
Sign up to save your podcasts
Or


Can Generative AI Be Secured? Amazon's Chief Security Officer Weighs In
In this episode of Eye on AI, Amazon's Chief Security Officer Stephen Schmidt pulls back the curtain on how Amazon is using AI-powered cybersecurity to defend against real-world threats. From global honeypots to intelligent alarm systems and secure AI agent networks, Steve shares never-before-heard details on how Amazon is protecting both its infrastructure and your data in the age of generative AI.
We dive deep into:
Amazon's MadPot honeypot network and how it tracks adversaries in 90 seconds
The role of AI in threat detection, alarm triage, and code validation
Why open-source vs. closed-source models are a real security debate
The critical need for data privacy, secure LLM usage, and agent oversight
Amazon's $5M+ Nova Trusted AI Challenge to battle adversarial code generation
Whether you're building AI tools, deploying models at scale, or just want to understand how the future of cybersecurity is evolving—this episode is a must-listen.
Don't forget to like, subscribe, and turn on notifications to stay updated on the latest in AI, security, and innovation.
Stay Updated:
Craig Smith on X:https://x.com/craigss
Eye on A.I. on X: https://x.com/EyeOn_AI
(00:00) Preview
(00:52) Stephen Schmidt's Role and Background at Amazon
(02:11) Inside Amazon's Global Honeypot Network (MadPot)
(05:26) How Amazon Shares Threat Intel Through GuardDuty
(08:06) Are Cybercriminals Using AI?
(10:28) Open Source vs Closed Source AI Security Debate
(13:09) What Is Amazon GuardDuty
(17:44) How Amazon Protects Customer Data at Scale
(20:18) Can Autonomous AI Agents Handle Security?
(25:14) How Amazon Empowers SMBs with Agent-Driven Security
(26:18) What Tools Power Amazon's Security Agents?
(29:25) AI Security Basics
(35:34) Securing AI-Generated Code
(37:26) Are Models Learning from Our Queries?
(39:44) Risks of Agent-to-Agent Data Sharing
(42:08) Inside the $5M Nova Trusted AI Security Challenge
(47:01) Supply Chain Attacks and State Actor Tactics
(51:32) How Many True Adversaries Are Out There?
(53:04) What Everyone Needs to Know About AI Security
By Craig S. Smith4.7
5555 ratings
Can Generative AI Be Secured? Amazon's Chief Security Officer Weighs In
In this episode of Eye on AI, Amazon's Chief Security Officer Stephen Schmidt pulls back the curtain on how Amazon is using AI-powered cybersecurity to defend against real-world threats. From global honeypots to intelligent alarm systems and secure AI agent networks, Steve shares never-before-heard details on how Amazon is protecting both its infrastructure and your data in the age of generative AI.
We dive deep into:
Amazon's MadPot honeypot network and how it tracks adversaries in 90 seconds
The role of AI in threat detection, alarm triage, and code validation
Why open-source vs. closed-source models are a real security debate
The critical need for data privacy, secure LLM usage, and agent oversight
Amazon's $5M+ Nova Trusted AI Challenge to battle adversarial code generation
Whether you're building AI tools, deploying models at scale, or just want to understand how the future of cybersecurity is evolving—this episode is a must-listen.
Don't forget to like, subscribe, and turn on notifications to stay updated on the latest in AI, security, and innovation.
Stay Updated:
Craig Smith on X:https://x.com/craigss
Eye on A.I. on X: https://x.com/EyeOn_AI
(00:00) Preview
(00:52) Stephen Schmidt's Role and Background at Amazon
(02:11) Inside Amazon's Global Honeypot Network (MadPot)
(05:26) How Amazon Shares Threat Intel Through GuardDuty
(08:06) Are Cybercriminals Using AI?
(10:28) Open Source vs Closed Source AI Security Debate
(13:09) What Is Amazon GuardDuty
(17:44) How Amazon Protects Customer Data at Scale
(20:18) Can Autonomous AI Agents Handle Security?
(25:14) How Amazon Empowers SMBs with Agent-Driven Security
(26:18) What Tools Power Amazon's Security Agents?
(29:25) AI Security Basics
(35:34) Securing AI-Generated Code
(37:26) Are Models Learning from Our Queries?
(39:44) Risks of Agent-to-Agent Data Sharing
(42:08) Inside the $5M Nova Trusted AI Security Challenge
(47:01) Supply Chain Attacks and State Actor Tactics
(51:32) How Many True Adversaries Are Out There?
(53:04) What Everyone Needs to Know About AI Security

478 Listeners

174 Listeners

341 Listeners

154 Listeners

213 Listeners

90 Listeners

131 Listeners

95 Listeners

155 Listeners

209 Listeners

591 Listeners

268 Listeners

26 Listeners

35 Listeners

39 Listeners