
Table of Contents
- Introduction
- Day 1 - GenAI Security Threat Landscape
- Understanding AI Security Risks
- Real-World LLM Security Breaches
- Day 2 - Eploring Security Frameworks for LLM Applications
- Introduction to OWASP Top 10 for LLM Applications
- Introduction to the MITRE ATLAS™ Framework
- Day 3 - Prompt Injections Deep Dive
- Types of Prompt Injections
- The Gandalf Game
- Types of Prompt Injection Attacks
- Day 4 - Traditional vs. AI Cyber Security
- Traditional Cybersecurity Essentials
- AI in Cybersecurity: Advancements and Benefits
- Securing AI Systems
- Day 5 - AI Application Security
- Exploring AI Application Security
- Reactive vs. Proactive Security Approaches
- Securing AI Applications: Best Practices
- Day 6 - AI/LLM Red Teaming
- Exploring and Executing AI/LLM Red Teaming
- Who Should Conduct Red Teaming?
- Day 7 - AI Tech Stack & Evaluating AI Security Solutions
- Strategies for Evaluating AI Security Solutions
- Concluding Insights and Additional Resources
- Day 8 - Navigating AI Governance
- The EU AI Act
- The US AI Bill of Rights Principles
- Comparative Insights and Learning Tools
- Day 9 - The Evolving Role of the CISO
- Understanding the CISO’s Evolving Role
- Strategic Shifts for CISOs
- Incorporating of AI in Cybersecurity Practices
- Day 10 - AI & LLM Security Resources
- Conclusion
- What's next?