Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/67/a3/da/67a3da05-76da-57dd-66f6-6a9b02cbdff0/mza_12371959248310481839.jpg/600x600bb.jpg
The Virtual CISO
TheVirtualCISO
30 episodes
4 days ago
Welcome to The Virtual CISO - The future of trust is built here. This channel is dedicated to helping founders, security leaders, and forward-thinking organizations navigate the evolving landscape of cybersecurity, compliance, and governance. Through The Virtual CISO podcast, we break down complex security challenges into practical insights you can use whether you’re scaling a startup or leading a global enterprise. 📩 Work with us: security@thevirtualciso.ca 🌐 Learn more: thevirtualciso.ca
Show more...
Technology
RSS
All content for The Virtual CISO is the property of TheVirtualCISO and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to The Virtual CISO - The future of trust is built here. This channel is dedicated to helping founders, security leaders, and forward-thinking organizations navigate the evolving landscape of cybersecurity, compliance, and governance. Through The Virtual CISO podcast, we break down complex security challenges into practical insights you can use whether you’re scaling a startup or leading a global enterprise. 📩 Work with us: security@thevirtualciso.ca 🌐 Learn more: thevirtualciso.ca
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/28268080/28268080-1746417685535-df094c78f5dfd.jpg
Securing AI Models: Protecting the Brain of the Machine
The Virtual CISO
8 minutes 11 seconds
2 weeks ago
Securing AI Models: Protecting the Brain of the Machine

In SaaS, data was the crown jewel. In AI, the model is the brain. If you can’t secure it, you can’t secure your product.In this episode of Securing AI, we move beyond data security and step directly into the core of AI risk: the model itself. While many teams focus on infrastructure and compliance, most breaches in AI won’t come from the cloud platform, they’ll come from poisoned data, manipulated prompts, stolen model weights, and unseen model behaviour.Listen and learn about: - Model theft, exfiltration, and IP risk : when your competitive edge becomes someone else’s asset- Training data poisoning & prompt manipulation : how adversaries reshape outputs without touching your systems- Shadow experimentation: internal experimentation without governance or guardrails- Why “securing AI” is not the same as securing an applicationThis episode challenges you to treat model security as a direct business risk because if the model can be influenced, every decision it makes can be compromised.#ai #SecuringAI #llm #gemini #chatgpt #compliance #anthropicai

The Virtual CISO
Welcome to The Virtual CISO - The future of trust is built here. This channel is dedicated to helping founders, security leaders, and forward-thinking organizations navigate the evolving landscape of cybersecurity, compliance, and governance. Through The Virtual CISO podcast, we break down complex security challenges into practical insights you can use whether you’re scaling a startup or leading a global enterprise. 📩 Work with us: security@thevirtualciso.ca 🌐 Learn more: thevirtualciso.ca