LLM security workshop tackling OWASP's top 10 risks head-on

Through interactive examples and sample code, you will grasp approaches to filter malicious user input, sanitize model outputs, and implement robust validation mechanisms. The workshop specially focuses on skill-building around prompt engineering as a powerful mechanism to keep generative models res...

Full description

Bibliographic Details
Format: eBook
Language:English
Published: [Place of publication not identified] Packt Publishing 2023
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04026nmm a2200385 u 4500
001 EB002189941
003 EBX01000000000000001327406
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240103 ||| eng
020 |a 9781835880746 
050 4 |a TK5105.59 
100 1 |a Bodungen, Clint E.  |e presenter 
245 0 0 |a LLM security workshop  |b tackling OWASP's top 10 risks head-on 
250 |a [First edition] 
260 |a [Place of publication not identified]  |b Packt Publishing  |c 2023 
300 |a 1 video file (2 hr., 1 min.)  |b sound, color 
653 |a Artificial intelligence / Computer programs / Security measures 
653 |a Vidéo en continu 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Intelligence artificielle / Logiciels / Sécurité / Mesures 
653 |a Computer networks / Security measures / fast 
653 |a Vidéos sur Internet 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a streaming video / aat 
653 |a Internet videos / http://id.loc.gov/authorities/subjects/sh2007001612 
653 |a Streaming video / http://id.loc.gov/authorities/subjects/sh2005005237 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/9781835880746/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a Through interactive examples and sample code, you will grasp approaches to filter malicious user input, sanitize model outputs, and implement robust validation mechanisms. The workshop specially focuses on skill-building around prompt engineering as a powerful mechanism to keep generative models restricted within secure guardrails. What you will learn How to safeguard your LLM apps from supply chain vulnerabilities Ways to prevent data poisoning, unauthorized access, and theft Techniques to filter malicious user input and sanitize model output Methods to block jailbreaking and misuse of your LLMs Tools and frameworks to automate security mechanisms in your stack Audience Developers, data scientists, and security professionals seeking to fortify their enterprise-grade large language model (LLM) applications against cybersecurity threats. This workshop is designed for individuals interested in hands-on learning to secure LLMs and mitigate risks outlined in OWASP's Top 10.  
520 |a LLMs introduce new attack vectors that can compromise your AI systems. This intensive workshop equips you with hands-on skills to tackle the OWASP Top 10 most critical risks for securing enterprise-grade LLM applications. Led by cybersecurity expert Clint Bodungen, this masterclass focuses on fortifying your LLM stack against the OWASP Top 10 most critical risks. Diving deep into the attack vectors unique to these powerful generative models, you will learn hands-on techniques to safeguard your apps built on large language models. The workshop covers a wide range of practical methods to harden your LLM security posture. You will discover how to protect against supply chain attacks through vulnerable third-party code, libraries, models and plugins. The session outlines processes to prevent unauthorized data access, theft of proprietary data, and poisoning of your training dataset.  
520 |a About the Author Clint Bodungen: Clint Bodungen is a globally recognized cybersecurity authority and brings over a quarter-century of experience to the table. A veteran of the United States Air Force and seasoned professional at notable cybersecurity firms like Symantec, Kaspersky Lab, and Booz Allen Hamilton, he is renowned for his innovative approaches in the field. Clint has contributed to the field as the author of two insightful books: 'Hacking Exposed: Industrial Control Systems' and 'ChatGPT for Cybersecurity Cookbook.' These works underscore his wide-ranging knowledge and expertise in cybersecurity, establishing him as a thought leader in this ever-evolving field