AI Security Brief

How do we secure applications when anyone can code?


Listen Later

Ashish Rajan doesn’t sugarcoat what it means to be a security leader in the AI era. This is a moment where innovation is outpacing control. Where AI is being embedded into everything, often faster than organizations can understand, govern, or secure it.

Ashish is a CISO, trusted advisor, and host of both the Cloud Security Podcast and AI Security Podcast. He is also the author of the upcoming book AI Security Engineering - which he describes as a framework for building and monitoring secure AI systems. 

In this episode, Ashish addresses how security leaders can get ahead of the accelerated use of AI in their organization.

What we cover:

  • What happens to your risk posture when non-technical employees start committing code

  • Why the built-in guardrails from your LLM or cloud provider aren't enough, and why assuming they are is your biggest blind spot

  • What most incident response playbooks are completely missing when it comes to AI

  • Practical advice for both security leaders and practitioners on how to get ahead of this

    Why stick around: If your organization is moving fast on AI adoption, Ashish will tell you plainly what's already exposed, and what to do about it.

    Episode resources:

    • Pre-order AI Security Engineering

    • Ashish Rajan linktr.ee

    • Cloud Security Podcast

    • AI Security Podcast

    • Ashish Rajan on LinkedIn

    • Dustin Childs on LinkedIn

    • Johnny Hand on LinkedIn

      About AI Security Brief

      AI Security Brief is where security and technology leaders come to get ahead. Join us for real conversations on the AI trends, threats, and decisions that can't wait.

      About TrendAI

      TrendAI™ empowers organizations to lead the future of AI with proactive security designed to inspire innovation and eliminate risk. TrendAI™. AI Fearlessly.

      ...more
      View all episodesView all episodes
      Download on the App Store

      AI Security BriefBy TrendAI and N2K Networks