map it to give me recommendation on how

play01:30

to fix those vulnerabilities you know

play01:33

incident report incident response report

play01:35

you can actually also you know analyze

play01:38

an incident response report so let's

play01:40

quickly just go through each one of

play01:41

these and we can play with it on in real

play01:43

time so you can see here this is a

play01:45

sample security incident report here you

play01:48

can see this is just talking about okay

play01:50

this is the incident number this is the

play01:52

type of threat this is the affected

play01:54

asset remember it to show you the actual

play01:57

digital asset affected then look at the

play01:59

time of occurrence so I can put a prompt

play02:01

to analyze and this is a real prompt I

play02:04

can say analyze this data you

play02:07

know and help identify the current

play02:10

pattern such as specific types of

play02:12

threats you know uh targeting certain

play02:15

assets or occurring at particular so you

play02:17

can prompt it to kind of analyze the

play02:19

data for you and look at the times and

play02:22

look at the threat pattern in real time

play02:25

of course it will not just be 10 they

play02:27

will give you right they might give you

play02:29

the report might be like a, lines right

play02:32

if I have a, line that's a lot to

play02:35

analyze so it means it makes sense to

play02:37

just you know um use a similar prompt to

play02:41

analyze it in real time now look at this

play02:44

other one policy change for example this

play02:46

is just an example I gave to say okay

play02:48

this is an IT policy here in the policy

play02:53

I'm telling CH GPT to say look at what I

play02:55

asked you to this to do review the

play02:58

existing policy and identify any

play03:00

deficiency concerning compliance with

play03:02

gdpr so what it did here is this it

play03:06

reviewed the policy and it went

play03:09

to data protection section right which

play03:12

is up here this section

play03:14

here and it analyzed it and it told me

play03:18

he updated gdpr regulation mandate

play03:19

organization to implement announc

play03:21

encryption standard for protecting

play03:23

personal data it actually gave me a

play03:26

feedback on what we should had so that

play03:30

means if you have a

play03:32

policy and you want to check if it

play03:36

complies with certain regulation you can

play03:38

prompt your policy to check if there was

play03:42

a gap as per an existing regulation out

play03:46

there it's amazing and it will show you

play03:49

yeah it will actually show you you know

play03:52

if there's a gap in your policy

play03:53

immediately okay that's another thing

play03:55

you can use it for now look at another

play03:57

one this is a report that comes out of

play03:59

so many tools I mean there are many

play04:00

tools out there that you can pull this

play04:02

report from we use tools to scan in

play04:05

cyber security for different incidents

play04:08

right so you might be using tools like

play04:11

spun qader internal tools pulling logs

play04:16

whatever it is Nexus whatever it is that

play04:18

is pulling your vulnerabilities or any

play04:20

incident that you've seen in your system

play04:23

you can

play04:24

actually run a prompt to say re review

play04:29

each of the

play04:31

table and create a column for

play04:34

recommendation of the you know

play04:37

identified issue how do we contain it if

play04:40

you have an issue

play04:41

identified like I said many times what

play04:44

you would have done historically would

play04:45

have been you would have gone to start

play04:48

researching from the vendor's

play04:50

website from the vendor's website you

play04:53

will start doing extra research on

play04:56

Google on the best practices but now all

play05:01

I need to do is find the dump of all the

play05:03

issues and incident and I just run a

play05:06

query I don't even need

play05:08

to copy and paste it I'll just upload

play05:11

the file into chat GPT and it would

play05:15

analyze it for me crazy I'll show you

play05:17

guys how to do that okay very very

play05:19

simple it's one of the most

play05:21

underutilized Tools in chat dut we think

play05:25

it's mostly just to copy and paste St

play05:27

and I mean write prompt data but now you

play05:30

can analyze data that is the most

play05:32

powerful crazy tool I've seen you can

play05:34

analyze real data okay you see today all

play05:37

right look at another one you know this

play05:39

is just saying the

play05:41

employee so we have here the employee

play05:44

trading compliance you can see it shows

play05:47

the employee ID completion rate which

play05:49

score the time spent per model I kept it

play05:53

small for the purpose of our exercise in

play05:56

real life this report might be a, lines

play06:00

because most big organization would have

play06:02

many staff so if I have all of this

play06:05

large information of all this staff I

play06:07

could just ask CH GP to analyze and give

play06:10

me you know information about each of

play06:14

these specific report and tell me a

play06:17

pattern tell me a trend it will do it

play06:19

for us amazing amazing all right let me

play06:21

show you another one then once I go

play06:24

through I'm almost done with this then

play06:25

we now get into you'll see the way I do

play06:27

it really cool another thing you see is

play06:29

the you know vendor risk assessment

play06:32

report this is just an example here so

play06:34

you can see this report I can say based

play06:37

on this vendor assessment report can you

play06:39

give me you know tell me the overall

play06:41

risk posture and recommendation to

play06:44

mitigate the risk so I can ask some

play06:46

questions based on this report look at

play06:49

the final one I believe mapping cyber

play06:53

policy to Industry framework you know so

play06:56

this is really getting into you know

play06:59

know um

play07:01

framework you know so you can see here

play07:05

give me one second please all right

play07:07

sorry about that okay so um so anyway

play07:11

this is just showing how we can map

play07:13

different things we can map

play07:14

vulnerabilities here you can see here

play07:16

you know this is a very nice one because

play07:18

what's What's Happening Here is that you

play07:20

can see a vulnerability and say okay

play07:23

based on all this I think this is a very

play07:24

big one actually I've seen this a lot

play07:27

some organization would have all of this

play07:29

vulnerabilities and the challenge is

play07:32

okay what do I do about it man I don't

play07:36

know if you've seen those reports before

play07:37

and honestly I've seen those and at

play07:39

times it will just make you have like a

play07:40

brain freeze because what will happen is

play07:42

that you just realize okay you have all

play07:44

these drunk files um but you just don't

play07:49

have okay what do I do about it but our

play07:53

world has changed Char say okay don't

play07:55

worry we got to come out there's

play07:56

something you can do about it so that's

play07:58

pretty awesome actually so but anyway so

play08:00

you get the gist about that so the other

play08:02

thing is you can look at incident

play08:03

response report and just ask it to help

play08:05

you to analyze stuff all right so now

play08:07

your question is okay you've said you've

play08:10

said all this fancy Big Talk how does it

play08:12

apply to us so you'll see how it applies

play08:14

to us now what I'm going to do is you

play08:17

guys will see in real time the same

play08:19

document we all have we're going to pull

play08:22

this document let me share with you real

play08:23

quick what we're going to do so I want

play08:25

us to go to let's go to

play08:30

all right let's all let me share my

play08:33

screen so you all can see for those of

play08:36

us that never use Str don't stress it

play08:39

not a big deal so just come here you

play08:41

know go to open Ai and but for you to

play08:45

use the tool I want to use you have to

play08:46

use the premium version the gp4

play08:50

typically in our community I always

play08:52

recommend we can actually for the

play08:54

purpose of to play around it and Lear

play08:56

the to I recommend at least play

play09:01

around for like a month just pay $20 for

play09:04

one month to kind of play around it I'll

play09:07

recommend two months to just invest to

play09:09

play around some of these tools honestly

play09:10

it will be worthwhile so let me show you

play09:12

one of the tools that I love a lot it's

play09:14

called analysis so you just come here I

play09:17

hope I'm sharing my screen all right so

play09:20

under chat GPT make sure it's under chat

play09:22

GPT this this is the chuty team there

play09:25

are many tools out there we'll use this

play09:27

tool called Data anal

play09:30

can we all type it if we are seeing it

play09:31

data analyst to data analyst can we type

play09:35

it and just I want to make sure we get

play09:37

it analyst can we all type that if you

play09:40

don't mind please that's the tool I want

play09:42

you to use data analyst

play09:44

to data analyst yep that's the

play09:48

tool all right now click on

play09:52

it okay we just click on it so once you

play09:56

click on it you see this file this

play09:58

information here okay okay the file I

play10:01

sent to you go pick it up once you pick

play10:04

it up ladies and

play10:05

gentlemen it has become a tool you can

play10:09

analyze all right so for example I'll

play10:13

just go pick it up and say you know in

play10:16

that tool for example I just go and say

play10:19

let's

play10:20

say you could say um because the tool is

play10:25

already let me quickly pick it up on so

play10:28

make sure you put that information there

play10:30

let me let me open it on my side also

play10:33

all right so you know what let me share

play10:35

my whole screen so that you all can have

play10:36

access to this actually I'm going to

play10:38

share my old screen so you can see what

play10:40

I'm doing all right let's share

play10:44

everything okay so what I want us to do

play10:48

is go to

play10:50

the this is our tool right and this is

play10:53

our the document I shared with us so for

play10:56

example let's start with the first one

play10:58

I'm going to ask it to go

play11:01

to it already has access to a document I

play11:04

would just say for example analyze

play11:07

security incident I'll just give you

play11:09

this topic analy Securities incident

play11:14

provide I'll just keep it simple all

play11:16

right so I'm asking you to look at that

play11:19

document analyze that section on

play11:21

security incident and provide any known

play11:24

pattern now look at what this thing is

play11:26

doing for us is breaking it down and

play11:28

saying okay there are two incident

play11:31

involving inside threat there are

play11:33

malware multiple so the beautiful thing

play11:36

here is that this thing is summarizing

play11:38

it for us and giving us some context

play11:40

around it all I did was uploaded that

play11:43

data now I can prompt it to do analysis

play11:46

of that data so imagine me having a

play11:48

comprehensive report and I'm asking you

play11:50

to just go in and analyze the data

play11:52

analyze the pattern check the context

play11:55

around it and just give us some historic

play11:59

information around it it's crazy stuff

play12:02

what do you all think about that let me

play12:03

pause first what do you all

play12:05

think yeah Joseph said that's

play12:07

mindblowing scary and crazy now that's

play12:09

one okay that's one let's let's look at

play12:12

another one of our other files you know

play12:14

policy change yes it has highlighted

play12:16

that one that one is easy for me let's

play12:18

go to this security inent containment I

play12:20

can ask you to look at the security

play12:23

stent conment recommendation and give

play12:27

me a pattern

play12:29

you know I can ask you to identify any

play12:32

pattern let's say uh okay I can

play12:37

say you know I can ask it to give me a

play12:41

pattern

play12:42

review the I'm just saying give me the

play12:45

pattern analyze it and give me the

play12:47

pattern analyze you know and provide

play12:49

some of the patterns and best ways to

play12:51

mitigate the issues you can see it's

play12:54

telling me okay high priority and

play12:57

critical impact you know maor include

play12:59

this that's the pattern best ways to

play13:02

mitigate issues around the pattern so

play13:05

it's giving me it's looking at the data

play13:07

I provided and it's just analyzing that

play13:09

data for us to give us the pattern

play13:11

around it so I'm not even doing anything

play13:14

besides saying okay you know look at

play13:17

this data analyze the pattern tell me

play13:19

what's going on just you know keep it

play13:21

easy for me the same document is all I'm

play13:25

using so let's look at another one

play13:28

employee training and compliance review

play13:30

I can ask this one to say provide the

play13:33

you

play13:34

know I can ask you to tell me based on

play13:37

this tell me a recommended way to

play13:41

increase completion rate okay I can take

play13:44

this and say

play13:46

okay review and suggest best ways to

play13:53

increase ratees based on the data I said

play13:57

based on the data provided give me some

play13:59

best ways to increase compliance

play14:02

rate you know based on the same data

play14:04

provided all

play14:06

right so it's giv some ideas on things

play14:09

we can do based on that same data you

play14:13

know it's picking it from that same

play14:15

source of materials we have right which

play14:19

I think is just

play14:21

amazing you know let's look at

play14:23

another data point here all right I want

play14:26

us the last two put some context around

play14:29

vendor risk assessment report and uh

play14:32

mapping cyber security mapping

play14:34

vulnerability and just you know let's

play14:36

see what you guys can come up with so

play14:38

I'll make you work as a team just work

play14:41

in a team and say okay based on this

play14:43

information what do you think you know

play14:45

what what are the ways we can prom that

play14:47

same data or document to come up with

play14:51

some of the analysis for us okay does

play14:53

that make sense okay somebody say if I

play14:55

upload companies document for chat GPT

play14:58

so before we even get into that remember

play15:01

what I said earlier on every company

play15:03

right now they are working on their own

play15:05

lar learning model so in a bit a lot of

play15:09

company would actually have access to

play15:11

their own version of llm as a matter of

play15:14

fact in case you don't know you can

play15:16

actually download some of those llm on

play15:18

your local drive too yourself and you

play15:21

can

play15:22

actually use it yourself you as a person

play15:25

they large maybe 16 GB or so you can

play15:28

actually start using those llm yourself

play15:30

but most companies today of course the

play15:33

issue is they thinking of the strategy

play15:36

around compliance the liability

play15:38

everybody's working on something

play15:40

guaranteed right now so it will come for

play15:44

you you might have to use it on your

play15:46

phone to text and just write it out

play15:48

manually right for now but I'm just

play15:50

saying it will happen um while that

play15:53

process is already shaping up it's time

play15:56

to start thinking about how to be

play15:58

efficient in using this tools I know for

play16:00

most of the Consulting guys everybody's

play16:02

already using this right they won call

play16:04

it CH GP they call it their own internal

play16:07

name even though they're using those

play16:08

model you know gp4 GPT 3.5 gp5 propos

play16:12

soon so they using those model at their

play16:15

back end um but they have mechanism and

play16:18

controls to make sure there's no buyers

play16:20

and there is Safety and Security around

play16:22

those large learning model so um I won't

play16:26

worry too much about that I'm more

play16:29

worried around you know um making sure

play16:33

we can understand how to use it ourself

play16:36

that's the first thing okay all right

play16:39

cool so let's play with it you know and

play16:41

remember again the more you pract don't

play16:42

ever shy from it just prompt it play

play16:45

around it okay that's what I would

play16:46

suggest we do so that you get more

play16:48

comfortable with it so let's do that for

play16:49

the next 10 minutes then we'll come back

play16:51

okay um I want to make sure you do it

play16:53

make sure you play around it just and

play16:55

others some of us are more savy than

play16:57

others just take ownership just show

play16:59

other people how the best way they

play17:01

you've seen it used and let's have fun

play17:03

with it for the next 10 minutes then

play17:04

we'll come back and wrap it up okay all

play17:06

right let's do that for the next 10

play17:07

minutes let's do a breakout section and

play17:10

I'll see you all in a

play17:13

bit let's let me do something okay sorry

play17:16

sorry okay I noticed most of us did not

play17:18

have access to the paid version can you

play17:20

all hear me now am I good I think I

play17:23

should be good now okay so yeah okay

play17:26

thank you thank you so I'm sorry my

play17:27

apologies I I realized most people do

play17:28

not have access to the paid version and

play17:30

that's the one that will give you the

play17:33

ability to analyze actual data Excel

play17:37

PowerPoint you know if live happens and

play17:41

you have to analyze data just subscribe

play17:43

it makes sense okay now we can still use

play17:46

it the old fashion chat

play17:48

GPT you know somebody say we're able to

play17:51

figure out work around yes you know we

play17:53

can do a work around copying it manually

play17:55

you know so yes so I get it but at least

play17:59

the key thing I think is important I

play18:01

wanted to make sure we call that out

play18:04

is you know the ability is there if you

play18:08

need to all right so that's the key

play18:10

thing oh somebody said copil can do it

play18:12

Bingo that's even awesome you know I

play18:14

didn't even know copilot Cod I've used

play18:16

copilot but I never used it for anything

play18:18

like that okay and we have three more

play18:20

minutes and the only thing I would like

play18:22

to just showcase a lot of you have

play18:23

pinged me 101 and asked me a lot about

play18:26

the upcoming GRC CL

play18:29

yes registration is still on so when you

play18:31

go to ski.com site typically most of you

play18:34

come here you go to view all courses

play18:36

this is The Internship if you've not

play18:38

registered for an internship make sure

play18:39

you register because that's the only way

play18:41

you can have access to all this ton of

play18:42

materials we keep everything there so

play18:44

make sure you register so you can have

play18:46

access to it very important then this is

play18:48

the March second class A lot of you have

play18:50

asked me about and you know the people

play18:53

ask me is there payment plan yes we can

play18:55

select the payment options here for some

play18:57

of us you could also go in you have the

play19:00

option of using clammer or using air so

play19:04

the options are also there so those are

play19:06

the popular questions people have asked

play19:07

me it's a five weeks program uh this

play19:11

week I believe Wednesday we would have

play19:13

information session feel free to join

play19:16

some of our recent alumni that just got

play19:17

a job would be there also I challenge

play19:20

you attend our Lions Den section you'll

play19:24

see how we prepare our folks for

play19:26

interviews if you've never seen it just

play19:28

go to our portal you'll see all of those

play19:31

information there also it's always there

play19:34

so let me see if anyone ask questions

play19:35

about the upcoming program I can answer

play19:38

that for the next 3 minutes before we

play19:39

wrap it up but I think those are the key

play19:42

things most of you have asked me the

play19:44

content are there online everything is

play19:46

there all right so we are very

play19:47

transparent nobody anyone that

play19:49

guarantees you is just saying nonsense

play19:51

really we don't guarantee anybody

play19:52

anything you have to put the work

play19:54

there's no shortcut I wish I could tell

play19:56

you anything is Magic nothing like we

play19:58

don't play that game here we'll be

play19:59

honest and straight with our guys you

play20:00

got to put the work you got to put the

play20:02

time the discipline but one thing I know

play20:04

is this you hold us accountable and make

play20:06

sure that we teach you relevant things

play20:08

we do the same thing you know if you

play20:10

don't put the work if you like go to Har

play20:12

y if you don't put work you it's it's a

play20:15

joke right it's not going to happen so

play20:17

that's fantasy so we don't play games

play20:19

there if you don't put the work you will

play20:20

not get anything it will never happen

play20:23

but if you put the work put the

play20:24

discipline put the time then we stand

play20:27

the chance together that's the way it

play20:28

works you know but it's an illusion

play20:31

anyone anyone that have said it to you

play20:33

all you can you know listen to such

play20:37

information but mostly they are false

play20:39

nobody nobody can guarantee you anything

play20:42

all right let's see any other

play20:44

question okay good good good good I mean

play20:47

and that's the goal in our community we

play20:48

just keep empowering our folks just put

play20:50

the work for us you know we don't play

play20:53

games here we believe in excellence

play20:55

quality

play20:56

discipline take take pride in your work

play21:00

don't find shortcut you know it will

play21:02

show people who know and it will

play21:05

backfire you know and there are many

play21:06

environment that likes mediocrity this

play21:09

is just not one of them yeah really we

play21:10

don't play that game here we are

play21:12

strictly focused on Excellence quality

play21:15

we want our folks to be the best in the

play21:17

world and we know what it takes you got

play21:19

to put time discipline you know um if

play21:23

you don't want to put that then they

play21:25

just they just playing games and it's PR

play21:28

predictable it would not work for you

play21:29

even when it works you will lose the job

play21:31

you'll be fired most likely because you

play21:33

don't put discipline and pride in your

play21:35

work but if you put discipline and pride

play21:37

in your work you stand a good chance I

play21:39

mean you know so yeah it's it's an

play21:43

Excellence platform that's what we do

play21:45

here we put our best consistently we put

play21:48

the work and another thing people have

play21:50

asked me let me just be straight with

play21:52

you somebody will ask me do you do

play21:54

interview for people we don't do that

play21:56

game yet please don't even ask me those

play21:57

kind of questions if you do I'll

play21:59

respectfully just I'll just bounce off

play22:02

your bounce the person off my phone you

play22:05

know we don't we this not this is not a

play22:07

place for stuff like that do you will

play22:08

you help me to do your why would you

play22:10

even ask that really makes no sense

play22:12

really we believe so much in our team

play22:14

Your Capacity we believe so much in you

play22:16

being able to be leaders in your field

play22:20

so and you now come and diminish

play22:22

Yourself by telling me stuff don't do

play22:24

that please you are more than capable

play22:26

and competent so be dis man you know put

play22:29

work you get the result I know that you

play22:31

know but you saying oh somebody ask me

play22:34

do you help people do exam come on guys

play22:36

what do you think we are we don't do

play22:37

that we don't do we don't do stuff like

play22:39

that here don't even ask me stuff like

play22:41

that or I'll just cut it up immediately

play22:43

so you know put the work put Excellence

play22:46

take pride in your work put discipline

play22:48

be committed and uh you know what you

play22:51

not want your kids to do don't do it

play22:54

just put the work

play22:55

man all right let's see anyone else for

play22:58

the GRC program typically I Le the

play23:00

program here now for we have a cyber

play23:03

comp coming up we have like three

play23:06

different strategic relationship you

play23:08

guys will hear about in a few weeks so

play23:10

you'll see a lot of other people you

play23:13

know you'll work with a lot but for the

play23:15

JC I I train and Mentor the JC

play23:18

program okay that's all we got thank you

play23:21

all and just keep doing great things

play23:23

keep showing up um for my folks already

play23:24

registered just keep doing great things

play23:27

uh they

play23:28

you know we have a limit for the March

play23:31

second class so just keep registering so

play23:33

you don't get caught up for the because

play23:34

the next one will be probably two months

play23:36

after all right God bless enjoy the

play23:38

weekend take time off and enjoy family

play23:40

God bless

play23:42

bye-bye

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
CybersecurityComplianceAI AnalysisData PatternsIncident ResponsePolicy ComplianceRisk AssessmentEmployee TrainingVendor RiskCyber Framework
¿Necesitas un resumen en inglés?