Главная
Study mode:
on
1
intro
2
preamble
3
the tipping point for generative ai
4
generative ai is powered by foundation models
5
security should run alongside generative ai
6
what is responsible ai?
7
generative ai security scoping matrix
8
generative ai project life cycle
9
data flows in generative ai application
10
owasp top 10 for llms
11
don't forget the fundamentals
12
what can you do?
13
controlling the vulnerabilities
14
prompt injection attacks
15
wrapper method - defining a ruleset
16
wrapper method - using delimiters
17
h3: helpful, honest, harmless
18
controlling vulnerabilities, toxicity moderator
19
limit pii for ai
20
multi-step self guarding
21
create guardrails for the e2e cycle
22
preload the least needed context
23
evaluation with genai
24
evaluate with benchmarks
25
reduve the affected resources
26
observability
27
generative ai on different layers
28
amazon bedrock
29
resources and call to action
30
thank you!
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a comprehensive conference talk on securing AI applications in this 33-minute presentation from Conf42 LLMs 2024. Delve into the tipping point of generative AI, understand its foundation models, and learn why security should be integrated alongside AI development. Discover the concept of responsible AI and navigate through a generative AI security scoping matrix. Examine the project life cycle and data flows in generative AI applications, while considering the OWASP Top 10 for LLMs. Gain practical insights on controlling vulnerabilities, including strategies to combat prompt injection attacks, implement wrapper methods, and utilize the H3 (helpful, honest, harmless) approach. Learn techniques for limiting PII, creating guardrails, and evaluating AI systems with benchmarks. Explore observability practices and understand generative AI implementation across different layers. Conclude with valuable resources and a call to action for securing your AI applications effectively.

A Practical Guide to Securing Your AI Application

Conf42
Add to list
0:00 / 0:00