Top 5 Steps to Mitigate OWASP Top 10 Threats

Presented by

Riggs Goodman III, Amazon Web Services (AWS) & Nikhil Girdhar,

About this talk

In today's generative AI landscape, traditional security techniques fall short in protecting modern AI applications. Cybersecurity teams need to understand the OWASP Top 10 threats specific to LLMs to effectively mitigate AI and data risks. While LLM Firewalls play a crucial role in protection, they are not sufficient on their own to address these threats. The rapid adoption of generative AI, coupled with the rise of shadow AI, use of sensitive data, unknown vulnerabilities, and emerging threats, presents significant security, privacy, and compliance risks. Join our in-depth webinar to explore the top 5 AI security steps recommended to bolster your GenAI defenses. We will cover: • Understanding AI and Data Security Challenges: Delve into shadow AI, OWASP Top 10 threats for LLMs, data mapping, and sensitive data exposure risks. • Implementing LLM Firewalls: Learn to protect your prompts, data retrieval, and responses from attacks. • Enforcing Data Entitlements: Discover how to prevent unauthorized data access in GenAI applications. • Enforcing Inline Enterprise Controls: Find out how to safeguard sensitive data during model training, tuning, and RAG (Retrieval Augmented Generation). • Automating Compliance: Streamline your adherence to emerging data and AI regulations.
Related topics:

More from this channel

Upcoming talks (5)
On-demand talks (908)
Subscribers (67713)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa