A Practical Guide to Securing Your AI Application

A Practical Guide to Securing Your AI Application

Conf42 via YouTube Direct link

intro

1 of 30

1 of 30

intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Practical Guide to Securing Your AI Application

Automatically move to the next video in the Classroom when playback concludes

  1. 1 intro
  2. 2 preamble
  3. 3 the tipping point for generative ai
  4. 4 generative ai is powered by foundation models
  5. 5 security should run alongside generative ai
  6. 6 what is responsible ai?
  7. 7 generative ai security scoping matrix
  8. 8 generative ai project life cycle
  9. 9 data flows in generative ai application
  10. 10 owasp top 10 for llms
  11. 11 don't forget the fundamentals
  12. 12 what can you do?
  13. 13 controlling the vulnerabilities
  14. 14 prompt injection attacks
  15. 15 wrapper method - defining a ruleset
  16. 16 wrapper method - using delimiters
  17. 17 h3: helpful, honest, harmless
  18. 18 controlling vulnerabilities, toxicity moderator
  19. 19 limit pii for ai
  20. 20 multi-step self guarding
  21. 21 create guardrails for the e2e cycle
  22. 22 preload the least needed context
  23. 23 evaluation with genai
  24. 24 evaluate with benchmarks
  25. 25 reduve the affected resources
  26. 26 observability
  27. 27 generative ai on different layers
  28. 28 amazon bedrock
  29. 29 resources and call to action
  30. 30 thank you!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.