AI-Driven Security Operations
,
The Future of AI & Cybersecurity
The AI supply chain is becoming increasingly intricate, with multiple components—data sources, models, APIs, and infrastructure—interconnected within dynamic cloud environments. Understanding these relationships and securing the full pipeline is critical to prevent vulnerabilities from being exploited. In this webinar, we will explore the key components of the AI pipeline, how they are linked, and where security risks are most likely to arise.
We’ll also highlight a real-world example: a vulnerability discovered by our team in GCP Vertex, where a rogue model was uploaded and used to infect other models within the same environment, ultimately leading to a model theft attack. This case will illustrate the importance of supply chain visibility and robust security practices.
Register and attend this webinar for more on:
- Breakdown of the AI supply chain: how data, models, APIs, and infrastructure are connected.
- Understanding the potential risks in the AI pipeline and how vulnerabilities can propagate through interconnected components.
- A detailed look at the GCP Vertex vulnerability: how a rogue model exploited the environment to infect others, culminating in a model theft attack.
- Best practices for securing the AI supply chain and ensuring that every component is protected from exploitation.