{"id":24278,"date":"2024-07-02T11:21:29","date_gmt":"2024-07-02T09:21:29","guid":{"rendered":"https:\/\/www.advens.test\/security-operations\/introduction-ia-confiance\/"},"modified":"2025-06-02T13:51:48","modified_gmt":"2025-06-02T11:51:48","slug":"introduction-ia-confiance","status":"publish","type":"post","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/media\/cyber-news-en\/introduction-ia-confiance\/","title":{"rendered":"Introduction to responsible AI"},"content":{"rendered":"\n<p>Just under 50 pages designed as a source of inspiration and information to allow you to navigate the fascinating world of AI with confidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why write about trusted AI in 2024?<\/h2>\n\n\n\n<p>Algorithms are the silent architects of our digital age. They shape each of our interactions, decisions, innovations, like an almost magical force, invisible but omnipresent. This white paper is intended to be an introduction to the complex and captivating world of AI security because their power is accompanied by unique challenges that require detailed understanding and rigorous management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">For whom?<\/h2>\n\n\n\n<p>Intended for technology professionals, whether they are experts in AI or not, this document aims to pragmatically present the issues related to the security of these disruptive technologies.<\/p>\n\n\n\n<p>We take the example of ChatGPT to illustrate these challenges, possible solutions and best practices for secure use of these tools. But of course, it\u2019s not just ChatGPT.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/info.advens.fr\/en\/white-paper-responsible-ai-en\"><strong>Download the White Paper<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just under 50 pages designed as a source of inspiration and information to allow you to navigate the fascinating world of AI with confidence. Why write about trusted AI in 2024? Algorithms are the silent architects of our digital age. They shape each of our interactions, decisions, innovations, like an almost magical force, invisible but [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":24301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[465],"tags":[],"custom_format":[481],"class_list":["post-24278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introduction to responsible AI - Advens<\/title>\n<meta name=\"description\" content=\"A travers des exemples concrets et pertinents, Advens explore les m\u00e9andres de la s\u00e9curit\u00e9 des IA, sous l&#039;angle r\u00e9glementaire, technique, organisationnel, etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to responsible AI - Advens\" \/>\n<meta property=\"og:description\" content=\"A travers des exemples concrets et pertinents, Advens explore les m\u00e9andres de la s\u00e9curit\u00e9 des IA, sous l&#039;angle r\u00e9glementaire, technique, organisationnel, etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-02T09:21:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T11:51:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1001\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Benjamin Leroux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\"},\"author\":{\"name\":\"Benjamin Leroux\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7\"},\"headline\":\"Introduction to responsible AI\",\"datePublished\":\"2024-07-02T09:21:29+00:00\",\"dateModified\":\"2025-06-02T11:51:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\"},\"wordCount\":154,\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png\",\"articleSection\":[\"Cyber News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\",\"url\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\",\"name\":\"Introduction to responsible AI - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png\",\"datePublished\":\"2024-07-02T09:21:29+00:00\",\"dateModified\":\"2025-06-02T11:51:48+00:00\",\"description\":\"A travers des exemples concrets et pertinents, Advens explore les m\u00e9andres de la s\u00e9curit\u00e9 des IA, sous l'angle r\u00e9glementaire, technique, organisationnel, etc.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png\",\"width\":1001,\"height\":1001},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber News\",\"item\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/cyber-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introduction to responsible AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7\",\"name\":\"Benjamin Leroux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g\",\"caption\":\"Benjamin Leroux\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/benjamin-leroux-1688a4\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introduction to responsible AI - Advens","description":"A travers des exemples concrets et pertinents, Advens explore les m\u00e9andres de la s\u00e9curit\u00e9 des IA, sous l'angle r\u00e9glementaire, technique, organisationnel, etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/","og_locale":"en_US","og_type":"article","og_title":"Introduction to responsible AI - Advens","og_description":"A travers des exemples concrets et pertinents, Advens explore les m\u00e9andres de la s\u00e9curit\u00e9 des IA, sous l'angle r\u00e9glementaire, technique, organisationnel, etc.","og_url":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/","og_site_name":"Advens","article_published_time":"2024-07-02T09:21:29+00:00","article_modified_time":"2025-06-02T11:51:48+00:00","og_image":[{"width":1001,"height":1001,"url":"https:\/\/www.advens.test\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png","type":"image\/png"}],"author":"Benjamin Leroux","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#article","isPartOf":{"@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/"},"author":{"name":"Benjamin Leroux","@id":"https:\/\/www.advens.test\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7"},"headline":"Introduction to responsible AI","datePublished":"2024-07-02T09:21:29+00:00","dateModified":"2025-06-02T11:51:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/"},"wordCount":154,"publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"image":{"@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png","articleSection":["Cyber News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/","url":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/","name":"Introduction to responsible AI - Advens","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png","datePublished":"2024-07-02T09:21:29+00:00","dateModified":"2025-06-02T11:51:48+00:00","description":"A travers des exemples concrets et pertinents, Advens explore les m\u00e9andres de la s\u00e9curit\u00e9 des IA, sous l'angle r\u00e9glementaire, technique, organisationnel, etc.","breadcrumb":{"@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png","width":1001,"height":1001},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/cyber-news\/introduction-ia-confiance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber News","item":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/cyber-news\/"},{"@type":"ListItem","position":3,"name":"Introduction to responsible AI"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.test\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7","name":"Benjamin Leroux","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g","caption":"Benjamin Leroux"},"sameAs":["https:\/\/www.linkedin.com\/in\/benjamin-leroux-1688a4\/"]}]}},"featured_url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2024\/07\/EN_Website-Hompage-1000x1000px.png","_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/comments?post=24278"}],"version-history":[{"count":1,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24278\/revisions"}],"predecessor-version":[{"id":24281,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24278\/revisions\/24281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media\/24301"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media?parent=24278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/categories?post=24278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/tags?post=24278"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/custom_format?post=24278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}