SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Vanta introduces ISO 42001 to ensure responsible AI usage and development

8 Apr 2024

Vanta introduces ISO 42001 to ensure responsible AI usage and development
Contact company
Contact Vanta
icon Add as a preferred source Download PDF version
Related Links
  • Powering the future of trust management: Introducing Vanta AI
  • What are the biggest ethical considerations of security technology?

Vanta, the trust management platform launched support for the ISO 42001 standard, giving customers a framework for responsibly developing and using AI through an AI Management system (AIMS) certified by third-party auditors.

Aligned with the launch, Vanta unveiled the agenda for VantaCon UK, bringing their annual user conference to London on 23 April to discuss global trends in security, compliance, and the future of trust in an AI world amongst a gathering of experts and Vanta customers.

Data management concerns

According to Vanta’s State of Trust Report, 54% of business and IT leaders globally are concerned that secure data management is becoming more challenging with AI adoption, with another 51% saying that using Generative AI technologies could erode customer trust.

As a result, security teams are spending more time building trust in their AI-powered products through back-and-forth conversations with prospects and creating bespoke documentation with less time for strategic security initiatives.

Demonstrating AI trust with ISO 42001 in Vanta

ISO 42001 assists by outlining the requirements for establishing, implementing, and maintaining an AIMS

Established by the International Standards Organisation, ISO 42001 defines the requirements of an AIMS that helps organisations responsibly develop and use AI emphasising ethical considerations, transparency, and the necessity of continuous improvement.

Designed for organisations that provide AI-based technologies or use AI sub-processors in their systems, ISO 42001 assists these organisations by outlining the requirements for establishing, implementing, maintaining, and improving an AIMS.

Lifecycle approach

Vanta’s ISO 42001 solution simplifies AI system management through a lifecycle approach, ensuring that ethical considerations and risk management are embedded throughout the product development, deployment, and operational stages.

Vanta centralises all the ISO 42001 requirements in one place and helps customers document their AI policies, including:

  • Centralise and track requirements: Vanta’s ISO 42001 solution comes with 70 new controls to streamline the implementation of governance requirements
  • Establish AI policies and process: Vanta’s included policy templates help customers define the scope of their AIMS, associated risks, impact, and more
  • Build responsible AI practices: Vanta helps customers understand, build, and document their AI practices such as AI system development, usage, and data management within their AI system lifecycle

Coming soon, Vanta will release enhanced documentation automation, which automatically generates an Artificial Intelligence Impact Assessment (AIIA) report based on a customer’s AI provider type, AI model algorithm, the intended use of their system, and more having an AIIA report is a fundamental requirement of ISO 42001, but also to comply with the EU AI Act.

VantaCon UK, the future of trust in an AI world

To dive into the future of trust in an AI world, VantaCon UK is coming to London on 23 April featuring executives, founders, futurists, security experts and investors from Google DeepMind, Financial Times, Proofpoint, Sequoia Capital, Checkout.com, incident.io, Owkin, Evervault and more.

The half-day event includes keynotes, panel discussions, and product announcements to explore where security and compliance are headed next, including:

  • To Trust Management and Beyond: Introducing Vanta’s future product vision presented by Christina Cacioppo, CEO; Jeremy Epling, Chief Product Officer; Stevie Case, Chief Revenue Officer; and innovators from across Vanta.
  • The Future of Trust in an AI World: Generative AI is transforming trust and what it means to be trustworthy. This panel of AI investors, innovators, and technology experts will discuss the obstacles and opportunities of building trust in an AI world. Featuring Christina Cacioppo, CEO, Vanta; Cristina Criddle, Technology Reporter, Financial Times; Pete Hamilton, Co-founder & CTO, incident.io; Luciana Lixandru, Partner, Sequoia Capital; and Tim Sadler, Group Vice President & General Manager, Tessian Group, Proofpoint.
  • The Next Security Frontier: From Automated Compliance to AI: CISOs are in the business of instilling confidence, all while being confronted by more challenges than ever as we navigate an AI world. This panel of pioneering CISOs features Vijay Bolina, CISO, Head of Cybersecurity Research, Google DeepMind; Sean Catlett, former CISO, Reddit & Slack; Leo Cunningham, CISO, Owkin; and Jadee Hanson, CISO, Vanta.
  • The State of Trust in an AI World: Vanta’s annual State of Trust industry report unveils the top barriers to improving and proving security and how AI and automation are transforming trust. Featuring insights and expert analysis from Colette Hanley, VP of Technology Risk, Checkout.com; John Hetherton, Head of Compliance, Evervault; and Jenny Thai, Head of Content, Vanta.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Application security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security monitoring system
  • Security service
  • Testing & Approvals
  • Integration software
  • Cyber security
  • Central Monitoring
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Related links
  • VantaCon UK
  • ANPR Software CCTV software
  • Control Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Transmission Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

"Discover how Vanta's ISO 42001 pioneer solution streamlines and centralises developing responsible AI, with features for secure data management, risk assessment and lifecycle AI policies. Join us at VantaCon UK to discuss more!"

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec