Greetings my fellow Technology Advocates and Specialists.
This is Chapter #3 of my Data & AI Series based on Microsoft Build AI Day, Switzerland, 2024.
In this Session, I will provide readers, the details which I captured on Microsoft OpenAI Security.
Data And AI with Azure - All in One:-
Greetings to my fellow Technology Advocates and Specialists.
The Objective of this series is to learn as much as possible on Data and AI and in the process help others.
1. AI Pain Points:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjqbfsc4mzecnt5ej3vpn.jpg) |
2. Generative AI Threat Map:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8i7badddzuhjj6cvfyad.jpg) |
3. New Principles for AI Security:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr5m720w2zbfpr9k7trip.jpg) |
4. The way Microsoft Addresses risk from attackers:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F10hu1v6j7s22053sgb6k.jpg) |
5. How does Microsoft address risks from the use or misuse of AI:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0wt2q4aw6cfsl79n1zye.jpg) |
6. Security Control Within AI Systems:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Futl2crp6s1ixh4t9wkou.jpg) |
7. Threat Modelling Scenarios:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F02c9i0qx9379xycmak34.jpg) |
8. Threat Mapping Template: Mapping Vulnerabilities with Mitigations:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuphrpe8g122qa0nze54v.jpeg) |
9. Secure AI :- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmh115zda884hvt91aifc.jpg) |
10. Security for AI - Ever Evolving Process:- |
![Image description](https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0gamt0ktvwp6n4er0n4h.jpg) |
Hope You Enjoyed the Session!!!
Stay Safe | Keep Learning | Spread Knowledge
Top comments (0)