[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4hz1yLLRdFnmT207wwL4tvsBV2n_2kfak8BNoFc-J7g":3,"page-\u002Fuk\u002Fen\u002Fhow-threat-actors-are-manipulating-generative-ai":85,"$fBP3ggdKCJednmsoREfENIZTFy0lKxFd7hEDQFr-feSM":212,"$fDh3cwgtoutvKR5CCE2XRXsY2aAqyi5_cBVUpcKbJovU":249},{"talan_aa_testing_tech_americas":4,"talan_aa_testing_tech_uk":32,"talan_localhost_france":50,"talan_localhost_global":68},{"name":5,"domain_suffix":6,"languages":7,"countries":10,"menus":13,"search_page":16,"career_hub_page":19,"content_hub_page":26},"Americas","americas",{"en":8,"fr":9},"en","fr",[11,12],"us","ca",{"footer":14,"main":15},"dm14049411-footer","dm14049411-main",{"en":17,"fr":18},"\u002Fen\u002Fsearch","\u002Ffr\u002Frechercher",{"en":20,"fr":23},{"url":21,"title":22},"\u002Famericas\u002Fen\u002Fjoin-us\u002Four-job-offers","Our job offers",{"url":24,"title":25},"\u002Famericas\u002Ffr\u002Fnous-rejoindre\u002Fnos-offres-demploi","Nos offres d'emploi",{"en":27,"fr":30},{"url":28,"title":29},"\u002Fen\u002Fpositive-innovation","Positive Innovation",{"url":31,"title":29},"\u002Ffr\u002Fpositive-innovation",{"front_page":33,"name":34,"domain_suffix":35,"languages":36,"countries":37,"menus":39,"search_page":42,"career_hub_page":43,"content_hub_page":46,"domain":49},"\u002Fnode\u002F897","UK","uk",{"en":8},[38],"gb",{"footer":40,"main":41},"dm3910373-footer","dm3910373-main",{"en":17,"fr":18},{"en":44},{"url":45,"title":22},"\u002Fuk\u002Fen\u002Four-job-offers",{"en":47,"fr":48},{"url":28,"title":29},{"url":31,"title":29},"talan_aa_testing_tech_uk",{"front_page":51,"name":52,"domain_suffix":53,"languages":54,"countries":55,"menus":56,"search_page":59,"career_hub_page":60,"content_hub_page":65},"\u002Fnode\u002F686","France","france",{"fr":9},[9],{"footer":57,"main":58},"dm945515-footer","dm945515-main",{"en":17,"fr":18},{"en":61,"fr":63},{"url":62,"title":22},"\u002Ffrance\u002Fen\u002Fjoin-us\u002Four-job-offers",{"url":64,"title":25},"\u002Ffrance\u002Ffr\u002Fnous-rejoindre\u002Fnos-offres-demploi",{"en":66,"fr":67},{"url":28,"title":29},{"url":31,"title":29},{"name":69,"domain_suffix":70,"languages":71,"countries":72,"menus":73,"search_page":76,"career_hub_page":77,"content_hub_page":82},"Global","global",{"en":8,"fr":9},null,{"footer":74,"main":75},"dm1532175-footer","dm1532175-main",{"en":17,"fr":18},{"en":78,"fr":80},{"url":79,"title":22},"\u002Fglobal\u002Fen\u002Fjoin-us\u002Four-job-offers",{"url":81,"title":25},"\u002Fglobal\u002Ffr\u002Fnous-rejoindre\u002Fnos-offres-demploi",{"en":83,"fr":84},{"url":28,"title":29},{"url":31,"title":29},{"title":86,"breadcrumbs":87,"metatags":99,"content_format":117,"content":118,"page_layout":163,"contact_link":164,"blocks":169,"current_user":205,"local_tasks":210,"messages":211},"How Threat Actors are Manipulating Generative AI | Talan - Site groupe",[88,92,96],{"frontpage":89,"url":90,"label":91},true,"\u002Fuk\u002Fen","Home",{"frontpage":93,"url":94,"label":95},false,"\u002Fuk\u002Fen\u002Finsights","Insights",{"frontpage":93,"url":97,"label":98},"","How Threat Actors are Manipulating Generative AI",{"meta":100,"link":108},[101,103,106],{"name":102,"content":86},"title",{"name":104,"content":105},"robots","index, follow",{"property":107,"content":97},"og:image",[109,112,115],{"rel":110,"href":111},"canonical","https:\u002F\u002Fwww.talan.com\u002Fuk\u002Fen\u002Fhow-threat-actors-are-manipulating-generative-ai",{"rel":113,"hreflang":114,"href":111},"alternate","en-GB",{"rel":113,"hreflang":116,"href":111},"x-default","json",{"element":119,"created":120,"headerBody":121,"image":122,"linkedMajorExpertises":137,"publishedDate":151,"title":98,"type":152,"uid":153,"nid":154,"href":155,"lang":8,"domain":35,"libraryOfBloc":156},"node-insight","1723136220","Generative AI has