{"id":38542,"date":"2025-08-06T01:45:01","date_gmt":"2025-08-06T01:45:01","guid":{"rendered":"https:\/\/www.insentragroup.com\/nz\/?p=38542"},"modified":"2025-08-13T01:11:05","modified_gmt":"2025-08-13T01:11:05","slug":"the-executives-guide-to-ai-security","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/the-executives-guide-to-ai-security\/","title":{"rendered":"The Executive&#8217;s Guide to AI Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"38542\" class=\"elementor elementor-38542\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dba428d e-flex e-con-boxed e-con e-parent\" data-id=\"dba428d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-25a6fd1 e-con-full e-flex e-con e-child\" data-id=\"25a6fd1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f51ffa elementor-widget elementor-widget-heading\" data-id=\"2f51ffa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">THE EXECUTIVE\u2019S GUIDE TO\nAI SECURITY<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7e1495 elementor-widget elementor-widget-heading\" data-id=\"a7e1495\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Is AI Your Biggest Security Risk\nor Your Strongest Defense?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-873ca21 elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"873ca21\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#DownloadEbook\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2a173c e-con-full e-flex e-con e-child\" data-id=\"c2a173c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71738c6 elementor-widget elementor-widget-spacer\" data-id=\"71738c6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d57f65 e-flex e-con-boxed e-con e-parent\" data-id=\"9d57f65\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e35c8a e-con-full e-flex e-con e-child\" data-id=\"6e35c8a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-948141a e-con-full e-flex e-con e-child\" data-id=\"948141a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4bbeed elementor-widget elementor-widget-spacer\" data-id=\"a4bbeed\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79306c9 e-con-full e-flex e-con e-child\" data-id=\"79306c9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da931c0 elementor-widget elementor-widget-heading\" data-id=\"da931c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a95377 elementor-widget elementor-widget-text-editor\" data-id=\"1a95377\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #808080;\"><a style=\"color: #808080;\" href=\"#section01\">Introduction<\/a><br \/><a href=\"#section02\"><span style=\"color: #808080;\">How AI Is Changing Cybersecurity<\/a><br \/><span style=\"color: #808080;\"><a style=\"color: #808080;\" href=\"#section03\">The Security Challenges of AI Adoption<\/a><br \/><a href=\"#section04\"><span style=\"color: #808080;\">Assessing Security Readiness for AI<\/a><br \/><a href=\"#section05\"><span style=\"color: #808080;\">Data Protection Strategies<\/a><br \/><span style=\"color: #808080;\"><a style=\"color: #808080;\" href=\"#section06\">Security Measures for AI Systems<\/a><br \/><span style=\"color: #808080;\"><a style=\"color: #808080;\" href=\"#section07\">Building a Culture of Security and Awareness<\/a><br \/><span style=\"color: #808080;\"><a style=\"color: #808080;\" href=\"#section08\">Continuous Monitoring and Improvement<\/a><br \/><a href=\"#section09\"><span style=\"color: #808080;\">Conclusion<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7820d57 e-flex e-con-boxed e-con e-parent\" data-id=\"7820d57\" data-element_type=\"container\" id=\"section01\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4260a4 e-con-full e-flex e-con e-child\" data-id=\"e4260a4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ceb48d4 elementor-widget elementor-widget-heading\" data-id=\"ceb48d4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INTRODUCTION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b973d52 elementor-widget elementor-widget-text-editor\" data-id=\"b973d52\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI is not the future, it\u2019s already here. It is the driving force behind efficiency, innovation and competitive advantage in modern business. However, as AI becomes more embedded in critical systems, it also becomes a high-value target for cybercriminals. The very intelligence making AI powerful can also be weaponised, leading to sophisticated attacks, data breaches and potential security vulnerabilities businesses may not be prepared for.<\/p><p>AI systems thrive on vast amounts of data and intricate machine learning models, making them prime targets for cybercriminals. Attackers exploit AI vulnerabilities to launch sophisticated phishing attacks, manipulate data and compromise critical systems. Without proper security measures, organisations risk exposing sensitive information, facing regulatory non-compliance and suffering reputational damage.<\/p><p>Beyond external threats, the risks of AI adoption can also come from within the organisation. Without proper data governance and usage guardrails in place, employees may unintentionally expose sensitive information by inputting confidential data into AI tools. Shadow AI (when employees use AI-powered applications without IT approval) can lead to data leaks, compliance violations and security gaps.<\/p><p>To mitigate these risks, organisations must prioritise security before adopting AI. This eBook provides an indepth look at security frameworks, best practices and potential threats businesses must address before integrating AI into their operations. By understanding these risks and implementing robust security measures, organisations can harness AI\u2019s potential while maintaining strong cybersecurity defenses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-966829c e-con-full e-flex e-con e-child\" data-id=\"966829c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-126f707 e-flex e-con-boxed e-con e-parent\" data-id=\"126f707\" data-element_type=\"container\" id=\"section02\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5268e6e e-con-full e-flex e-con e-child\" data-id=\"5268e6e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a10e07 elementor-widget elementor-widget-heading\" data-id=\"0a10e07\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW AI IS CHANGING CYBERSECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a64592 elementor-widget elementor-widget-text-editor\" data-id=\"4a64592\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI is reshaping the cybersecurity landscape, offering both opportunities and threats. While AI-powered security tools strengthen defenses, cybercriminals are also leveraging AI to enhance attacks. Understanding this dual role is critical for businesses adopting AI-driven technologies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8451b2d e-flex e-con-boxed e-con e-parent\" data-id=\"8451b2d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-60dd5eb e-con-full e-flex e-con e-child\" data-id=\"60dd5eb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f39a49 elementor-widget elementor-widget-heading\" data-id=\"8f39a49\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Cybercriminals Are Using AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfc8135 elementor-widget elementor-widget-text-editor\" data-id=\"cfc8135\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybercriminals are increasingly leveraging AI to enhance phishing scams, automate malware development and evade traditional security measures. AI-driven attacks are growing in sophistication, making it more difficult for businesses to detect and mitigate threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-836b278 e-grid e-con-full e-con e-child\" data-id=\"836b278\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0e879e8 e-con-full e-flex e-con e-child\" data-id=\"0e879e8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5df0cda elementor-widget elementor-widget-text-editor\" data-id=\"5df0cda\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAccording to\u00a0<a style=\"color: #ffffff; text-decoration: underline;\" href=\"https:\/\/www.immuta.com\/blog\/the-ai-security-governance-report\/\" target=\"_blank\" rel=\"noopener nofollow\">The AI Security &amp; Governance Report<\/a>, 80% of data experts agree AI is making data security more challenging, underscoring the complexities introduced by AI integration.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e699ff6 elementor-widget elementor-widget-text-editor\" data-id=\"e699ff6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThese modern security threats also create hesitation among organisations when it comes to adopting AI which we refer to as AI Inertia. A recent study found that\u00a0<a style=\"text-decoration: underline;\" href=\"https:\/\/www.prnewswire.com\/news-releases\/workday-global-survey-majority-of-business-leaders-believe-humans-should-be-involved-in-ai-decision-making-cite-ethical-and-data-concerns-301865357.html\" target=\"_blank\" rel=\"noopener nofollow\">48% of organisations cite security and privacy concerns<\/a>\u00a0as the main barriers to AI implementation, reflecting apprehensions about potential vulnerabilities associated with AI technologies.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eac336a elementor-widget elementor-widget-text-editor\" data-id=\"eac336a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Here are some ways criminals use AI:<\/p><ul><li><b>AI-Powered Phishing Attacks:<\/b> Attackers use AI to craft highly convincing phishing emails, mimicking legitimate communication to steal credentials and sensitive data. A survey revealed a\u00a0<a href=\"https:\/\/www.investopedia.com\/these-are-cyber-chiefs-biggest-fears-about-ai-8717374\" target=\"_blank\" rel=\"noopener nofollow\">1,265% increase in AI-driven phishing emails<\/a>\u00a0and a 967% rise in credential phishing since late 2022, raising significant concerns among cybersecurity leaders<\/li><li><b>AI-Generated Malware:<\/b> AI enables the creation of adaptive malware capable of evolving to bypass traditional security defenses. These self-learning threats make it harder for organisations to rely solely on conventional antivirus and firewall solutions<\/li><li><b>Automated Social Engineering Attacks:<\/b> Cybercriminals use AI to analyse social media and email communication patterns to craft highly personalised scams, making social engineering attacks more effective<\/li><li><b>Data Poisoning and Model Manipulation:<\/b> Attackers can manipulate AI models by feeding them malicious data, altering their decision-making processes and potentially causing security failures<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-617502d elementor-widget elementor-widget-image\" data-id=\"617502d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2048\" height=\"657\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent.png\" class=\"attachment-full size-full wp-image-38564\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent-300x96.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent-1024x329.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent-768x246.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent-1536x493.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/cyber-security-agent-1568x503.png 1568w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" style=\"width:100%;height:32.08%;max-width:2048px\" title=\"cyber-security-agent\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d13c1d e-flex e-con-boxed e-con e-parent\" data-id=\"1d13c1d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-90e8754 e-con-full e-flex e-con e-child\" data-id=\"90e8754\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bf1cbc elementor-widget elementor-widget-heading\" data-id=\"6bf1cbc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI\u2019s Role in Strengthening Security Defenses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01e8f14 elementor-widget elementor-widget-text-editor\" data-id=\"01e8f14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tWhile AI presents new threats, it is also becoming a powerful tool in the fight against cybercrime. AIdriven\nsecurity solutions enhance detection, response and prevention capabilities, improving overall\ncybersecurity resilience.\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed991c5 e-grid e-con-full e-con e-child\" data-id=\"ed991c5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-50024b7 e-con-full e-flex e-con e-child\" data-id=\"50024b7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d58dec elementor-widget elementor-widget-text-editor\" data-id=\"4d58dec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><b>Threat Detection and Anomaly Identification:<\/b> AI-powered security tools can analyse vast amounts of network traffic, identifying unusual patterns and detecting potential cyber threats in real-time<br \/><br \/><\/li><li><b>Predictive Threat Intelligence:<\/b> Machine learning models can predict future attack patterns based on historical data, allowing organisations to take proactive security measures<br \/><br \/><\/li><li><b>Automated Incident Response:<\/b> AI accelerates incident response times by automating threat mitigation processes, reducing the impact of cyberattacks<br \/><br \/><\/li><li><b>Improved Endpoint Security:<\/b> AIbased endpoint detection and response (EDR) solutions help identify compromised devices and prevent unauthorised access<br \/><br \/><\/li><li><b>Enhanced Fraud Detection:<\/b> Financial institutions leverage AI to detect fraudulent transactions and identify suspicious behaviour, protecting customers and businesses from cyber fraud<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9e593d elementor-widget elementor-widget-text-editor\" data-id=\"d9e593d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As AI continues to evolve, organisations must recognise both its potential as a security ally and the risks it introduces. Balancing AI\u2019s benefits with robust security measures is key to ensuring safe and effective AI adoption.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d9ac14 e-flex e-con-boxed e-con e-parent\" data-id=\"4d9ac14\" data-element_type=\"container\" id=\"section03\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c097ac4 e-con-full e-flex e-con e-child\" data-id=\"c097ac4\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0fe70ce e-con-full e-flex e-con e-child\" data-id=\"0fe70ce\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91abc40 elementor-widget elementor-widget-heading\" data-id=\"91abc40\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">THE SECURITY\nCHALLENGES\nOF AI ADOPTION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1261c96 e-con-full e-flex e-con e-child\" data-id=\"1261c96\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a4b573 elementor-widget elementor-widget-image\" data-id=\"8a4b573\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"750\" height=\"394\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach-1024x538.png\" class=\"attachment-large size-large wp-image-38570\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach-1024x538.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach-300x158.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach-768x404.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach-1536x807.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach-1568x824.png 1568w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-bot-reach.png 1606w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:52.55%;max-width:1606px\" title=\"ai-bot-reach\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15ea72f e-con-full e-flex e-con e-child\" data-id=\"15ea72f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba688b8 elementor-widget elementor-widget-text-editor\" data-id=\"ba688b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As organisations integrate AI into their operations, they must confront a range of security challenges. AI adoption introduces complexities which could undermine security, from data privacy concerns to vulnerabilities in AI models and supply chains. Understanding these risks is essential for ensuring AI is deployed safely and responsibly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-962c502 e-flex e-con-boxed e-con e-parent\" data-id=\"962c502\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9efb0e5 e-con-full e-flex e-con e-child\" data-id=\"9efb0e5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6b00815 e-con-full e-flex e-con e-child\" data-id=\"6b00815\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4e0d532 e-con-full e-flex e-con e-child\" data-id=\"4e0d532\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c80f1be elementor-widget elementor-widget-heading\" data-id=\"c80f1be\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93fbe22 e-con-full e-flex e-con e-child\" data-id=\"93fbe22\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66e2cc7 elementor-widget elementor-widget-heading\" data-id=\"66e2cc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Privacy and Compliance Risks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34821f8 elementor-widget elementor-widget-text-editor\" data-id=\"34821f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI systems process vast amounts of sensitive data, making them a prime target for regulatory scrutiny. Mishandling data, whether through improper storage, weak encryption, or unauthorised access can lead to severe legal and financial consequences under regulations like GDPR, CCPA and the Australian Privacy Act.<\/p><p>AI models trained on unprotected datasets may inadvertently expose confidential information. Even with safeguards, AI-driven data analysis can infer sensitive details, leading to privacy breaches. The complexity of AI decision-making further complicates compliance, as organisations struggle to prove their systems meet legal and ethical standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6fd5b0 e-con-full e-flex e-con e-child\" data-id=\"d6fd5b0\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d6c6146 e-con-full e-flex e-con e-child\" data-id=\"d6c6146\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb74dff elementor-widget elementor-widget-heading\" data-id=\"fb74dff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cee469c e-con-full e-flex e-con e-child\" data-id=\"cee469c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7abf70 elementor-widget elementor-widget-heading\" data-id=\"b7abf70\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Model Manipulation and Poisoning Attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d421e elementor-widget elementor-widget-text-editor\" data-id=\"89d421e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI models rely on training data, but this dependency makes them vulnerable to manipulation. In data poisoning attacks, cybercriminals inject malicious data, corrupting the model\u2019s outputs. AI-powered fraud detection, for example, may fail to flag fraudulent transactions if trained on tampered data.<\/p><p>Adversarial attacks take this further by subtly altering inputs to deceive AI models. A few manipulated pixels in an image can cause an AI-powered security system to misidentify a person or an object, leading to security breaches. Since AI often cannot explain its reasoning, these attacks can go undetected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5326b9 e-con-full e-flex e-con e-child\" data-id=\"f5326b9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-01f416f e-con-full e-flex e-con e-child\" data-id=\"01f416f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b27e068 elementor-widget elementor-widget-heading\" data-id=\"b27e068\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-697c0db e-con-full e-flex e-con e-child\" data-id=\"697c0db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb66ca4 elementor-widget elementor-widget-heading\" data-id=\"fb66ca4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unregulated AI Usage (Shadow AI)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e636cee elementor-widget elementor-widget-text-editor\" data-id=\"e636cee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Employees often adopt AI tools without IT or security approval, creating security blind spots. This unregulated usage known as Shadow AI exposes sensitive data to external models without oversight.<\/p><p>AI-powered chatbots, automation tools and data analysis platforms may store or repurpose user inputs, increasing the risk of data leaks. Without clear policies, organisations may have AI systems processing proprietary information without adequate security controls, raising compliance concerns.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa9af16 e-con-full e-flex e-con e-child\" data-id=\"aa9af16\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7737827 e-con-full e-flex e-con e-child\" data-id=\"7737827\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0279f9b elementor-widget elementor-widget-heading\" data-id=\"0279f9b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d2e1a7 e-con-full e-flex e-con e-child\" data-id=\"4d2e1a7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9277a5b elementor-widget elementor-widget-heading\" data-id=\"9277a5b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI Supply Chain Vulnerabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9200ce9 elementor-widget elementor-widget-text-editor\" data-id=\"9200ce9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI systems depend on third-party components, such as pre-trained models and cloud-based services, increasing exposure to supply chain risks. A breach at a third-party provider can compromise proprietary models and sensitive data.<\/p><p>Open-source AI models, widely used in development, can also be tampered with before integration. Attackers may introduce subtle vulnerabilities, embedding hidden backdoors waiting to be exploited after deployment. The interconnected nature of AI supply chains means a single weak link can compromise an entire system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-897d65f e-con-full e-flex e-con e-child\" data-id=\"897d65f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ce04d63 e-con-full e-flex e-con e-child\" data-id=\"ce04d63\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a623db elementor-widget elementor-widget-heading\" data-id=\"9a623db\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f05bd36 e-con-full e-flex e-con e-child\" data-id=\"f05bd36\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5ba68e elementor-widget elementor-widget-heading\" data-id=\"d5ba68e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lack of Transparency and Explainability<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b1fd4f elementor-widget elementor-widget-text-editor\" data-id=\"5b1fd4f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI models often function as black boxes, making it difficult to detect biases, errors, or security flaws. In critical applications such as fraud detection or hiring, an AI system might reject legitimate transactions or candidates without explanation, leading to ethical and regulatory concerns.<\/p><p>Security risks arise when businesses cannot validate AI-driven decisions. If an AI-powered intrusion detection system flags a threat without justification, security teams may struggle to determine whether it\u2019s a false positive or an actual risk. This lack of explainability leaves organisations vulnerable to undetected flaws.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38efcd9 e-con-full e-flex e-con e-child\" data-id=\"38efcd9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a730601 e-con-full e-flex e-con e-child\" data-id=\"a730601\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01c3ff3 elementor-widget elementor-widget-heading\" data-id=\"01c3ff3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80ce944 e-con-full e-flex e-con e-child\" data-id=\"80ce944\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-456cc98 elementor-widget elementor-widget-heading\" data-id=\"456cc98\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Overreliance on AI for Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63095d4 elementor-widget elementor-widget-text-editor\" data-id=\"63095d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI enhances cybersecurity by identifying threats quickly, but excessive reliance introduces risks. AI-driven security tools can be deceived by adversarial attacks, misinterpret patterns, or fail to detect novel threats.<\/p><p>For example, an AI-based email filter might mistakenly classify a phishing attempt as safe if the attack is designed to bypass its detection patterns. Similarly, AI-powered network security systems may fail to recognise sophisticated breaches not aligned to training data. Without human oversight, AI\u2019s limitations can create security blind spots, turning a defensive tool into a potential point of failure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8628d0 elementor-widget elementor-widget-image\" data-id=\"b8628d0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2530\" height=\"838\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit.png\" class=\"attachment-full size-full wp-image-38572\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit.png 2530w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit-300x99.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit-1024x339.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit-768x254.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit-1536x509.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit-2048x678.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-circuit-1568x519.png 1568w\" sizes=\"(max-width: 2530px) 100vw, 2530px\" style=\"width:100%;height:33.12%;max-width:2530px\" title=\"ai-circuit\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-231e5d5 e-flex e-con-boxed e-con e-parent\" data-id=\"231e5d5\" data-element_type=\"container\" id=\"section04\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f2ad342 e-con-full e-flex e-con e-child\" data-id=\"f2ad342\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3504e97 elementor-widget elementor-widget-image\" data-id=\"3504e97\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2536\" height=\"856\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks.png\" class=\"attachment-full size-full wp-image-38573\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks.png 2536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks-300x101.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks-1024x346.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks-768x259.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks-1536x518.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks-2048x691.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-locks-1568x529.png 1568w\" sizes=\"(max-width: 2536px) 100vw, 2536px\" style=\"width:100%;height:33.75%;max-width:2536px\" title=\"ai-locks\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca30a9f e-con-full e-flex e-con e-child\" data-id=\"ca30a9f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd3fe18 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"fd3fe18\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ASSESSING SECURITY\n<br \/>READINESS\n<br \/>FOR AI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68701e elementor-widget elementor-widget-text-editor\" data-id=\"e68701e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Before integrating AI into business operations, organisations must ensure their security measures are equipped to handle the new risks AI introduces. AI adoption can significantly impact cybersecurity infrastructure, data protection policies and governance frameworks. A proactive approach to assessing security readiness is essential to minimising vulnerabilities and ensuring compliance with industry regulations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-067c80e e-con-full e-flex e-con e-child\" data-id=\"067c80e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f415e6 elementor-widget elementor-widget-heading\" data-id=\"8f415e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Evaluating Your Current Security Infrastructure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0943bc elementor-widget elementor-widget-text-editor\" data-id=\"d0943bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI adoption should begin with a comprehensive review of an organisation&#8217;s existing cybersecurity infrastructure. This involves assessing whether current security measures, such as firewalls, intrusion detection systems and endpoint protection solutions, can support AI-driven processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35c756f e-con-full e-flex e-con e-child\" data-id=\"35c756f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7a25e elementor-widget elementor-widget-text-editor\" data-id=\"8a7a25e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tKey considerations include:\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18220ac e-con-full e-grid e-con e-child\" data-id=\"18220ac\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-603fd80 e-con-full e-flex e-con e-child\" data-id=\"603fd80\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2441402 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2441402\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"196\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/threat-detection-icon.png\" class=\"attachment-full size-full wp-image-38574\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/threat-detection-icon.png 196w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/threat-detection-icon-150x150.png 150w\" sizes=\"(max-width: 196px) 100vw, 196px\" style=\"width:100%;height:100%;max-width:196px\" title=\"threat-detection-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12dcbcc elementor-widget elementor-widget-heading\" data-id=\"12dcbcc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Detection and\nResponse Capabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d32581 elementor-widget elementor-widget-text-editor\" data-id=\"4d32581\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Are security teams equipped to detect and mitigate AI generated cyber threats?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5c49b1 e-con-full e-flex e-con e-child\" data-id=\"d5c49b1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5983742 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5983742\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"196\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/identity-and-access-icon.png\" class=\"attachment-full size-full wp-image-38577\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/identity-and-access-icon.png 196w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/identity-and-access-icon-150x150.png 150w\" sizes=\"(max-width: 196px) 100vw, 196px\" style=\"width:100%;height:100%;max-width:196px\" title=\"identity-and-access-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26d17e7 elementor-widget elementor-widget-heading\" data-id=\"26d17e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identity and Access\nManagement (IAM)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9700d7d elementor-widget elementor-widget-text-editor\" data-id=\"9700d7d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Can existing IAM solutions enforce strict access controls for AIdriven processes and prevent unauthorised use?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7f3a6a e-con-full e-flex e-con e-child\" data-id=\"c7f3a6a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-990e1ab elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"990e1ab\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"196\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/network-security-icon.png\" class=\"attachment-full size-full wp-image-38576\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/network-security-icon.png 196w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/network-security-icon-150x150.png 150w\" sizes=\"(max-width: 196px) 100vw, 196px\" style=\"width:100%;height:100%;max-width:196px\" title=\"network-security-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5118241 elementor-widget elementor-widget-heading\" data-id=\"5118241\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network<br \/>\nSecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a497a8 elementor-widget elementor-widget-text-editor\" data-id=\"8a497a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Are there adequate safeguards to protect AI models from unauthorised access and data exfiltration?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4aad6b4 e-con-full e-flex e-con e-child\" data-id=\"4aad6b4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c79f28 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6c79f28\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"196\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/information-architecture-icon.png\" class=\"attachment-full size-full wp-image-38575\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/information-architecture-icon.png 196w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/information-architecture-icon-150x150.png 150w\" sizes=\"(max-width: 196px) 100vw, 196px\" style=\"width:100%;height:100%;max-width:196px\" title=\"information-architecture-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc2273d elementor-widget elementor-widget-heading\" data-id=\"cc2273d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information<br \/>\nArchitecture (IA)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1cdf40 elementor-widget elementor-widget-text-editor\" data-id=\"a1cdf40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Is your IP and information stored in a governed and compliant manner levering data protection, including classification and labelling?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bde624 e-con-full e-flex e-con e-child\" data-id=\"9bde624\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44d3b86 elementor-widget elementor-widget-text-editor\" data-id=\"44d3b86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tBy evaluating these factors, organisations can identify weaknesses that need to be addressed before AI\nimplementation.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b770f86 e-flex e-con-boxed e-con e-parent\" data-id=\"b770f86\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-33a8abe e-con-full e-flex e-con e-child\" data-id=\"33a8abe\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea781ad elementor-widget elementor-widget-heading\" data-id=\"ea781ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identifying Gaps in Data Protection Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26858ff elementor-widget elementor-widget-text-editor\" data-id=\"26858ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAI systems require large datasets to function effectively, however, without stringent data security\nmeasures, they can expose organisations to breaches and compliance violations. A thorough review of\nyour information architecture and data protection policies ensures AI adoption does not compromise\nsensitive information.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b13ea8f e-con-full e-flex e-con e-child\" data-id=\"b13ea8f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27d54d6 elementor-widget elementor-widget-text-editor\" data-id=\"27d54d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tKey considerations include:\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c79984a e-con-full e-flex e-con e-child\" data-id=\"c79984a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-233f32e e-con-full left-icon-list e-flex e-con e-child\" data-id=\"233f32e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-183ab7f e-con-full e-flex e-con e-child\" data-id=\"183ab7f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67140f7 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"67140f7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/threat-detection-icon-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-38574\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/threat-detection-icon-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/threat-detection-icon.png 196w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:196px\" title=\"threat-detection-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e805af1 elementor-widget elementor-widget-text-editor\" data-id=\"e805af1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Data Classification and Encryption<\/strong><\/p><p>Are sensitive datasets properly classified and<br \/>encrypted to prevent unauthorised access?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f6f29c e-con-full e-flex e-con e-child\" data-id=\"0f6f29c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-831628c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"831628c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/identity-and-access-icon-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-38577\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/identity-and-access-icon-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/identity-and-access-icon.png 196w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:196px\" title=\"identity-and-access-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87f6ced elementor-widget elementor-widget-text-editor\" data-id=\"87f6ced\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Data Access Controls<\/strong><\/p><p>Are employees and AI systems granted only the<br \/>minimum necessary access to data?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d4d51d e-con-full e-flex e-con e-child\" data-id=\"0d4d51d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-253c6ac elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"253c6ac\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/network-security-icon-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-38576\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/network-security-icon-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/network-security-icon.png 196w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:196px\" title=\"network-security-icon\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-490d5a0 elementor-widget elementor-widget-text-editor\" data-id=\"490d5a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Regulatory Compliance<\/strong><\/p><p>Does AI usage align with data protection laws such<br \/>as GDPR, CCPA, or the Australian Privacy Act?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e4758df e-con-full e-flex e-con e-child\" data-id=\"e4758df\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0efe782 elementor-widget elementor-widget-heading\" data-id=\"0efe782\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Failure to address\nthese gaps can lead to\nlegal and reputational\nconsequences, making\nproactive policy\nreviews essential\nbefore AI integration.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd350d5 e-con-full e-flex e-con e-child\" data-id=\"bd350d5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79179f0 elementor-widget elementor-widget-heading\" data-id=\"79179f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Establishing an AI Governance Framework<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaace8d elementor-widget elementor-widget-text-editor\" data-id=\"aaace8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tA structured AI governance framework is crucial for maintaining security, ensuring compliance and\nmanaging risks associated with AI implementation. This framework should outline policies,\naccountability structures and continuous monitoring strategies.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9af7a86 e-con-full e-flex e-con e-child\" data-id=\"9af7a86\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c403ddf e-con-full e-flex e-con e-child\" data-id=\"c403ddf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d48fa9 elementor-widget elementor-widget-image\" data-id=\"6d48fa9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"981\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/key-components-783x1024.png\" class=\"attachment-large size-large wp-image-38654\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/key-components-783x1024.png 783w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/key-components-229x300.png 229w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/key-components-768x1005.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/key-components.png 844w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:130.81%;max-width:844px\" title=\"key-components\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cbfc13b e-con-full left-icon-list e-flex e-con e-child\" data-id=\"cbfc13b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-350bcb0 elementor-widget elementor-widget-text-editor\" data-id=\"350bcb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tKey components of a strong AI governance framework include:\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a28f85d e-con-full e-flex e-con e-child\" data-id=\"a28f85d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d486475 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"d486475\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/dedicated-ai-governance-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-38684\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/dedicated-ai-governance-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/dedicated-ai-governance-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/dedicated-ai-governance.png 330w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:330px\" title=\"dedicated-ai-governance\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecd1c33 elementor-widget elementor-widget-text-editor\" data-id=\"ecd1c33\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Dedicated AI Governance Team<\/strong><\/p><p>A cross-functional team, including IT, security,<br \/>compliance and business leaders, should oversee<br \/>AI-related security decisions<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc8b4b5 e-con-full e-flex e-con e-child\" data-id=\"fc8b4b5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5b65b2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a5b65b2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/risk-assessment-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-38686\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/risk-assessment-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/risk-assessment-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/risk-assessment.png 330w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:330px\" title=\"risk-assessment\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19ae344 elementor-widget elementor-widget-text-editor\" data-id=\"19ae344\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Risk Assessment and Policy Development<\/strong><\/p><p>Organisations must establish guidelines on AI data<br \/>usage, ethical considerations and risk mitigation<br \/>strategies<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-258e0e0 e-con-full e-flex e-con e-child\" data-id=\"258e0e0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-90ddc25 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"90ddc25\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ongoing-monitoring-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-38685\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ongoing-monitoring-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ongoing-monitoring-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ongoing-monitoring.png 330w\" sizes=\"(max-width: 150px) 100vw, 150px\" style=\"width:100%;height:100%;max-width:330px\" title=\"ongoing-monitoring\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc26a6d elementor-widget elementor-widget-text-editor\" data-id=\"dc26a6d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Ongoing Monitoring and Audits<\/strong><\/p><p>AI models should be regularly audited for biases,<br \/>security vulnerabilities and compliance adherence<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a463d9b e-con-full e-flex e-con e-child\" data-id=\"a463d9b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b35e02 elementor-widget elementor-widget-text-editor\" data-id=\"3b35e02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tBy embedding security into AI governance from the outset, organisations can mitigate risks while\nmaximising the benefits AI offers.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-052887b e-flex e-con-boxed e-con e-parent\" data-id=\"052887b\" data-element_type=\"container\" id=\"section05\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b54f620 e-con-full e-flex e-con e-child\" data-id=\"b54f620\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-497db7f e-con-full e-flex e-con e-child\" data-id=\"497db7f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-097e3fe elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"097e3fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DATA<br \/>\nPROTECTION<br \/>\nSTRATEGIES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f55bb76 elementor-widget elementor-widget-text-editor\" data-id=\"f55bb76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAs AI systems handle increasing volumes of\nsensitive data, ensuring robust data\nprotection measures is essential. Without\nproper safeguards, organisations risk data\nbreaches, compliance violations and loss of\ntrust.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ba4a0c e-con-full e-flex e-con e-child\" data-id=\"9ba4a0c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d9a02c elementor-widget elementor-widget-image\" data-id=\"0d9a02c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"646\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/data-protection-strategies-1024x882.png\" class=\"attachment-large size-large wp-image-38656\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/data-protection-strategies-1024x882.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/data-protection-strategies-300x258.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/data-protection-strategies-768x661.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/data-protection-strategies.png 1080w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:86.11%;max-width:1080px\" title=\"data-protection-strategies\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6a0986 e-con-full e-flex e-con e-child\" data-id=\"a6a0986\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-64e74b9 e-con-full e-flex e-con e-child\" data-id=\"64e74b9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6956df5 e-con-full e-flex e-con e-child\" data-id=\"6956df5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-129ee23 elementor-widget elementor-widget-heading\" data-id=\"129ee23\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4b7e35 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d4b7e35\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementing Data\nAnonymisation and Encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05585d8 elementor-widget elementor-widget-text-editor\" data-id=\"05585d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI systems process vast amounts of sensitive data, making them prime targets for cyber threats. Data anonymisation removes personally identifiable information (PII) from datasets, ensuring if data is accessed without authorisation, it cannot be traced back to individuals.<\/p><p>Encryption further strengthens security by converting data into unreadable formats unless decrypted with authorised keys. These measures help safeguard confidential information, reduce regulatory risks and prevent data misuse in AI applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c23b4a2 e-con-full e-flex e-con e-child\" data-id=\"c23b4a2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9dbdb6b e-con-full e-flex e-con e-child\" data-id=\"9dbdb6b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03fca6b elementor-widget elementor-widget-heading\" data-id=\"03fca6b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6deab7e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6deab7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conducting Regular\nData Audits<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c847e4 elementor-widget elementor-widget-text-editor\" data-id=\"4c847e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Regular data audits are essential for identifying vulnerabilities, ensuring compliance with data protection regulations and maintaining the integrity of AI systems. By routinely reviewing data flows, storage locations and access logs, organisations can detect anomalies, assess risks and implement corrective actions before security breaches occur. Audits also ensure that AI models are trained on secure and high-quality data, reducing the likelihood of biased or inaccurate outputs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1ac678 e-con-full e-flex e-con e-child\" data-id=\"e1ac678\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a407f2 e-con-full e-flex e-con e-child\" data-id=\"3a407f2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1dc8e18 e-con-full e-flex e-con e-child\" data-id=\"1dc8e18\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4e72da elementor-widget elementor-widget-heading\" data-id=\"f4e72da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7365c93 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"7365c93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Applying Privacy-by-\nDesign Principles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2cf5ce elementor-widget elementor-widget-text-editor\" data-id=\"f2cf5ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Embedding security and privacy into AI systems from the outset minimises risks and ensures compliance with evolving regulations. Privacy-by-design (Think Zero Trust) involves integrating protective measures such as data minimisation, secure data handling practices and transparency into the entire AI development lifecycle. This proactive approach reduces the likelihood of data leaks, unauthorised access and ethical concerns while fostering trust among users and stakeholders.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26fdb94 e-con-full e-flex e-con e-child\" data-id=\"26fdb94\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ed1cc27 e-con-full e-flex e-con e-child\" data-id=\"ed1cc27\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afec1ac elementor-widget elementor-widget-heading\" data-id=\"afec1ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de65493 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"de65493\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Access Control and\nLeast Privilege Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5747764 elementor-widget elementor-widget-text-editor\" data-id=\"5747764\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Strict access control measures limit who can interact with AI systems and the data they process. Implementing the principle of least privilege ensures employees, developers and AI models only have access to the specific data and functions necessary for their tasks at the time required or just in time. Role-based access controls (RBAC), multi factor authentication (MFA) and regular permission reviews further enhance security by preventing insider threats and unauthorised modifications to AI models.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7cce04f e-flex e-con-boxed e-con e-parent\" data-id=\"7cce04f\" data-element_type=\"container\" id=\"section06\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1e137dc e-con-full e-flex e-con e-child\" data-id=\"1e137dc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b71129 elementor-widget elementor-widget-image\" data-id=\"2b71129\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"753\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock.png\" class=\"attachment-full size-full wp-image-38657\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock.png 2400w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock-300x94.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock-1024x321.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock-768x241.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock-1536x482.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock-2048x643.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/web-lock-1568x492.png 1568w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" style=\"width:100%;height:31.38%;max-width:2400px\" title=\"web-lock\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d2291fc e-con-full e-flex e-con e-child\" data-id=\"d2291fc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cb0538 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3cb0538\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECURITY\nMEASURES FOR\nAI SYSTEMS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc0c80b e-con-full e-flex e-con e-child\" data-id=\"dc0c80b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9153e62 elementor-widget elementor-widget-text-editor\" data-id=\"9153e62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAI systems must be built with security at their core to withstand evolving cyber threats. Strengthening\nsecurity measures across AI development, deployment, and monitoring helps prevent attacks,\nunauthorised access, and operational failures.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66e636f e-con-full e-flex e-con e-child\" data-id=\"66e636f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ffbc9d6 e-con-full e-flex e-con e-child\" data-id=\"ffbc9d6\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9c86760 e-con-full e-flex e-con e-child\" data-id=\"9c86760\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e13d650 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e13d650\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98a1350 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"98a1350\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Integrating Security into AI Development<\/strong><\/p>\n<p>Security should be a foundational aspect of AI development rather than an afterthought. Secure coding practices such as input validation, code reviews, and adversarial testing help identify and mitigate vulnerabilities early in the development process. Implementing securityfocused machine learning frameworks and conducting rigorous security assessments ensure AI models remain resilient against cyber threats throughout their lifecycle.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4d7fde e-con-full e-flex e-con e-child\" data-id=\"f4d7fde\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7c6de00 e-con-full e-flex e-con e-child\" data-id=\"7c6de00\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c69f569 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"c69f569\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af67922 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"af67922\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Robust Access Controls and Authentication<\/strong><\/p><p>AI models and their underlying datasets must be protected against unauthorised modifications. Enforcing robust access controls such as MFA, role-based permissions, and cryptographic authentication prevents malicious actors from tampering with model parameters or injecting harmful inputs. AI development environments should also incorporate logging mechanisms to track access and changes, enabling security teams to detect and investigate suspicious activity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33ed2f9 e-con-full e-flex e-con e-child\" data-id=\"33ed2f9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f8a5e06 e-con-full e-flex e-con e-child\" data-id=\"f8a5e06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2180d9d elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2180d9d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62191d7 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"62191d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Regular Updates and Patch Management<\/strong><\/p><p>AI models, like traditional software, are susceptible to evolving threats. Keeping AI systems updated with the latest security patches helps mitigate vulnerabilities that could be exploited by attackers. Regularly retraining AI models with fresh, verified datasets ensures that they remain effective in detecting threats and minimises the risk of adversarial attacks that exploit outdated models.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cc7e93 e-con-full e-flex e-con e-child\" data-id=\"2cc7e93\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7c9da19 e-con-full e-flex e-con e-child\" data-id=\"7c9da19\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e189b16 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e189b16\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbd7aca elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"cbd7aca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Threat Monitoring and Anomaly Detection<\/strong><\/p><p>AI systems must be continuously monitored for unusual behaviour or security breaches. Implementing real-time threat detection tools enables organisations to identify and respond to anomalies such as unexpected model outputs, unauthorised access attempts or adversarial attacks before they escalate. AI-powered security monitoring can enhance traditional cybersecurity efforts, but human oversight remains critical to interpreting complex threats and taking appropriate action.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72e998f e-flex e-con-boxed e-con e-parent\" data-id=\"72e998f\" data-element_type=\"container\" id=\"section07\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7546f5b e-con-full e-flex e-con e-child\" data-id=\"7546f5b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-604126c elementor-widget elementor-widget-heading\" data-id=\"604126c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BUILDING A CULTURE OF\nSECURITY AND AWARENESS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b935d75 elementor-widget elementor-widget-text-editor\" data-id=\"b935d75\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Technology alone cannot secure AI systems, human awareness and proactive security practices are just as crucial. A strong security culture ensures employees understand the risks associated with AI, remain vigilant against potential threats and actively contribute to safeguarding sensitive data and AI models.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cce981a e-con-full e-flex e-con e-child\" data-id=\"cce981a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8230761 e-con-full e-flex e-con e-child\" data-id=\"8230761\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07006ba elementor-widget elementor-widget-heading\" data-id=\"07006ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training Employees on AI-Related Security Risks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ab1b14 elementor-widget elementor-widget-text-editor\" data-id=\"6ab1b14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI security is only as strong as the people managing it. Employees who interact with AI systems whether in development, deployment or daily operations, must be aware of the specific security risks AI introduces. Training programs should cover topics such as data privacy, adversarial attacks, insider threats and how AI can be exploited for cybercrime.<\/p><p>Regular security awareness sessions ensure employees stay informed about emerging threats and best practices for protecting AI-driven systems. A well-trained workforce reduces the risk of accidental data leaks, model manipulation and unauthorised access.<\/p><p>Our Generative AI Sprint Series can teach employees how to productively and safely use AI tools for work. This structured, two part series shows real-world applications of AI to empower employees to immediately apply these skills in their day-to-day roles, allowing them to propel their performance forward without sacrificing security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7b0e45 elementor-widget elementor-widget-heading\" data-id=\"b7b0e45\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fostering a Proactive Security Mindset<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80bca9e elementor-widget elementor-widget-text-editor\" data-id=\"80bca9e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security is not just the responsibility of IT teams, every employee should feel empowered to identify and report AIrelated security concerns. Encouraging a proactive security mindset involves fostering open communication about potential vulnerabilities, creating clear reporting channels and recognising employees who contribute to security improvements.<\/p><p>A workplace culture valuing vigilance and accountability helps detect threats early, mitigating risks before they escalate into major security incidents. Regular security drills and gamified training can further engage employees and reinforce the importance of AI security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd3aae1 e-con-full e-flex e-con e-child\" data-id=\"bd3aae1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac53cbf elementor-widget elementor-widget-image\" data-id=\"ac53cbf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"1024\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/culture-of-security-568x1024.png\" class=\"attachment-large size-large wp-image-38658\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/culture-of-security-568x1024.png 568w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/culture-of-security-166x300.png 166w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/culture-of-security-768x1385.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/culture-of-security-852x1536.png 852w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/culture-of-security.png 1026w\" sizes=\"(max-width: 568px) 100vw, 568px\" style=\"width:100%;height:180.31%;max-width:1026px\" title=\"culture-of-security\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ed32b7 elementor-widget elementor-widget-heading\" data-id=\"2ed32b7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security is not just the\nresponsibility of IT\nteams, every employee\nshould feel empowered\nto identify and report AI\nrelated security\nconcerns.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a37694b elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a37694b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9557246\" data-id=\"9557246\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c3ca83 elementor-widget elementor-widget-heading\" data-id=\"6c3ca83\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Developing AI Incident Response Plans<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8396741 elementor-widget elementor-widget-text-editor\" data-id=\"8396741\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Even with strong preventive measures, security incidents can still occur. Having a structured AI-specific incident response plan ensures organisations can react quickly and effectively when faced with a cyberattack, data breach or AI model compromise.<\/p><p>A well-designed plan should outline key response steps, assign responsibilities, and establish protocols for containment, mitigation and recovery. Regular simulations and tabletop exercises can test the effectiveness of the response plan, helping teams refine their strategies for handling real-world AI security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e860aa elementor-widget elementor-widget-heading\" data-id=\"8e860aa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Collaborating with Security Experts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34807c4 elementor-widget elementor-widget-text-editor\" data-id=\"34807c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAI security threats are constantly evolving, making it essential for organisations to collaborate with\ncybersecurity professionals who specialise in AI-related risks. External security experts bring valuable\ninsights, conduct in-depth risk assessments and provide guidance on strengthening defences.\nEngaging with ethical hackers, participating in AI security communities, and working with third-party\nsecurity firms can help organisations stay ahead of emerging threats. Collaboration also extends to\nregulatory bodies and industry peers, ensuring that AI security strategies align with best practices and\ncompliance requirements.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0efd5a3 elementor-widget elementor-widget-image\" data-id=\"0efd5a3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2456\" height=\"1218\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion.png\" class=\"attachment-full size-full wp-image-38663\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion.png 2456w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion-300x149.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion-1024x508.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion-768x381.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion-1536x762.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion-2048x1016.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-discusssion-1568x778.png 1568w\" sizes=\"(max-width: 2456px) 100vw, 2456px\" style=\"width:100%;height:49.59%;max-width:2456px\" title=\"ai-discusssion\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-bfe6287 e-flex e-con-boxed e-con e-parent\" data-id=\"bfe6287\" data-element_type=\"container\" id=\"section08\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-74d4de3 e-con-full e-flex e-con e-child\" data-id=\"74d4de3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bbd224e e-con-full e-flex e-con e-child\" data-id=\"bbd224e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a49756 elementor-widget elementor-widget-heading\" data-id=\"7a49756\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTINUOUS MONITORING\nAND IMPROVEMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a99096d elementor-widget elementor-widget-text-editor\" data-id=\"a99096d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI security is not a one-time effort or one and done. Like all security initiatives, AI security requires ongoing monitoring, evaluation and enablement. Threat actors continuously develop new tactics, and AI systems evolve over time, introducing new security challenges. Organisations must adopt a continuous improvement approach to maintain a strong security posture and respond to emerging risks effectively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc2c31b e-con-full e-flex e-con e-child\" data-id=\"bc2c31b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-653800e e-con-full e-flex e-con e-child\" data-id=\"653800e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-75695d5 e-con-full e-flex e-con e-child\" data-id=\"75695d5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d654898 elementor-widget elementor-widget-heading\" data-id=\"d654898\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e95d73 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3e95d73\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Measuring the Effectiveness\nof AI Security Measures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de41e86 elementor-widget elementor-widget-text-editor\" data-id=\"de41e86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Assessing AI security performance is critical for understanding how well existing protections are working. Organisations should establish key security metrics, such as the number of detected threats, response times to incidents and the success rate of AI-driven threat detection. Security audits, penetration testing and red team exercises can help identify weaknesses in AI defences.\u00a0<\/p><p>By consistently tracking these metrics, organisations can pinpoint areas for improvement and ensure their AI security measures remain effective.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7e2e00 e-con-full e-flex e-con e-child\" data-id=\"e7e2e00\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-c77e87f e-con-full e-flex e-con e-child\" data-id=\"c77e87f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-268a780 elementor-widget elementor-widget-heading\" data-id=\"268a780\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5161c6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d5161c6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Updating Security\nPolicies as AI Evolves<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bcbe55 elementor-widget elementor-widget-text-editor\" data-id=\"5bcbe55\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI security policies must evolve alongside advancements in AI technologies. New use cases, regulatory changes and emerging threats require organisations to regularly review and update their security policies.<\/p><p>Policies should address issues such as data handling, access control, model retraining procedures and incident response protocols. Implementing a framework for periodic policy reviews ensures that security measures stay relevant and adaptable to the changing AI landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0148791 e-con-full e-flex e-con e-child\" data-id=\"0148791\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-459a023 e-con-full e-flex e-con e-child\" data-id=\"459a023\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d6e83b2 e-con-full e-flex e-con e-child\" data-id=\"d6e83b2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1466c30 elementor-widget elementor-widget-heading\" data-id=\"1466c30\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b599cae elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b599cae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Using AI for Cybersecurity\nMonitoring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0bb0cc elementor-widget elementor-widget-text-editor\" data-id=\"c0bb0cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>AI is not just a security risk\u2014it can also be a powerful tool for enhancing cybersecurity. AI-driven security solutions can analyse vast amounts of data in real time, detecting patterns and anomalies to indicate potential cyber threats. Machine learning models can identify phishing attempts, detect malware, and flag suspicious user behaviour faster than traditional security methods.<\/p><p>By integrating AI-powered monitoring tools into cybersecurity frameworks, organisations can improve threat detection accuracy and reduce response times. However, human oversight remains essential to validate AI-generated alerts and prevent false positives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a11f81 e-con-full e-flex e-con e-child\" data-id=\"7a11f81\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a6fba23 e-con-full e-flex e-con e-child\" data-id=\"a6fba23\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104f519 elementor-widget elementor-widget-heading\" data-id=\"104f519\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0342536 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"0342536\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Planning for Future AI\nSecurity Challenges<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a3cc25 elementor-widget elementor-widget-text-editor\" data-id=\"3a3cc25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The rapid advancement of AI technologies brings both opportunities and risks. As AI systems become more autonomous, complex, and integrated into critical infrastructure, security threats will evolve in unforeseen ways.<\/p><p>Organisations must take a forward-thinking approach by anticipating future challenges and investing in research, training and proactive security measures. Scenario planning, collaboration with AI ethics committees and staying informed about AI security trends can help organisations prepare for the next wave of AI-related threats. Future-proofing AI security strategies ensures resilience against emerging cyber risks and maintains trust in AI-driven systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e582273 e-flex e-con-boxed e-con e-parent\" data-id=\"e582273\" data-element_type=\"container\" id=\"section09\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d93f71f e-con-full e-flex e-con e-child\" data-id=\"d93f71f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10e8fa5 elementor-widget elementor-widget-image\" data-id=\"10e8fa5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1157\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-scaled.png\" class=\"attachment-full size-full wp-image-38664\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-scaled.png 2560w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-300x136.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-1024x463.png 1024w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-768x347.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-1536x694.png 1536w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-2048x925.png 2048w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/ai-conclusion-1568x709.png 1568w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" style=\"width:100%;height:45.2%;max-width:2560px\" title=\"ai-conclusion\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25dfbbd e-con-full e-flex e-con e-child\" data-id=\"25dfbbd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bfc8e9 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"7bfc8e9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONCLUSION - SECURING AI FOR\nTHE FUTURE: A CONTINUOUS EFFORT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45d8983 e-con-full e-flex e-con e-child\" data-id=\"45d8983\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2e3e71 elementor-widget elementor-widget-text-editor\" data-id=\"b2e3e71\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAI is transforming business\noperations, enhancing efficiency\nand innovation while\nsimultaneously introducing new\ncybersecurity challenges.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb01c6f elementor-widget elementor-widget-text-editor\" data-id=\"cb01c6f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAs AI-powered threats grow in\nsophistication, organisations must take a\nproactive stance to safeguard their systems,\ndata and users. Security cannot be an\nafterthought it must be embedded into\nevery stage of AI adoption.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-022d819 elementor-widget elementor-widget-text-editor\" data-id=\"022d819\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>By assessing security readiness, strengthening data protection policies and implementing robust governance frameworks, businesses can mitigate AI-driven risks. The key to secure AI adoption lies in continuous monitoring, collaboration between security and AI teams, and a commitment to evolving security strategies in response to emerging threats.<\/p><p>AI is here to stay, and so are the cyber risks that come with it. Organisations prioritising security from the outset will be best positioned to harness AI\u2019s full potential without compromising their defences. The future of AI-driven business depends on striking the right balance between innovation and security ensuring AI remains an asset, not a liability.<\/p><p>At Insentra, we understand the complexities of securing AI systems. Our expertise in cybersecurity, information architecture, data protection, and AI risk management ensures organisations can confidently embrace AI without compromising security. Whether it\u2019s assessing AI vulnerabilities, implementing security best practices or providing ongoing monitoring and support, we\u2019ll help you assess your information architecture to ensure you can leverage a resilient AI environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-136cc53 elementor-section-stretched elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"136cc53\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-59dc0fa\" data-id=\"59dc0fa\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f94f936 elementor-widget elementor-widget-image\" data-id=\"f94f936\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout.jpg\" class=\"attachment-large size-large wp-image-38613\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout.jpg 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout-300x300.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout-150x150.jpg 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"executive-guide-ai-security-fanout\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4585f7c\" data-id=\"4585f7c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a26f58 elementor-widget elementor-widget-heading\" data-id=\"7a26f58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOWNLOAD THE EBOOK<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9d1952 elementor-widget elementor-widget-html\" data-id=\"a9d1952\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js?pre=1\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"3753ca95-5be1-4cf9-9b98-05545a4edd78\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '?thank-you=yes', onBeforeFormSubmit($form, submissionValues){ for(var i=0; i<submissionValues.length; i++){ if(submissionValues[i].name=='email'){ createCookie('hsThankEmail', submissionValues[i].value, 1); }} },\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n        }\r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64cbcf4 elementor-section-full_width thank-you-section elementor-section-height-default elementor-section-height-default\" data-id=\"64cbcf4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a0644fb\" data-id=\"a0644fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-321cb5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"321cb5e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1f93bb1\" data-id=\"1f93bb1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4ed7df elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d4ed7df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thank you for downloading our eBook \u201cThe Executive\u2019s Guide to AI Security eBook \u201d <\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-11ee39b elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11ee39b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f7d76e6\" data-id=\"f7d76e6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7daa273 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7daa273\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout.jpg\" class=\"attachment-large size-large wp-image-38613\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout.jpg 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout-300x300.jpg 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/08\/executive-guide-ai-security-fanout-150x150.jpg 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"executive-guide-ai-security-fanout\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c4c5f2 elementor-widget elementor-widget-spacer\" data-id=\"1c4c5f2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4605e84 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4605e84\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d72dc11 elementor-section-content-middle d-none elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d72dc11\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-123b9f0\" data-id=\"123b9f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc4e4e1 elementor-widget__width-initial thankyou-image elementor-widget elementor-widget-image\" data-id=\"cc4e4e1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png\" class=\"attachment-full size-full wp-image-21263\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/elementor\/thumbs\/MicrosoftTeams-image-11-qbqv5jsavmp9rkx66i62yuy5xigmcem8kgpud0le48.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/09\/MicrosoftTeams-image-11-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"MicrosoftTeams-image-11.png\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a30dbcf elementor-widget elementor-widget-text-editor\" data-id=\"a30dbcf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve sent a copy to your inbox. Remember to mark <b>hello@insentragroup.com<\/b> as a \u201csafe sender\u201d, and to check any junk or spam folders so you receive your copy.\u202f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0f49dac booking-box\" data-id=\"0f49dac\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb7510c elementor-widget elementor-widget-html\" data-id=\"cb7510c\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<style>\r\n.booking-box .elementor-column.elementor-col-20 {\r\n    width: 10%;\r\n    padding-top: 11px;\r\n    background-color: #fff;\r\n    text-align:center !important;\r\n    border: solid 1px #ededed;\r\n    border-radius: 4px;\r\n    font-size: 12px;\r\n}\r\n.booking-box .elementor-column.elementor-col-80 {\r\n    width: 90%;\r\n}\r\n.booking-box .meeting-avatar {\r\n\ttransform: scale(1);\r\n\tanimation: pulse 1s infinite;\r\n}\r\n@keyframes pulse {\r\n\t0% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0.7);\r\n\t}\r\n\r\n\t70% {\r\n\t\ttransform: scale(1);\r\n\t\tbox-shadow: 0 0 0 10px rgba(0, 0, 0, 0);\r\n\t}\r\n\r\n\t100% {\r\n\t\ttransform: scale(0.95);\r\n\t\tbox-shadow: 0 0 0 0 rgba(0, 0, 0, 0);\r\n\t}\r\n}    \r\n<\/style>\r\n<div class=\"text-center mb-3\">\r\n    <img decoding=\"async\" src=\"https:\/\/avatars.hubspot.net\/2450d4f47b3e5475f6e6fb18cd74deb3-100\" class=\"rounded-circle shadow meeting-avatar\" style=\"max-height:72px;\" \/>\r\n<\/div>\r\n<script>\r\njQuery(function($){\r\n    var hsThankEmail = readCookie('hsThankEmail');\r\n    if(hsThankEmail != ''){\r\n        console.log(hsThankEmail);\r\n        $('#hsbookingform [type=\"email\"]').val(hsThankEmail);\r\n    }\r\n    $(document).on('submit', '#hsbookingform', function(e){\r\n        e.preventDefault();\r\n        var theForm = $(this);\r\n        theForm.find('[type=\"submit\"]').html('<i class=\"fa fa-spinner fa-spin\"><\/i> Processing...');\r\n        var data = {\r\n            action: 'submissionGuidCheck',\r\n            meeting_date: $(\"#form-field-date\").val(),\r\n            meeting_time: $(\"#form-field-time\").val(),\r\n            meeting_email: $(\"#form-field-email_address\").val()\r\n        }\r\n        $.post(ElementorProFrontendConfig.ajaxurl, data, function(response){\r\n            console.log(JSON.parse(response)); \r\n        });\r\n        return false;   \r\n    });\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5cfdf elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"3c5cfdf\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Consult\\nChat\\nDiscuss&quot;,&quot;rotate_iteration_delay&quot;:1000,&quot;animation_type&quot;:&quot;typing&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\"><i class=\"far fa-smile\"><\/i><\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tConsult\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tChat\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tDiscuss\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">with our experts!<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56f3d54 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"56f3d54\" data-element_type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"hsbookingform\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"38542\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"56f3d54\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"The Executive&#039;s Guide to AI Security - New Zealand\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"38542\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_a6276d7 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-calendar\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-date elementor-field-group elementor-column elementor-field-group-date elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\n\t\t<input type=\"date\" name=\"form_fields[date]\" id=\"form-field-date\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-date-field\" placeholder=\"Meeting Date\" required=\"required\" pattern=\"[0-9]{4}-[0-9]{2}-[0-9]{2}\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c969df1 elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-clock\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-time elementor-field-group elementor-column elementor-field-group-time elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t<input type=\"time\" name=\"form_fields[time]\" id=\"form-field-time\" class=\"elementor-field elementor-size-sm  elementor-field-textual elementor-time-field\" placeholder=\"Meeting Time\" required=\"required\">\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_dd3a67c elementor-col-20\">\n\t\t\t\t\t<i class=\"fa fa-envelope\"><\/i>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email_address elementor-col-80 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email_address]\" id=\"form-field-email_address\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Your Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-check\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 64h-48V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v52H160V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v52H48C21.49 64 0 85.49 0 112v352c0 26.51 21.49 48 48 48h352c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V160h352v298a6 6 0 0 1-6 6zm-52.849-200.65L198.842 404.519c-4.705 4.667-12.303 4.637-16.971-.068l-75.091-75.699c-4.667-4.705-4.637-12.303.068-16.971l22.719-22.536c4.705-4.667 12.303-4.637 16.97.069l44.104 44.461 111.072-110.181c4.705-4.667 12.303-4.637 16.971.068l22.536 22.718c4.667 4.705 4.636 12.303-.069 16.97z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book Now<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f4898d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f4898d3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a05eb40\" data-id=\"a05eb40\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-015976a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"015976a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#relevantResources\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-circle-down\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 137-111 248-248 248S8 393 8 256 119 8 256 8s248 111 248 248zM273 369.9l135.5-135.5c9.4-9.4 9.4-24.6 0-33.9l-17-17c-9.4-9.4-24.6-9.4-33.9 0L256 285.1 154.4 183.5c-9.4-9.4-24.6-9.4-33.9 0l-17 17c-9.4 9.4-9.4 24.6 0 33.9L239 369.9c9.4 9.4 24.6 9.4 34 0z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11042f6 elementor-widget elementor-widget-text-editor\" data-id=\"11042f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXP182018858 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-usefontface=\"false\" data-contrast=\"none\"><span class=\"NormalTextRun SCXP182018858 BCX0\">In the meantime, we thought you might find these resources useful\u00a0<span class=\"EOP SCXP182018858 BCX0\">\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-66c8f4e relevant-resources elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"66c8f4e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7da5ba1\" data-id=\"7da5ba1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a16d1f7 elementor-widget elementor-widget-image\" data-id=\"a16d1f7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/generative-ai-series-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/01\/Gen-AI-Ebook-Fanout-1.png\" class=\"attachment-large size-large wp-image-35701\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/01\/Gen-AI-Ebook-Fanout-1.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/01\/Gen-AI-Ebook-Fanout-1-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/01\/Gen-AI-Ebook-Fanout-1-150x150.png 150w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/01\/elementor\/thumbs\/Gen-AI-Ebook-Fanout-1-r0p4zqxnbaw91q96sc2c30vzn907nzfslinvohu7m2.png 225w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/01\/elementor\/thumbs\/Gen-AI-Ebook-Fanout-1-r0p4zqxndhu2mmnvia3w6ttwp47slklkw3w4zkd2m4.png 230w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"Gen AI Ebook Fanout (1)\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8418cfc elementor-widget elementor-widget-heading\" data-id=\"8418cfc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/generative-ai-series-whitepaper\/\">How to Not Be Replaced by AI: The Definitive Guide to Gen AI in the Workplace\u202f\u202f <\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5678b3c elementor-widget elementor-widget-text-editor\" data-id=\"5678b3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW15440114 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW15440114 BCX0\">Hybrid work has introduced new challenges in the landscape of device management. Level up your endpoint management with Microsoft Intune!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccc28c3 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"ccc28c3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/generative-ai-series-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f52432d\" data-id=\"f52432d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2362763 elementor-widget elementor-widget-image\" data-id=\"2362763\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/ai-playbook-for-leaders-whitepaper\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Playbook-for-Leaders.png\" class=\"attachment-full size-full wp-image-36625\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Playbook-for-Leaders.png 600w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Playbook-for-Leaders-300x300.png 300w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Playbook-for-Leaders-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" title=\"AI Playbook for Leaders\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4776852 elementor-widget elementor-widget-heading\" data-id=\"4776852\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/ai-playbook-for-leaders-whitepaper\/\">The AI Playbook for Leaders: From the Starting Line to the Podium<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579aec6 elementor-widget elementor-widget-text-editor\" data-id=\"579aec6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tPlanning a migration to Microsoft Defender for Endpoint (MDE) from a third-party endpoint protection solution? Gaining a comprehensive understanding of how MDE works and integrates with other Microsoft solutions is crucial for a seamless transition. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5485b28 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"5485b28\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/resources\/ebooks-and-guides\/ai-playbook-for-leaders-whitepaper\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5bcf0ab\" data-id=\"5bcf0ab\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f92fa0 elementor-widget elementor-widget-image\" data-id=\"0f92fa0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.insentragroup.com\/nz\/services\/generative-ai-series\/sprint-1\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"952\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-807x1024.png\" class=\"attachment-large size-large wp-image-36642\" alt=\"New Zealand | The Executive&#039;s Guide to AI Security\" srcset=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-807x1024.png 807w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-236x300.png 236w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-768x975.png 768w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-1211x1536.png 1211w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-1614x2048.png 1614w, https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2025\/03\/AI-Course-1-1568x1990.png 1568w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:126.89%;max-width:3507px\" title=\"AI-Course-1.png\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e3732d elementor-widget elementor-widget-heading\" data-id=\"3e3732d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.insentragroup.com\/nz\/services\/generative-ai-series\/sprint-1\/\">Generative AI Sprint 1<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9ab599 elementor-widget elementor-widget-text-editor\" data-id=\"f9ab599\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tLearn foundational AI skills in Generative AI Sprint 1, an AI training course designed to help you drive immediate, tangible business impact. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78efef7 elementor-widget__width-auto read-more elementor-widget elementor-widget-button\" data-id=\"78efef7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.insentragroup.com\/nz\/services\/generative-ai-series\/sprint-1\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">READ MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>THE EXECUTIVE\u2019S GUIDE TO AI SECURITY Is AI Your Biggest Security Risk or Your Strongest Defense? Download eBook Table of Contents IntroductionHow AI Is Changing CybersecurityThe Security Challenges of AI AdoptionAssessing Security Readiness for AIData Protection StrategiesSecurity Measures for AI SystemsBuilding a Culture of Security and AwarenessContinuous Monitoring and ImprovementConclusion INTRODUCTION AI is not the&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/nz\/insights\/geek-speak\/secure-workplace\/the-executives-guide-to-ai-security\/\">Continue reading <span class=\"screen-reader-text\">The Executive&#8217;s Guide to AI Security<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-38542","post","type-post","status-publish","format-standard","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/38542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/comments?post=38542"}],"version-history":[{"count":68,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/38542\/revisions"}],"predecessor-version":[{"id":38932,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/posts\/38542\/revisions\/38932"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/media?parent=38542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/categories?post=38542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/nz\/wp-json\/wp\/v2\/tags?post=38542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}