All Episodes

Displaying 41 - 51 of 51 in total

Episode 41 — Legal & Compliance Horizon (High-Level)

This episode introduces the legal and compliance horizon for AI security, giving learners a high-level view of regulatory landscapes without overwhelming them with acr...

Episode 42 — Third-Party & Vendor Risk

This episode explores third-party and vendor risk management in AI security, focusing on the challenges of relying on external providers for models, datasets, APIs, an...

Episode 43 — Enterprise Architecture Patterns

This episode examines enterprise architecture patterns for secure AI deployments, focusing on how organizations structure systems to balance scalability, performance, ...

Episode 44 — People & Process

This episode focuses on people and process as integral elements of AI security, highlighting how organizational culture and defined responsibilities reinforce technica...

Episode 45 — Program Management Patterns (30/60/90)

This episode introduces program management patterns for phased AI security adoption, with emphasis on the 30/60/90-day framework. For certification readiness, learners...

Episode 46 — Multimodal & Cross-Modal Security

This episode introduces multimodal and cross-modal security, focusing on AI systems that process images, audio, video, and text simultaneously. For certification readi...

Episode 47 — On-Device & Edge AI Security

This episode examines on-device and edge AI security, focusing on models deployed in mobile, IoT, or embedded systems where resources are constrained and connectivity ...

Episode 48 — Guardrails Engineering

This episode covers guardrails engineering, emphasizing the design of policy-driven controls that prevent unsafe or unauthorized AI outputs. Guardrails include policy ...

Episode 49 — Confidential Computing for AI

This episode introduces confidential computing as an advanced safeguard for AI workloads, focusing on hardware-based protections such as trusted execution environments...

Episode 50 — Automated Adversarial Generation

This episode examines automated adversarial generation, where AI systems are used to create adversarial examples, fuzz prompts, and continuously probe defenses. For ce...

Welcome to the AI Security Course

Broadcast by