У нас вы можете посмотреть бесплатно Securing the AI Castle: What is MITRE ATLAS Matrix for AI Security или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Defending the next wave of AI systems, DerlyG uses NotebookLM to synthesize research from MITRE ATLAS and other expert security sources into a clear explainer on how attackers are already targeting modern LLMs and AI platforms. Discover why today’s “digital castles” are uniquely exposed to prompt injection, data poisoning, and supply-chain attacks that quietly bypass traditional firewalls and perimeter tools. In this video, DerlyG translates the MITRE ATLAS framework into plain language, showing how its living knowledge base of real-world attack techniques can be turned into a practical, threat‑informed defense playbook. You’ll see how red-team findings and observed attacker behavior map directly to the four layers of the AI stack—environment, platform, model, and data—so security teams can prioritize controls where they matter most. You’ll learn how threat‑informed defense turns AI security from guesswork into a repeatable process: scoping credible threats, analyzing your own AI architecture, and designing tests to validate that defenses actually work as new attack patterns emerge. The episode closes with why securing AI is a continuous cat‑and‑mouse game, and what every organization relying on AI for finance, healthcare, government, or critical infrastructure should be doing now to stay ahead. 🔑 What You Will Master: The modern AI attack surface: prompt injections, indirect prompt injections, data poisoning, and supply‑chain compromises How MITRE ATLAS catalogs real adversary techniques into a public AI security playbook Threat‑informed defense: using attacker intel to design stronger protections and tests Securing the four layers of the AI stack: environment, platform, model, and data Why AI security must be continuous, adaptive, and built in from day one ⏱️ Key Moments (Jump Ahead): [00:32] Why Traditional Security Breaks on AI Systems [02:15] Inside MITRE ATLAS: The AI Threat Encyclopedia [04:05] Real Attack Patterns: Data Poisoning, Supply Chain, Prompt Injection [06:10] Threat‑Informed Defense in Three Steps [08:20] Hardening Environment, Platform, Model, and Data [10:05] The Cat‑and‑Mouse Future of AI Security This episode is a must‑watch for CISOs, security architects, AI leaders, red‑teamers, and developers who need to harden AI systems before attackers do. 🔗 Connect with DerlyG on LinkedIn: / derlyg ✅ Subscribe for more essential AI and security deep dives! 🧠 Created with research support from NotebookLM by Google Website: https://derlygservices.wixsite.com/my...