enhanced the capabilities of organisations. However, threat actors are also harnessing it to streamline their campaigns.",{"element":123,"mediaImage":124,"title":135,"type":136},"media-image-responsive-half-banner",{"element":125,"content":126},"field-image",{"srcset":127,"sizes":128,"url":131,"alt":132,"width":133,"height":134},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_400\u002Fpublic\u002F2024-12\u002FHand%20holding%20global%20network%20connection.jpeg.webp?itok=UpPWT0nK 400w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_700\u002Fpublic\u002F2024-12\u002FHand%20holding%20global%20network%20connection.jpeg.webp?itok=J0wJJ-iD 700w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner\u002Fpublic\u002F2024-12\u002FHand%20holding%20global%20network%20connection.jpeg.webp?itok=TO3We1zC 1200w",{"400":129,"700":130,"1200":131},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_400\u002Fpublic\u002F2024-12\u002FHand%20holding%20global%20network%20connection.jpeg.webp?itok=UpPWT0nK","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner_700\u002Fpublic\u002F2024-12\u002FHand%20holding%20global%20network%20connection.jpeg.webp?itok=J0wJJ-iD","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fhalf_banner\u002Fpublic\u002F2024-12\u002FHand%20holding%20global%20network%20connection.jpeg.webp?itok=TO3We1zC","Woman hand holding global network connection. Internet communication, Wireless connection technology","1300","769","Woman hand holding global network connection","image",[138,143,147],{"element":139,"id":140,"name":141,"href":142},"taxonomy-term-expertise-category","1266","Cybersecurity","\u002Fuk\u002Fen\u002Fall-our-insights?expertise=1266",{"element":139,"id":144,"name":145,"href":146},"1270","Data","\u002Fuk\u002Fen\u002Fall-our-insights?expertise=1270",{"element":139,"id":148,"name":149,"href":150},"1278","Artificial Intelligence & Generative AI","\u002Fuk\u002Fen\u002Fall-our-insights?expertise=1278","2024-12-09T17:58:45","insight","31","1191","\u002Fuk\u002Fen\u002Fhow-threat-actors-are-manipulating-generative-ai",[157],{"element":158,"hideSeparator":159,"type":160,"wysiwyg":161},"pg-wysiwyg","0","wysiwyg",[162],"\u003Ch3>\u003Cspan data-contrast=\"auto\">Generative AI has enhanced organisations by automating through supportive actions such as improving productivity, writing code and analysing data.\u003C\u002Fspan>\u003C\u002Fh3>\u003Cp>\u003Cspan data-contrast=\"auto\">However, threat actors are also making use of Generative AI. By applying it to their malicious attacks, it has become powerful new tool at their disposal. Misuse and exploitation of Generative AI features and functions allows attackers to bypass the security limitations that are meant to enforce ethical and legal use of the tools.\u003C\u002Fspan>\u003C\u002Fp>\u003Cul>\u003Cli data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">\u003Cspan data-contrast=\"auto\">\u003Cstrong>Prompt injection\u003C\u002Fstrong> is used by cyber criminals to trick AI models into outputting unauthorised responses with methods such as reverse psychology, encoded text, or hidden characters.\u003C\u002Fspan>\u003C\u002Fli>\u003Cli data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">\u003Cspan data-contrast=\"auto\">\u003Cstrong>Jailbreaking \u003C\u002Fstrong>can allow attackers to bypass safety restrictions with crafted prompts that alter the AI’s behaviour.\u003C\u002Fspan>\u003Cspan data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">&nbsp;\u003C\u002Fspan>\u003C\u002Fli>\u003C\u002Ful>\u003Ch4>\u003Cspan data-contrast=\"none\">Threats Leveraging Generative AI\u003C\u002Fspan>\u003Cspan data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}\">&nbsp;\u003C\u002Fspan>\u003C\u002Fh4>\u003Cp>\u003Cspan data-contrast=\"none\">\u003Cstrong>Phishing Attacks\u003C\u002Fstrong>\u003C\u002Fspan>\u003Cspan data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:278}\">\u003Cstrong>&nbsp;\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"auto\">Generative AI allows quick creation of both targeted and generic \u003C\u002Fspan>\u003Ca href=\"https:\u002F\u002Fwww.microsoft.com\u002Fen-us\u002Fmicrosoft-365-life-hacks\u002Fprivacy-and-safety\u002Fhow-ai-changing-phishing-scams\" target=\"_blank\" rel=\"noopener\">\u003Cspan data-contrast=\"auto\">phishing emails\u003C\u002Fspan>\u003C\u002Fa>\u003Cspan data-contrast=\"auto\"> that lack grammatical and spelling errors, which are usually warning indicators for targets. This makes these types of phishing emails harder to detect by users, and automatic email filtering tools struggle too, due to their added complexity. Using AI also speeds up the creation of phishing emails, which allows threat actors to carry out more campaigns. The added complexity and extra speed dramatically increases the chances of the phishing campaign succeeding.\u003C\u002Fspan>\u003Cspan data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">&nbsp;\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"none\">\u003Cstrong>Identity Impersonation\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"auto\">Deepfake technology is used to generate images and audio based off real people. Generative AI has vastly improved the accuracy and speed of deepfakes, and attackers have begun to exploit this in social engineering, scams, and spreading misinformation (such as impersonating political candidates). These attacks still require a large amount of time and effort to set up. As such, they usually impersonate high profile people like celebrities, politicians and company executives, and create assets that attackers can reuse in multiple attacks. In 2019, scammers received \u003C\u002Fspan>\u003Ca href=\"https:\u002F\u002Fwww.forbes.com\u002Fsites\u002Fjessedamiani\u002F2019\u002F09\u002F03\u002Fa-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000\u002F\" target=\"_blank\" rel=\"noopener\" data-entity-type=\"external\">\u003Cspan data-contrast=\"auto\">€220,000 from an energy company CEO\u003C\u002Fspan>\u003C\u002Fa>\u003Cspan data-contrast=\"auto\"> after impersonating the voice of his boss from the parent company on a phone call.\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"none\">\u003Cstrong>Exploit and Malware Creation\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"auto\">With \u003C\u002Fspan>\u003Ca href=\"https:\u002F\u002Fwww.paloaltonetworks.com\u002Fblog\u002F2024\u002F05\u002Fai-generated-malware\u002F#:~:text=threat%20actors%20will%20use%20AI,volume%20and%20sophistication%20of%20attacks.\" target=\"_blank\" rel=\"noopener\">\u003Cspan data-contrast=\"auto\">AI excelling at code creation\u003C\u002Fspan>\u003C\u002Fa>\u003Cspan data-contrast=\"auto\">, Generative AI is perfect for crafting exploits and malware. Hackers can provide jailbroken AI models with prompts or example code, which they can then use and adapt into malware almost instantly. Due to the speed of creating these exploits, the quickly evolving malware could override typical signature-based detection and could even render it obsolete. Attackers are able to feed information they have gathered about a target’s systems into AI along with a malware example to tailor the attack which could enhance the impacts and scale of the attack.\u003C\u002Fspan>\u003Cspan data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">&nbsp;\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"none\">\u003Cstrong>Data Exfiltration\u003C\u002Fstrong>\u003C\u002Fspan>\u003C\u002Fp>\u003Cp>\u003Cspan data-contrast=\"auto\">Threat actors may steal the training data that is used to create generative AI models. Proven exploits are available online to execute this attack. Although much of the training data is publicly available online, some of the data used may contain sensitive information or require a payment to view. The biggest threat this poses is when companies are using Generative AI for \u003C\u002Fspan>\u003Ca href=\"https:\u002F\u002Fnot-just-memorization.github.io\u002Fextracting-training-data-from-chatgpt.html\" target=\"_blank\" rel=\"noopener\">\u003Cspan data-contrast=\"auto\">customer support chatbots\u003C\u002Fspan>\u003C\u002Fa>\u003Cspan data-contrast=\"auto\"> that have been trained using real customer interactions. This data could contain customer personal information, which threat actors could sell online or use to craft further attacks.\u003C\u002Fspan>\u003C\u002Fp>","default",{"element":165,"link":166},"block-header-contact",{"title":167,"href":168},"Contact us","\u002Fuk\u002Fen\u002Fcontact-us-uk",{"footer_top":170},{"footer_uk":171,"olivero_footerblock":195},{"element":172,"links":173,"logo":180,"subtitle":193,"title":194},"block-content-footer",[174,178],{"title":175,"options":176,"content":177},"Your career",[],"\u002Fuk\u002Fen\u002Fjoin-us\u002Fyour-career",{"title":22,"options":179,"content":45},[],{"element":181,"mediaImage":182,"title":192,"type":136},"media-image-responsive-narrow",{"element":125,"content":183},{"srcset":184,"sizes":185,"url":188,"alt":189,"width":190,"height":191},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=aImG83Wz 325w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=SIEVvEZi 650w, https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=WnG6bPb- 840w",{"325":186,"650":187,"840":188},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_325x325\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=aImG83Wz","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_650x650\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=SIEVvEZi","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fmax_1300x1300\u002Fpublic\u002F2024-10\u002FTalan-curious-mind.png.webp?itok=WnG6bPb-","Talan-curious-mind-logo","325","310","Talan-curious-mind","We believe in the diversity of our profiles, the richness of our experiences, our differences of opinion - this is what creates the strength and relevance of the Talan collective.","Join Us ",{"element":196,"id":197,"label":198,"label_display":199,"provider":200,"title":201,"subtitle":193,"title_cta_1":202,"title_cta_2":175,"title_cta_3":22,"url_cta_1":203,"url_cta_2":204,"url_cta_3":79},"drupal-block-footer-block","footer_block","Footer Block","visible","talan_decoupled","Join Us -","Culture and values","\u002Fglobal\u002Fen\u002Fjoin-us\u002Fculture-and-values","\u002Fglobal\u002Fen\u002Fjoin-us\u002Fyour-career",{"id":206,"name":207,"roles":208},0,"Anonymous",[209],"anonymous",[],[],[213,216,219,222,225,228,231,234,237,240,243,246],{"title":214,"url":215},"Careers","\u002Fuk\u002Fen\u002Fjoin-talan-community-curious-minds",{"title":217,"url":218},"Locations","\u002Fuk\u002Fen\u002Four-locations",{"title":220,"url":221},"Legal information and GTCU","\u002Fuk\u002Fen\u002Flegal-information-and-general-terms-and-conditions-use",{"title":223,"url":224},"Ethics & Compliance","\u002Fuk\u002Fen\u002Fethics-compliance",{"title":226,"url":227},"Privacy policy","\u002Fuk\u002Fen\u002Ftalan-group-data-protection-policy",{"title":229,"url":230},"Binding Corporate Rules","\u002Fuk\u002Fen\u002Fbinding-corporate-rules-processor",{"title":232,"url":233},"Carbon Reduction Plan","\u002Fuk\u002Fen\u002Fcarbon-reduction-plan",{"title":235,"url":236},"Digital accessibility","\u002Fuk\u002Fen\u002Fdigital-accessibility",{"title":238,"url":239},"Disclaimers, Terms & Conditions","\u002Fuk\u002Fen\u002Fdisclaimers-terms-conditions",{"title":241,"url":242},"Grievance Policy & Procedure","\u002Fuk\u002Fen\u002Fgrievance-policy-procedure",{"title":244,"url":245},"Modern Slavery Policy","\u002Fuk\u002Fen\u002Fmodern-slavery-policy",{"title":247,"url":248},"Whistleblower Protection Policy","\u002Fuk\u002Fen\u002Fwhistleblower-protection-policy",[250,361,386,466,489],{"title":251,"url":97,"push_image":252,"push_surtitle":253,"push_title":254,"push_tag":97,"push_url":255,"below":256},"Capabilities","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2026-04\u002FMSI-UK-Carbon-Reduction-Plan.jpg.webp","OUR EXPERTISE","Strategic Sustainability Support with a Leading UK Health Provider","\u002Fuk\u002Fen\u002Fstrategic-sustainability-support-leading-uk-health-provider",[257,277,309,334,340],{"title":258,"url":97,"cta_uri":259,"cta_title":260,"below":261},"Consulting","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fshaping-your-transformation","See all our Consulting expertise",[262,265,268,271,274],{"title":263,"url":264},"Integrating technology into your strategy","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fintegrate-technology-your-strategy",{"title":266,"url":267},"Reinventing your business model","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Freinvent-your-business-model",{"title":269,"url":270},"Strengthen your resilience and operational excellence","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fenhance-your-companys-resilience-and-operational-excellence",{"title":272,"url":273},"Reinventing the customer experience","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Freinvent-customer-experience-talan",{"title":275,"url":276},"Fully engage your company in sustainable transformation","\u002Fuk\u002Fen\u002Fcapabilities\u002Fconsulting\u002Fsustainable-transformation",{"title":278,"url":97,"cta_uri":279,"cta_title":280,"below":281},"Data and AI","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fcapture-richness-your-data","See all our Data x AI expertise",[282,285,288,291,294,297,300,303,306],{"title":283,"url":284},"Data x AI","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-x-ai",{"title":286,"url":287},"Data Analytics","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-analytics",{"title":289,"url":290},"Data Architecture & Solutions Integration","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-architecture-solutions-integration",{"title":292,"url":293},"Data Governance & Compliance","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-governance-compliance",{"title":295,"url":296},"Data Modelling, Data Warehousing & Big Data","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-modelling-data-warehousing-big-data",{"title":298,"url":299},"Data Privacy","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-privacy",{"title":301,"url":302},"Data Quality Management","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-quality-management",{"title":304,"url":305},"Data Science & Data Engineering","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-science-data-engineering",{"title":307,"url":308},"Data Strategy","\u002Fuk\u002Fen\u002Fcapabilities\u002Fdata-and-ai\u002Fdata-strategy",{"title":310,"url":97,"cta_uri":311,"cta_title":312,"below":313},"Technology","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Funleashing-power-technology","See all our technological expertise",[314,317,319,322,325,328,331],{"title":315,"url":316},"Smart Automation & RPA","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fintelligent-automation-rpa-boost-your-companys-efficiency-talan",{"title":141,"url":318},"\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fcybersecurity",{"title":320,"url":321},"Cyber Threat Intelligence","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fcyber-threat-intelligence",{"title":323,"url":324},"Ecosystem Cloud","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fbuild-your-cloud-ecosystem",{"title":326,"url":327},"Microsoft x Talan","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fmicrosoft-talan",{"title":329,"url":330},"SAP x Talan","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fsap",{"title":332,"url":333},"Salesforce x Talan","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftechnology\u002Fsalesforce",{"title":335,"url":97,"below":336},"Nurturing positive innovation",[337],{"title":338,"url":339},"Cultivate positive innovation","\u002Fuk\u002Fen\u002Fcapabilities\u002Fnurturing-positive-innovation\u002Fcultivate-positive-innovation-and-transform-your-challenges-opportunities",{"title":341,"url":97,"below":342},"The Talan Method",[343,346,349,352,355,358],{"title":344,"url":345},"Continuum of service: supporting you at every stage of your project","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Fcontinuum-services-heart-your-transformation",{"title":347,"url":348},"Enlightening decisions","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-enlightening-decisions",{"title":350,"url":351},"Putting data at the service of change","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-putting-data-service-change",{"title":353,"url":354},"Scaling projects","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-scaling-projects",{"title":356,"url":357},"Innovating through research","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-research-driver-innovation",{"title":359,"url":360},"Mobilising ingenious and committed experts","\u002Fuk\u002Fen\u002Fcapabilities\u002Ftalan-method\u002Ftalan-method-mobilising-ingenious-and-committed-experts",{"title":362,"url":97,"cta_uri":363,"cta_title":364,"below":365},"Industries","\u002Fuk\u002Fen\u002Four-industries","See all industries",[366,370,374,378,382],{"title":367,"url":368,"link_thumbnail":369},"Energy","\u002Fuk\u002Fen\u002Findustries\u002Fdigital-transformation-propel-your-energy-and-environmental-company-future-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_2276246949.jpg.webp",{"title":371,"url":372,"link_thumbnail":373},"Bank & Finance","\u002Fuk\u002Fen\u002Findustries\u002Fbanking-and-finance-unleash-your-transformation-potential-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_1407617270.jpg.webp",{"title":375,"url":376,"link_thumbnail":377},"Insurance","\u002Fuk\u002Fen\u002Findustries\u002Fguiding-insurance-sector-through-transformations-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_2212041425.jpg.webp",{"title":379,"url":380,"link_thumbnail":381},"Health","\u002Fuk\u002Fen\u002Findustries\u002Ftransforming-healthcare-0","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-09\u002Fshutterstock_1958734429%20%281%29.jpg.webp",{"title":383,"url":384,"link_thumbnail":385},"Public Services","\u002Fuk\u002Fen\u002Findustries\u002Fdigital-transformation-and-modernisation-public-services","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002Fshutterstock_2433950661_0.jpg.webp",{"title":95,"url":97,"push_image":387,"push_surtitle":388,"push_title":389,"push_tag":97,"push_url":390,"below":391},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2026-04\u002Fhalifax-bank-cash-machine-atm-uk-high-street.jpg.webp","INSIGHT","The UK's Open Finance Roadmap Is Here: From Vision to Value","\u002Fuk\u002Fen\u002Fuks-open-finance-roadmap-here-vision-value",[392,418,445],{"title":95,"url":97,"cta_uri":393,"cta_title":394,"below":395},"\u002Fuk\u002Fen\u002Fall-our-insights","See all our insights",[396],{"element":397,"rows":398},"drupal-view",[399,404,406,410,414],{"element":400,"title":401,"type":152,"nid":402,"href":403,"lang":8,"domain":35},"node-insight-menu","The