**London**: As businesses embrace AI to enhance IT service efficiency, concerns regarding data security and compliance grow. CIOs and CISOs are urged to adopt stringent measures to ensure transparent AI integration while preserving data governance, as highlighted in a recent report by CIO Middle East.
In the rapidly evolving landscape of artificial intelligence (AI), businesses are increasingly tapping into the technology to enhance growth and operational efficiency. This shift is particularly evident in IT service and operations, commonly referred to as ServiceOps, where AI agents are deployed for a range of purposes, including providing contextual insights, managing incident responses, predicting change risks, and overseeing vulnerability management.
However, as highlighted in a recent report by CIO Middle East, the integration of AI, especially large language models (LLMs), presents substantial challenges related to data security and compliance. The complexity of AI models, often known as “black boxes”, complicates understanding of how data is processed, stored, and aligned with existing policies. The multi-faceted nature of these technologies raises additional concerns regarding data residency, exacerbating risks surrounding the potential for unintended data leakage.
Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) are urged to approach the deployment of generative AI and agentic AI with caution, ensuring that applications and data remain secure while harnessing AI’s capabilities. It is crucial for these leaders to remain informed about the latest trends in data security and compliance, facilitating the safe incorporation of AI into their business processes.
A set of questions has been suggested for CIOs and CISOs to evaluate when considering AI platforms that incorporate AI agents. These inquiries cover vital aspects of the technology’s implementation, such as the method of access control, data encryption practices, and considerations surrounding data residency. Furthermore, it is essential to ascertain the types of data utilised to train AI models, the ownership status of data, and exposure to third-party vendors. Understanding how these AI models undergo audits is also critical, underscoring the need for thorough compliance assessments.
BMC Helix, in response to these concerns, has emphasised their commitment to data security and ownership for their customers. According to the report, BMC Helix users retain complete control over their data, with all incident tickets and related information remaining securely within either BMC Helix systems or third-party applications. This assurance allows organisations to leverage existing security measures, thus fostering trust in AI operations.
BMC Helix has implemented stringent protocols, including strong encryption for both data in transit and at rest. Data is confined within the geographical regions agreed upon in contracts, alleviating concerns about data residency. Notably, BMC HelixGPT—BMC’s proprietary GPT model—does not store customer data in its AI models; the information can only be accessed for training purposes, aligning with rigorous data privacy and compliance frameworks.
Furthermore, the AI model operates in a stateless fashion, processing each request independently to provide precise assistance in various IT scenarios. For IT operations management, the model utilises customer incident data to refine its processes in categorising incidents, identifying root causes, and evaluating risks.
Despite these measures, BMC notes the responsibility remains with IT organisations to ensure that their chosen LLM or AI infrastructure providers adhere to data processing requirements and compliance mandates relevant to their specific use cases.
In conclusion, as AI continues to shape the future of IT operations, fostering a secure and transparent data environment remains paramount. Businesses must navigate security and compliance challenges effectively, signalling a new era where AI not only enhances productivity but also demands rigorous attention to data governance.
Source: Noah Wire Services



