artificial intelligence
3 TopicsFrom Design to Deployment - Securing AI Architectures
With AI agents and LLMs moving into production, a new attack surface has emerged that demands more than just prompt filtering. True AI security requires a deep understanding of the entire ecosystem, including foundational models, the supply chain for third-party components, vector databases, and the agentic frameworks that grant them functionality. Hear from Immersive Principal Security Engineer, Ashley Kingscote and Principal Application Security SME, Chris Wood, for a technical breakdown of modern AI architecture and a practical, engineering-first guide to mitigating these complex threats. You'll hear about: Deconstructing the AI System: Move beyond high-level concepts and see a practical breakdown of AI application architecture, including the roles of Large Language Models (LLMs), Retrieval Augmented Generation (RAG), and Model Context Protocol (MCP). The OWASP Top 10 for LLMs: Dive deep into the OWASP Top 10 for LLMs, exploring critical risks like Prompt Injection, Data Poisoning, Excessive Agency, and Supply Chain Vulnerabilities with developer-focused analogies and examples. The Lethal Trifecta: Understand the dangerous intersection of AI systems having access to private data, the ability to communicate externally, and exposure to untrusted content—and why securing this trifecta is paramount. A Lifecycle Approach to Defense: Learn how to embed security throughout the entire AI development lifecycle, from secure design and threat modeling to robust deployment and operational monitoring in cloud environments.15Views0likes0CommentsHow to Build a People-Centric Defense for AI-Driven Attacks
Webinar recorded on 15th October 2025 The headlines are screaming about AI. But beyond the hype of rogue models and autonomous attacks, a more immediate threat is taking shape. AI isn't replacing the human attacker; it's amplifying them, making existing threats more targeted, scalable, and relentless than ever before. At Immersive, our frontline research team, Container 7, sees this evolution firsthand, and their mission is to uncover the real-world techniques threat actors are using today. From Scattered Spider’s sophisticated social engineering to convincing deepfakes, staying one step ahead has never been more critical. Join our experts as they share candid insights and unique discoveries, like an AI LLM bypass, to provide a practical understanding of how to prepare your people and organization for what’s next. You'll hear about: The Amplification Effect: Explore how AI is supercharging traditional attack techniques, from hyper-realistic social engineering to more strategic, data-driven secondary attacks. Threat Actor Spotlight: Dive into real-world examples from threat groups like Scattered Spider, how their tactics are evolving, and how to prepare your teams to defend against them. The Complacency Crisis: Discuss the emerging risk of complacency among technical teams as they rely more on AI, and why human vigilance is more critical than ever. A New Approach to Readiness: Learn why combining deep AI knowledge with human expertise is the only way to stay ahead. You’ll come away with expert tips on how to build a proactive defense.54Views0likes0CommentsDeepfake Defense: Building a Cyber-Ready Workforce in the Age of GenAI
This event has now ended. Watch the recording here. GenAI is reshaping cybersecurity—enhancing defenses while also introducing new risks. Deepfakes, GenAI-generated malware, and vulnerabilities introduced through GenAI coding tools demand a strategic shift to stay ahead of evolving threats. Join industry experts Jamie Knobles and John Blythe as they examine real-world GenAI-driven attacks and share actionable insights to strengthen cyber resilience. This webinar will provide cyber leaders with: A deep-dive into deepfake tactics and other GenAI-related threats. Strategies to increase cyber resilience across the entire workforce. Recommendations for proving cyber capabilities. Register today to gain the knowledge and strategies you need to proactively address the GenAI challenge, minimizing risk and maximizing the potential of this transformative technology.151Views2likes0Comments