AI Application Security; Quantum Computing
Combined Session
Wednesday, June 05, 2024 17:30—18:30
Location: B 09
Log in to download presentations
Wednesday, June 05, 2024 17:30—18:30
Location: B 09
Watch the video
The pace of innovation in generative AI offers immense opportunities while also introducing new security challenges. Those include new threat vectors, explainability, governance, transparency, and privacy for large language models. As organizations seek to leverage generative AI for innovation, security leaders must take concrete steps to enable rapid experimentation without compromising security.
We will begin our talk by understanding the scope of generative AI applications, based on their intended use and the potential risks associated with their deployment. We will then discuss key strategies for securing generative AI applications, including threat modeling, guardrails, observability, and evaluation of effectiveness of security measures.
Through case studies and practical examples, we will show how to apply these strategies in real-world scenarios, from ideation to production. Attendees will learn how to identify and mitigate potential risks in their generative AI applications, and how to evaluate the effectiveness of their security measures.
This talk is intended for security leaders, developers, and practitioners who are working with generative AI applications, and who want to ensure the security and integrity of their systems. By the end of the talk, attendees will have a deeper understanding of the security challenges associated with generative AI, and the practical steps they can take to address them.
Watch the video
This is a unique session on Post-Quantum Cryptography (PQC) benchmarking in public key infrastructure (PKI) and Signing. Tomas will explore the differences in size and performance between classic and post-quantum algorithms, while focusing on key and certificate sizes and issuance speeds on software vs hardware security modules. He will evaluate the security levels of post-quantum algorithms and make fair comparisons, highlighting critical information useful as enterprises begin planning for PQC. Attendees will gain a better understanding of the advantages and trade-offs of using post-quantum algorithms in terms of size, performance, security level and hardware security modules.
Watch the video
In this session you will learn what cryptography is currently being used in verifiable credentials and DIDComm, why the community has chosen these particular security approaches, and how it affects you. We will explore how digital security practices will change as new technologies emerge, specifically post quantum cryptography, and how you can be ready. As the world becomes more digital, authenticity and privacy, and technologies that ensure that authenticity and privacy by design are becoming more and more critical. Come learn how you can make use of these technologies today to be prepared for tomorrow.