{"id":119777,"date":"2025-01-09T11:50:09","date_gmt":"2025-01-09T16:50:09","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=119777"},"modified":"2025-01-09T11:50:24","modified_gmt":"2025-01-09T16:50:24","slug":"how-to-conduct-an-ai-risk-assessment","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment","title":{"rendered":"AI in The Workplace: How to Conduct an AI Risk Assessment"},"content":{"rendered":"\n<p>Artificial intelligence is reshaping how we work and it\u2019s doing so at an incredible pace. In fact, <a href=\"https:\/\/www.forbes.com\/advisor\/business\/ai-statistics\/\">72%<\/a> of businesses use AI for at least one business function. From writing tools to data analysis, AI is woven into daily tasks without a second thought.<\/p>\n\n\n\n<p>For many organizations the rapid adoption of AI presents both an advantage and a challenge, especially for IT and security teams. It\u2019s no longer a question of whether AI tools are used, but how employees are using them\u2013and more importantly, how you assess and manage the risks that come with it.<\/p>\n\n\n\n<p>We\u2019ve put together a comprehensive guide to help you conduct an AI risk assessment for your organization by simply following 4 foundational steps and knowing what to consider when adopting AI applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It Might Not Steal Your Job, But It\u2019s Here to Stay<\/h2>\n\n\n\n<div class=\"wp-block-cgb-notification-card-wysiwyg notification-card note\"><div class=\"notification-card-content\"><div class=\"notification-card-icon\"><p><img decoding=\"async\" src=\"\/wp-content\/themes\/jumpcloud\/assets\/images\/gutenberg-blocks\/note-icon.png\"\/><\/p><\/div><div class=\"notification-card-copy is-type-body-default\"><div><strong class=\"notification-card-type\">Note:<\/strong> \n<p><a href=\"https:\/\/www.salesforce.com\/news\/stories\/generative-ai-statistics\/\">75%<\/a> of generative AI users aim to automate workplace tasks and utilize generative AI for work-related communications.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n<p>Take a typical day at the office: A marketing team might use an AI-driven tool to draft social media posts, a sales rep might rely on AI to prioritize leads, and a product team might run data analysis through machine learning.&nbsp;<\/p>\n\n\n\n<p>These tools are empowering teams, but as employees freely choose and start using AI applications to streamline their work, they may inadvertently introduce risks by sidestepping IT. And with new AI tools springing up nearly every day, it\u2019s a steep climb for IT and security teams to control which applications are in use, let alone which ones are secure.<\/p>\n\n\n\n<p>When asked about the speed of AI, fear dominates. According to survey data from <a href=\"https:\/\/jumpcloud.com\/blog\/sme-it-report-q3-2024\">JumpCloud\u2019s Q3 SME IT Trends<\/a>,<strong> 61%<\/strong> of organizations agreed that AI is outpacing their organization\u2019s ability to protect against threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Assess The Risk of AI Tools Employees Use<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identification-what-ai-tools-are-being-used-in-your-company\">1. Identification: What AI Tools Are Being Used in Your Company?<\/h3>\n\n\n\n<p>The first step in conducting an AI risk assessment is understanding what AI tools are in use across your organization. This requires a comprehensive inventory of all AI-related accounts and applications employees might be using\u2013whether they are IT-approved or not.<\/p>\n\n\n\n<p>Without this visibility, businesses risk unapproved SaaS applications slipping into daily workflows, leading to security and compliance gaps. There are a few ways for IT teams to approach SaaS discovery and find AI tools. These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Manual inventory:<\/strong> Some companies begin by cataloging known AI tools in use, assigning owners to update the list as new tools emerge. While straightforward, this method can quickly fall out of date as employees adopt new AI tools without any official authorization.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network monitoring:<\/strong> This method tracks web traffic to detect commonly used AI applications. By identifying frequently accessed sites or services, IT can establish a baseline for AI usage. However, it may still cause blindspots when it comes to niche or newly launched tools as it often relies on databases of known or frequently accessed applications.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>App integration review:<\/strong> By analyzing connections to core business applications, IT teams can identify AI tools directly integrated with critical systems. This narrow focus helps address risks to high-value assets, but it may overlook AI tools used outside core applications.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SaaS management solutions:<\/strong> These solutions offer <a href=\"https:\/\/jumpcloud.com\/use-cases\/shadow-it\">automated SaaS discovery<\/a> and monitoring capabilities, allowing IT teams to detect both sanctioned and unsanctioned AI applications quickly. SaaS management tools simplify tracking and reporting on SaaS usage, making it easier to maintain an up-to-date inventory and address shadow IT risks effectively.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-evaluation-how-do-ai-vendors-approach-security-amp-privacy\">2. Evaluation: How Do AI Vendors\u2019 Approach Security &amp; Privacy?<\/h3>\n\n\n\n<p>After identifying which AI tools are in use across your organization, the next step is to evaluate each vendor\u2019s approach to security and privacy. AI applications often handle sensitive data, making it critical to understand the practices of each vendor to prevent potential breaches and data misuse.<\/p>\n\n\n\n<p>When evaluating AI vendors and SaaS applications that use third-party GenAI for their services, IT and security leaders should consider the following key factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Does the vendor adhere to recognized security standards like <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-soc-2-compliance\">SOC 2<\/a>, ISO 27001, or GDPR compliance?<\/li>\n\n\n\n<li>Are data transfers between your organization and the vendor encrypted?<\/li>\n\n\n\n<li>Does the vendor anonymize sensitive data and avoid using customer data for training AI models?<\/li>\n\n\n\n<li>Has the vendor experienced recent data breaches, and how were they handled?<\/li>\n\n\n\n<li>Does the vendor notify clients promptly following a security incident?<\/li>\n\n\n\n<li>What are the vendor\u2019s data retention policies? Is data permanently deleted upon request?<\/li>\n<\/ul>\n\n\n\n<p>These core questions give you a structured way to evaluate the security and privacy practices of each vendor, helping you ensure that only trustworthy tools are adopted within your organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tracing-what-ai-tools-connect-to-core-business-applications\">3. Tracing: What AI Tools Connect to Core Business Applications?<\/h3>\n\n\n\n<p>According to Splunk\u2019s latest security report, <a href=\"https:\/\/www.splunk.com\/en_us\/form\/state-of-security.html\">91%<\/a> of security teams are utilizing generative AI, yet 65% admit they lack a full understanding of the implications.<\/p>\n\n\n\n<p>After identifying and evaluating the AI tools in use, the next step is mapping out which tools interact with your organization\u2019s core business applications. This helps reveal any data-sharing pathways and security implications involved in these integrations.&nbsp;<\/p>\n\n\n\n<p>Key areas to consider include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How are AI tools connecting to core business applications\u2013through APIs, OAuth grants, or other methods?<\/li>\n\n\n\n<li>Are secure protocols like OAuth 2.0 in place to manage access permissions?<\/li>\n\n\n\n<li>Do these connections specify minimal data access (e.g., read-only access) to limit risk?<\/li>\n\n\n\n<li>What specific data is shared between AI tools and business applications?<\/li>\n\n\n\n<li>Are highly sensitive data types (e.g. PII, financial records) being shared? If so, are they encrypted and anonymized?<\/li>\n<\/ul>\n\n\n\n<p>Mapping these connections can uncover vulnerabilities, such as overly broad access scopes or unencrypted data exchange, and helps you ensure that only vetted, secure pathways are used for AI integrations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-communication-how-are-employees-using-ai-tools\">4. Communication: How Are Employees Using AI Tools?<\/h3>\n\n\n\n<p>The final step into assessing AI risks in your organization is to look at how employees interact with AI tools daily. Clear communication and education are vital to making sure they understand the acceptable use of these tools, including which AI applications are approved and how to use them safely.<\/p>\n\n\n\n<p>Without a clear communication, employees may unknowingly bypass IT guidelines or engage in risky AI usage, potentially exposing your organization to security risks.<\/p>\n\n\n\n<p>To improve communication around AI use, consider the following factors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish a clear acceptable use policy\n<ul class=\"wp-block-list\">\n<li>Outline which AI tools are approved and provide guidance on how to request new tools.\u00a0<\/li>\n\n\n\n<li>Make sure this policy addresses data handling best practices to avoid the entry of sensitive or confidential information into any AI tool.<\/li>\n\n\n\n<li>Distribute the policy organization-wide, making it accessible and easy to reference whenever employees have questions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Educate and train employees<\/li>\n\n\n\n<li>Establish a streamlined process for submitting requests for new AI tools<\/li>\n\n\n\n<li>Set up a clear reporting system for employees to raise concerns or report unintended security issues when using AI tools<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How JumpCloud Simplifies Finding &amp; Managing AI Tools<\/h2>\n\n\n\n<p>JumpCloud\u2019s <a href=\"https:\/\/jumpcloud.com\/platform\/software-as-a-service-saas-management\">SaaS Management solution<\/a> simplifies tracking and managing SaaS applications across your organization, including AI tools employees are using\u2013whether authorized or not\u2013ensuring security and compliance.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automatically detect and track AI and other SaaS applications through native integrations with Google Workspace, Microsoft Entra ID, and more.<\/li>\n\n\n\n<li>Identify unauthorized AI tools via browser-based discovery.<\/li>\n\n\n\n<li>Automatically warn users when they attempt to access unapproved AI tools.<\/li>\n\n\n\n<li>Block access to those tools, showing a clear message in the browser to prevent usage.<\/li>\n<\/ul>\n\n\n\n<p>You can also add niche or newly launched AI tools to your inventory manually even before they are detected, ensuring full coverage. Then, IT administrators can easily manage access and report on usage.<\/p>\n\n\n\n<p>Ready to see how JumpCloud SaaS Management simplifies IT? <a href=\"https:\/\/jumpcloud.com\/pricing\">Try it for free<\/a> to see it for yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.<\/p>\n","protected":false},"author":229,"featured_media":89067,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781],"tags":[],"collection":[3291],"platform":[],"funnel_stage":[3015],"coauthors":[3218],"class_list":["post-119777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","collection-saas","funnel_stage-mid-funnel"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI in The Workplace: How to Conduct an AI Risk Assessment - JumpCloud<\/title>\n<meta name=\"description\" content=\"This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in The Workplace: How to Conduct an AI Risk Assessment\" \/>\n<meta property=\"og:description\" content=\"This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-09T16:50:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-09T16:50:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hatice Ozsahan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hatice Ozsahan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\"},\"author\":{\"name\":\"Hatice Ozsahan\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/d3944e30f0d72fdb223bc195ef7fe0d3\"},\"headline\":\"AI in The Workplace: How to Conduct an AI Risk Assessment\",\"datePublished\":\"2025-01-09T16:50:09+00:00\",\"dateModified\":\"2025-01-09T16:50:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\"},\"wordCount\":1275,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg\",\"articleSection\":[\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\",\"url\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\",\"name\":\"AI in The Workplace: How to Conduct an AI Risk Assessment - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg\",\"datePublished\":\"2025-01-09T16:50:09+00:00\",\"dateModified\":\"2025-01-09T16:50:24+00:00\",\"description\":\"This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg\",\"width\":1000,\"height\":750,\"caption\":\"woman typing on her laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI in The Workplace: How to Conduct an AI Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/d3944e30f0d72fdb223bc195ef7fe0d3\",\"name\":\"Hatice Ozsahan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/6ca104465c97240a1d4e29117783bae5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1d1c2ab79d2fed1138a6ca35feca1ac89fd30464894dccd3433dd76a64b90c9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1d1c2ab79d2fed1138a6ca35feca1ac89fd30464894dccd3433dd76a64b90c9?s=96&d=mm&r=g\",\"caption\":\"Hatice Ozsahan\"},\"description\":\"Hatice is a Product Marketing Manager at JumpCloud, often busy bringing product value to life with compelling messages that resonate across all channels. When not at work, she\u2019s either battling it out in online video games or getting creative with her art projects.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI in The Workplace: How to Conduct an AI Risk Assessment - JumpCloud","description":"This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment","og_locale":"en_US","og_type":"article","og_title":"AI in The Workplace: How to Conduct an AI Risk Assessment","og_description":"This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.","og_url":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment","og_site_name":"JumpCloud","article_published_time":"2025-01-09T16:50:09+00:00","article_modified_time":"2025-01-09T16:50:24+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg","type":"image\/jpeg"}],"author":"Hatice Ozsahan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hatice Ozsahan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment"},"author":{"name":"Hatice Ozsahan","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/d3944e30f0d72fdb223bc195ef7fe0d3"},"headline":"AI in The Workplace: How to Conduct an AI Risk Assessment","datePublished":"2025-01-09T16:50:09+00:00","dateModified":"2025-01-09T16:50:24+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment"},"wordCount":1275,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg","articleSection":["How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment","url":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment","name":"AI in The Workplace: How to Conduct an AI Risk Assessment - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg","datePublished":"2025-01-09T16:50:09+00:00","dateModified":"2025-01-09T16:50:24+00:00","description":"This comprehensive guide will help you conduct an AI risk assessment for your organization by following 4 foundational steps.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/05\/typing.jpg","width":1000,"height":750,"caption":"woman typing on her laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/how-to-conduct-an-ai-risk-assessment#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"AI in The Workplace: How to Conduct an AI Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/d3944e30f0d72fdb223bc195ef7fe0d3","name":"Hatice Ozsahan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/6ca104465c97240a1d4e29117783bae5","url":"https:\/\/secure.gravatar.com\/avatar\/e1d1c2ab79d2fed1138a6ca35feca1ac89fd30464894dccd3433dd76a64b90c9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1d1c2ab79d2fed1138a6ca35feca1ac89fd30464894dccd3433dd76a64b90c9?s=96&d=mm&r=g","caption":"Hatice Ozsahan"},"description":"Hatice is a Product Marketing Manager at JumpCloud, often busy bringing product value to life with compelling messages that resonate across all channels. When not at work, she\u2019s either battling it out in online video games or getting creative with her art projects."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/119777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/229"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=119777"}],"version-history":[{"count":1,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/119777\/revisions"}],"predecessor-version":[{"id":119778,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/119777\/revisions\/119778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/89067"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=119777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=119777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=119777"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=119777"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=119777"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=119777"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=119777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}