Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Google Gemini (security learning model)

Gemini (secLM) supports the security monitoring process to correlate the generated security alerts and, where possible, provide an automated response based on existing playbooks and/or security use cases

Last change on 10th of June 2025, at 11:12 (CET) | Publication Standard 1.0
Publication category
Impactful algorithms
Impact assessment
DPIA
Status
In use

General information

Theme

Field not filled in.

Begin date

1-3-24

Contact information

algoritmen@amsterdam.nl

Responsible use

Goal and impact

The purpose of the processing is to assess and communicate security incidents and take action.

Considerations

Respond appropriately to possible security weaknesses that third parties may exploit without authorisation to harm the municipality. And respond to a possible misjudgement of a security weakness, resulting in equipment or employees being (temporarily) excluded from IT services.

Human intervention

Research Assistant can help answer questions, summarise events, detect threats, create rules and recommend actions.

Playbook Assistant can help create roadmaps for actions to be taken, customise configurations and incorporate best practices.

Risk management

Outcomes leading to priority 1 and 2 for the municipality are passed to a human to assess the algorithm. This human assessment is done by the Cyber Fusion Centre team of the municipality's Generic Security Services Department.

Legal basis

Legitimate interest

Impact assessment

Data Protection Impact Assessment (DPIA): https://hoofdstad.sharepoint.com/:w:/r/sites/Teams-Net-Aanbesteding/Shared%20Documents/Aanbesteding/DPIA%20uitwerking/DPIA%20-%20Accenture%20verwerkingsactiviteiten%202025%200.2.docx?d=w57a628a98d7e4003a1634526e5947433&csf=1&web=1&e=XkgGoX

Operations

Data

System logging of Assets, network and user profiles.


Technical design

Data collected by Accenture.


Google Gemini (secLM) supports the security monitoring process to correlate and, where possible, provide automated responses to emerging security alerts based on existing playbooks and/or security use cases.


Security teams can search for additional context, better understand campaigns and tactics of possible threats, initiate response sequences and receive guided recommendations on next steps - all using natural language.


External provider

Google Gemini (secLM)

Link to code base

https://cloud.google.com/blog/products/identity-security/introducing-google-security-operations-intel-driven-ai-powered-secops-at-rsa

Similar algorithm descriptions

  • The various algorithms and calculation rules within LVMA work together so that information from video images can be converted to interpretable census data as decision-supporting information for public space steering and policy.

    Last change on 7th of May 2025, at 13:20 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    DPIA
    Status
    In use
  • The virtual assistant Gem is a digital help on Velsen websites to answer civic and business questions. Using the chat button on our websites, you can talk to Gem.

    Last change on 28th of November 2024, at 9:30 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use