Episode 14 — Inventory AI Systems Completely: Models, Data, Vendors, and Shadow AI (Domain 1)

You cannot manage the risk of what you do not know exists, making a complete AI inventory a prerequisite for effective governance in Domain 1. This episode explores the challenges of tracking AI across the enterprise, including identifying embedded AI in third-party software and discovering "shadow AI" deployed by business units without IT approval. For the certification, candidates must know the essential components of an AI inventory, such as the model's purpose, the data sources involved, the vendor's identity, and the internal owner. We discuss strategies for discovery, such as network traffic analysis and software procurement reviews, to ensure that every AI asset is brought under the governance umbrella. A living inventory allows the organization to respond quickly to emerging threats, such as a vulnerability in a specific open-source library or a service outage from a critical AI provider. Maintaining this visibility is the first step in prioritizing risk assessments and ensuring that all AI usage aligns with organizational policies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 14 — Inventory AI Systems Completely: Models, Data, Vendors, and Shadow AI (Domain 1)
Broadcast by