real cyber AI risk no one is talking about ","2955","\u002Fuk\u002Fen\u002Fai-cyber-risk-no-one-really-talking-about",{"element":400,"title":389,"type":152,"nid":405,"href":390,"lang":8,"domain":35},"2957",{"element":400,"title":407,"type":152,"nid":408,"href":409,"lang":8,"domain":35},"Making Local Energy Markets Work in Practice","2923","\u002Fuk\u002Fen\u002Fmaking-local-energy-markets-work-practice",{"element":400,"title":411,"type":152,"nid":412,"href":413,"lang":8,"domain":35},"What does it take to enter the GB Flexibility Market?","2920","\u002Fuk\u002Fen\u002Fwhat-does-it-take-enter-gb-flexibility-market",{"element":400,"title":415,"type":152,"nid":416,"href":417,"lang":8,"domain":35},"What is the best approach to managing Smart Data privacy risks? ","2906","\u002Fuk\u002Fen\u002Fwhat-best-approach-managing-smart-data-privacy-risks",{"title":419,"url":97,"cta_uri":420,"cta_title":421,"below":422},"Case studies","\u002Fuk\u002Fen\u002Fall-our-use-cases","See all our case studies",[423],{"element":397,"rows":424},[425,429,433,437,441],{"element":426,"title":254,"type":427,"nid":428,"href":255,"lang":8,"domain":35},"node-case-studies-menu","case_studies","2960",{"element":426,"title":430,"type":427,"nid":431,"href":432,"lang":8,"domain":35},"Advising regional heat pump adoption for local government","2930","\u002Fuk\u002Fen\u002Fadvising-regional-heat-pump-adoption-local-government",{"element":426,"title":434,"type":427,"nid":435,"href":436,"lang":8,"domain":35},"Developing a Heat Network Roadmap","2922","\u002Fuk\u002Fen\u002Fdeveloping-heat-network-roadmap",{"element":426,"title":438,"type":427,"nid":439,"href":440,"lang":8,"domain":35},"AI Adoption Programme: How to Accelerate Enterprise AI Transformation","2144","\u002Fuk\u002Fen\u002Fai-adoption-program-enterprise",{"element":426,"title":442,"type":427,"nid":443,"href":444,"lang":8,"domain":35},"Unlocking Ireland’s Net Zero Future with Renewable Liquid Gases","2139","\u002Fuk\u002Fen\u002Funlocking-irelands-net-zero-future-renewable-liquid-gases",{"title":446,"url":97,"cta_uri":447,"cta_title":448,"below":449},"See us at","\u002Fuk\u002Fen\u002Fall-our-events","All our events",[450],{"element":397,"rows":451},[452,458,462],{"element":453,"title":454,"type":455,"nid":456,"href":457,"lang":8,"domain":35},"node-appointment-menu","British Forces in Business Awards 2026","appointment","3149","\u002Fuk\u002Fen\u002Fbritish-forces-business-awards-2026",{"element":453,"title":459,"type":455,"nid":460,"href":461,"lang":8,"domain":35},"Mythos and beyond: What the wider AI shift means for the threat landscape","3141","\u002Fuk\u002Fen\u002Fmythos-and-beyond-what-wider-ai-shift-means-threat-landscape",{"element":453,"title":463,"type":455,"nid":464,"href":465,"lang":8,"domain":35},"DataFest 2026","3139","\u002Fuk\u002Fen\u002Fdatafest-2026",{"title":467,"url":97,"below":468},"Join Us",[469,473,476,479,483,487],{"title":470,"url":471,"link_thumbnail":472},"Cultures and Values","\u002Fuk\u002Fen\u002Fjoin-us\u002Fculture-and-values","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2025-02\u002FTalan-PRO-62_0.jpg.webp",{"title":474,"url":215,"link_thumbnail":475},"Join Talan","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTALAN-2000-18_0.jpg.webp",{"title":22,"url":477,"link_thumbnail":478},"https:\u002F\u002Fwww.talan.com\u002Fuk\u002Fen\u002Four-job-offers?country=gb","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-7_1.jpg.webp",{"title":480,"url":481,"link_thumbnail":482},"Our recruitment process","\u002Fuk\u002Fen\u002Fjoin-us\u002Four-recruitment-process","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-48_2.jpg.webp",{"title":484,"url":485,"link_thumbnail":486},"Talan day-to-day","\u002Fuk\u002Fen\u002Fjoin-us\u002Ftalan-action","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-54_1.jpg.webp",{"title":175,"url":177,"link_thumbnail":488},"https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2024-10\u002FTalan-PRO-61.jpg.webp",{"title":490,"url":97,"push_image":491,"push_surtitle":492,"push_title":493,"push_tag":97,"push_url":494,"below":495},"ABOUT US","https:\u002F\u002Fstatic.talan.com\u002Fs3fs-public\u002Fstyles\u002Fw_400\u002Fpublic\u002F2026-03\u002FB%20Corp%20Webpage%20Image_0.jpg.webp","NEWS","Talan UK & Ireland Achieves Prestigious B Corp Certification","\u002Fuk\u002Fen\u002Ftalan-uk-ireland-achieves-prestigious-b-corp-certification",[496,511,522,549,564],{"title":497,"url":97,"below":498},"Our vision",[499,502,505,508,509],{"title":500,"url":501},"About Talan","\u002Fuk\u002Fen\u002Fabout-us\u002Four-vision\u002Fwho-we-are",{"title":503,"url":504},"CSR Commitment","\u002Fuk\u002Fen\u002Fabout-us\u002Four-vision\u002Fcsr-commitment-talan",{"title":506,"url":507},"Diversity and inclusion at Talan","\u002Fuk\u002Fen\u002Fabout-us\u002Four-vision\u002Fdiversity-and-inclusion-talan",{"title":356,"url":357},{"title":29,"url":510},"\u002Fuk\u002Fen\u002Fcapabilities\u002Fnurturing-positive-innovation\u002Fpositive-innovation",{"title":512,"url":97,"below":513},"Our group",[514,516,519],{"title":515,"url":218},"Our locations",{"title":517,"url":518},"Our organisation","\u002Fuk\u002Fen\u002Fabout-us\u002Four-group\u002Four-organisation",{"title":520,"url":521},"The Talan group ecosystem","\u002Fuk\u002Fen\u002Fabout-us\u002Four-group\u002Ftalan-group-ecosystem",{"title":523,"url":97,"cta_uri":524,"cta_title":525,"below":526},"Our news","\u002Fuk\u002Fen\u002Four-news","See all our news",[527],{"element":397,"rows":528},[529,535,539,541,545],{"element":530,"title":531,"type":532,"nid":533,"href":534,"lang":8,"domain":35},"node-news-menu","Why fixing the UK’s energy pricing problem is a leadership challenge","news","3024","\u002Fuk\u002Fen\u002Fwhy-fixing-uks-energy-pricing-problem-leadership-challenge",{"element":530,"title":536,"type":532,"nid":537,"href":538,"lang":8,"domain":35},"Talan supports delivery of Gas Safe Register student engagement trial","2929","\u002Fuk\u002Fen\u002Ftalan-supports-delivery-gas-safe-register-student-engagement-trial",{"element":530,"title":493,"type":532,"nid":540,"href":494,"lang":8,"domain":35},"2890",{"element":530,"title":542,"type":532,"nid":543,"href":544,"lang":8,"domain":35},"TenSquare, the new brand dedicated to strategy consulting from the Talan group ","2743","\u002Fuk\u002Fen\u002Ftensquare-new-brand-dedicated-strategy-consulting-talan-group",{"element":530,"title":546,"type":532,"nid":547,"href":548,"lang":8,"domain":35},"UK’s leading infrared heating manufacturers, Welsh government, and social housing providers join forces at Baglan infrared showcase event","2746","\u002Fuk\u002Fen\u002Fuks-leading-infrared-heating-manufacturers-welsh-government-and-social-housing-providers-join-forces-baglan-infrared-showcase-event",{"title":550,"url":97,"below":551},"Expert communities",[552,555,558,561],{"title":553,"url":554},"Discover our experts","\u002Fuk\u002Fen\u002Fabout-us\u002Fexpert-communities\u002Fall-our-experts",{"title":556,"url":557},"Our Oracle community blog","https:\u002F\u002Finsum.talan.com\u002Ffr\u002Fressources\u002Fblogue\u002F",{"title":559,"url":560},"Our SAP community blog","https:\u002F\u002Fwww.jaimemonsap.com\u002F",{"title":562,"url":563},"The data blog","https:\u002F\u002Fblog.talan.com\u002Fcategory\u002Fdata\u002F",{"title":565,"url":566,"cta_uri":566,"cta_title":567},"Awards & Certificates","https:\u002F\u002Fwww.talan.com\u002Fuk\u002Fen\u002Four-uk-awards-certificates","See all our Awards & Certificates"]