Technologies in this category focus on how organizations can become resilient by implementing human-centered security and privacy programs. They enable companies to create a culture of mutual trust and awareness of shared risks in decision-making across many teams.
AI Trust, Risk, and Security Management (AI TRiSM) is an excellent example of human-centric security and privacy and ensures the governance, trustworthiness, fairness, reliability, robustness, efficiency and data protection of the AI model. It includes solutions and techniques for model interpretability and explainability, data and content anomaly detection, AI data protection, model operations, and resistance to adversarial attacks. It will take two to five years to achieve widespread adoption.
Other critical human-centric security and privacy technologies include:
-
Cybersecurity Mesh Architecture (CSMA)an emerging approach to designing composable, distributed security control architectures that improve overall security effectiveness.
-
Generative Cybersecurity AIthat generates new derivative versions of security-related and other relevant content, strategies, designs, and methods by learning from large repositories of original source data.
-
Homomorphic encryption (HE)which uses algorithms to enable calculations with encrypted data and allows companies to share data without compromising privacy.
- Postquantum cryptography (PQC)also called quantum-secure cryptography, algorithms designed to protect against classical and quantum computing attacks.