Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesLogical SecuritySecurity Education & Training

Human Oversight Is the Missing Link in GenAI Trust

By Tarek Azhari
AI chip up close
Igor Omilaev via Unsplash
December 16, 2025

Generative AI (genAI) has passed the point of novelty. It’s helping software engineers write code, lawyers draft contracts, and physicians summarize medical notes. It has quickly and quietly woven its way into the tools people use every day.

The speed of genAI adoption has been staggering, but so has the uncertainty it has ushered in. As adoption continues to accelerate, one significant question looms: When will genAI transition from “experimental” to a truly “enterprise-grade” technology that we can trust with our data?

Building Confidence Through Oversight

For all the enthusiasm around AI’s potential, most technology providers today treat genAI as an optional add-on — one paired with disclaimers that distance them from responsibility for its accuracy, reliability, and compliance. That tension is particularly stark in highly regulated industries where organizations handle sensitive financial, health, or personal data. Here, genAI uncertainty often translates into fear and results in its outright rejection despite all it stands to offer.

But the way forward isn’t to sideline genAI, or even restrict its use to niche situations. It’s to put people at the center of this revolutionary technology. Human oversight is the missing link in building trust. Both genAI users and providers alike must take responsibility to guide safe, accurate, and compliant adoption.

GenAI Requires a Human Safety Net

Unlike traditional software, genAI doesn’t always give deterministic answers. Outputs can be brilliant or deeply flawed. In a high-stakes environment, blind trust in genAI is risky. Biases can creep in, hallucinations can be overlooked, and sensitive data can be shared without proper authorization. While it may seem obvious, human oversight is critical for ensuring the proper adoption of genAI tools.

Before businesses move toward enterprise-wide genAI adoption, there are a few foundational guardrails they should put in place:

  • Train employees on safe inputs: Staff must understand the risks of feeding sensitive data into genAI tools, particularly when third-party large language models (LLMs) process that data. They also should not submit copyrighted content without explicit permission to do so. Annual AI-specific training should become as standard as compliance modules on privacy, anti-corruption, and data security.
  • Review outputs for accuracy and bias: GenAI can accelerate workflows, but the final accountability still rests with people. Human review, also known as a “human-in-the-loop” model, can ensure that outputs meet compliance, accuracy, and ethical standards.
  • Build incident response into genAI use: Just as organizations prepare for security incidents, they must plan for genAI misuse or data leaks. This preparation should be complete with clearly defined escalation paths, remediation steps, and root cause analyses.

Moving Beyond Disclaimers

Human oversight doesn’t stop with end users — genAI tool providers, too, must evolve. As genAI becomes integral to business operations, disclaimers alone become insufficient. These providers must take additional steps to establish themselves as trustworthy for large enterprise use:

  • Adopt stronger data handling practices: Enterprise-grade commitments should include options for zero data retention, regional data residency, and assurances that customer data won’t be repurposed for model training. 
  • Increase transparency: Customers deserve visibility into how inputs and outputs are processed, stored and reviewed. Providers must cite what internal data resources were accessed and referenced in order to deliver the output for genAI features. Generated content should be deleted or anonymized within a reasonably short period of time. Compliance documentation should also be accessible, detailed and auditable. 
  • Offer enforceable assurances: If providers review or fine-tune outputs, there’s a reasonable argument for offering contractual warranties around accuracy or compliance. Much like core software-as-a-service (SaaS) offerings, genAI features can no longer remain “use at your own risk.”

This shift is already being nudged forward by regulators. The EU AI Act and the NIST AI Risk Management Framework, for instance, emphasize human oversight as a cornerstone of safe genAI deployment. Providers that align with these emerging standards early will set the benchmark for enterprise trust.

Building a Trust Framework for Third-Party GenAI Providers

For organizations unwilling to (or unable to do so due to regulatory restrictions) trust third-party genAI providers, self-hosted software deploying LLMs offers maximum control and assurance. Data never leaves the organization’s environment, customer data is isolated, and organizations can apply additional security controls (VPC SC + Org policies (GCP) or SCPs (AWS)).

But the trade-offs are significant. At present, running self-hosted LLMs is expensive, resource-intensive, and requires specialized expertise. For most businesses, particularly outside of the Fortune 500, self-hosting isn’t a realistic long-term solution. That means widespread genAI adoption in highly regulated industries will depend on trust in third-party providers, and in the safeguards those providers are willing to build into their genAI tools.

So what does a trustworthy genAI ecosystem look like? For one, it’s built on a partnership model where both sides — users and providers — shoulder responsibility. Users must commit to education, oversight, and incident response; providers need to deliver transparent governance, robust data protection practices, and enforceable commitments; and regulators should set high expectations, like the EU AI Act, that bring global consistency to oversight and accountability. Collectively, these efforts create the cultural, legal, and technical foundation for mainstream enterprise adoption.

The Road Toward More Empowered GenAI Use

The workplace history of transformative technology tells a consistent story. First comes hype, then fear, then steady integration. Email, mobile devices, and cloud all faced compliance roadblocks before they became indispensable business tools. GenAI is no different, save that the speed of its adoption has been exponentially faster.

Companies in all fields, as well as public sector organizations, cannot miss this crucial opportunity to use genAI to drive efficiency, innovation, and competitiveness. If providers continue to hide behind disclaimers or fail to build in robust data protection practices, they’ll put the brakes on trust as demand moves towards a peak. The answer isn’t to reject genAI or rush into blind adoption. It’s to put people firmly at the center of their strategy.

Ultimately, human oversight will determine when genAI becomes not just mainstream, but enterprise-grade.

KEYWORDS: artificial intelligence (AI) data management data protection enterprise security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tarek azhari headshot

Tarek Azhari is VP of Legal at Sysdig. Image courtesy of Azhari 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people working together at conference table

    Benchmarking is the missing link to cyber resilience

    See More
  • Human brain formed from connections

    Stay a step ahead with the missing link in cybercrime defense: OSINT

    See More
  • Help desk employees

    Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing