One Article Review

Accueil - L'article:
Source IndustrialCyber.webp CompromisingPositions
Identifiant 8516996
Date de publication 2024-04-24 23:00:00 (vue: 2024-06-13 19:05:24)
Titre Épisode 27: Ignorez toutes les instructions précédentes: Modélisation des menaces Systèmes AI
EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems
Texte Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Welcome to the grand finale of season two of \'Compromising Positions\', where we delve into the fascinating world of AI security. In this special episode, your hosts will guide you through the labyrinth of securing AI models, one step at a time.For those who prefer a quick overview, we offer an abridged version on Apple Podcasts and Spotify. This version deep dives into two key topics: Jeff\'s unique mnemonic C-PTSD for threat modeling AI systems, and an intriguing discussion on the correlation between boredom, worm-killing, and AI efficiency gains.For those who crave a deeper dive, scroll down or visit our Youtube channel for the extended cut. This version includes everything from the regular version, plus:Jeff\'s academic journey in AI at the University of HullLianne\'s preparation for a 100 days of Code in Python for her MSc in Data Science and AI at Leeds Trinity UniversityA critical discussion on OpenAI\'s transparency and the latest AI wearable technology, along with the complexities of consent and privacy in an \'always recorded\' lifestyleWhether you choose the regular or extended version, we appreciate your support throughout season two. Stay tuned for more enlightening discussions in season three! Thank you for being a fantastic audience.We hope you enjoyed this episode - See you next time, keep secure, and don\'t forget to ask yourself, \'Am I the compromising position here?\' Keywords: Cybersecurity, AI, Threat Modelling, MSC, Data Science, IOT, Wearables, Data SecuritySHOW NOTESJeff\'s article on C-PTSDLianne\'s Article The (AI) Revolution will be BORING...And that\'s Okay!Wearables, Shareables, Unbearable? The IOT and AI Tech Nobody Asked for But Cybersecurity Criminals Love. Future of CybersecurityMSc in Artificial Intelligence -
Notes ★★★
Envoyé Oui
Condensat  keywords:  welcome 100 2021 2023 2024 27: abridged academic across advisory age aimed all along always anthropologist anthrosecurist apple appreciate approaches around article artificial ask asked asks aspects audience author awards awardsabout based become being berlin best between blogger board boredom boring both building but can category centric changing channel chief choose code coding com combines community complexities compromising computing conference consent consultancy correlation course crash crave create criminals critical cultural currently cut cyber cybersecurity cybersecuritymsc data days deep deeper delivered delve deployment developer development discussion discussions dive diversity dives doing don down drawing easier edge efficiency empowering encouraging enjoyed enlightening enterprise episode eric ethan europe european evangelise ever everything experience expertise extended face fantastic fascinating finale financial first focused forget founded from function future gains generative globe grand greenfield guide has having head healthcare help her here his hope host hosts how hulllianne hullmsc human ignore impact includes increasingly industries industry innovatively instructions: intelligence interested international intriguing iot jeff jefflinkedincompromising journey keep key keynote killing labyrinth largest latest leader leading leeds lianne liannelinkedincompromising lifelong lifestylewhether links lives love make masters matthescodewarsin meet mnemonic modeling modelling models modern mollickseason more msc multiple national nearly needs new next nobody non notesjeff offer officer okay one openai organisation organisations over overview personality pieces playlist plus:jeff podcast podcastabout podcaster podcasts position positions potteras practical practices practitioner; praise prefer preparation prepared previous privacy product professionals programmes project ptsd ptsdlianne public published python quick real recently recorded regular retail revolution scale science scratch scroll season secops secure securing security securityshow see services several shape share shareables she software solutions speaker special specialist spotify standards started starting stay step support systems talks team teams tech technical technologically technologist technology thank that think those threat threats three through throughout time topics: transformation transparency trinity tuned two type unbearable unique university universitya universitypython upon version vision visit watkinsjeff wearable wearables web webinale welcome what where who will woman won work worked working world worm writer xdesign year years your yourself youtube youtubevote
Tags Threat Medical Conference Technical
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: