Loading video player...
Map the AI attack surface from training data to deployed models in production Identify where shift left security practices break down in ML pipelines Evaluate runtime enforcement strategies for LLM and agentic AI workloads Assess AI governance gaps across NIST AI RMF and OWASP LLM Top 10 Apply Zero Trust controls to prevent prompt injection and data exfiltration Address your AI security challenges live with Joe and Brian