A Practical Guide to Securing Your AI Application
Offered By: Conf42 via YouTube
Course Description
Overview
Syllabus
intro
preamble
the tipping point for generative ai
generative ai is powered by foundation models
security should run alongside generative ai
what is responsible ai?
generative ai security scoping matrix
generative ai project life cycle
data flows in generative ai application
owasp top 10 for llms
don't forget the fundamentals
what can you do?
controlling the vulnerabilities
prompt injection attacks
wrapper method - defining a ruleset
wrapper method - using delimiters
h3: helpful, honest, harmless
controlling vulnerabilities, toxicity moderator
limit pii for ai
multi-step self guarding
create guardrails for the e2e cycle
preload the least needed context
evaluation with genai
evaluate with benchmarks
reduve the affected resources
observability
generative ai on different layers
amazon bedrock
resources and call to action
thank you!
Taught by
Conf42
Related Courses
AI CTF Solutions - DEFCon31 Hackathon and Kaggle CompetitionRob Mulla via YouTube Indirect Prompt Injections in the Wild - Real World Exploits and Mitigations
Ekoparty Security Conference via YouTube Hacking Neural Networks - Introduction and Current Techniques
media.ccc.de via YouTube The Curious Case of the Rogue SOAR - Vulnerabilities and Exploits in Security Automation
nullcon via YouTube Mastering Large Language Model Evaluations - Techniques for Ensuring Generative AI Reliability
Data Science Dojo via YouTube