Practical Machine Learning Security: Major Security Flaws in ML and How to Avoid Them with MLSecOps

  Рет қаралды 3,130

Alejandro Saucedo

Alejandro Saucedo

2 жыл бұрын

The operation and maintenance of large scale production machine learning systems has uncovered new challenges which require fundamentally different approaches to that of traditional software. The field of security in data & machine learning infrastructure has seen a growing rise in attention due to the critical risks being identified as it expands into more demanding real-world use-cases.
In this talk we will introduce the motivations and the importance of security in data & machine learning infrstructure through a set of practical examples showcasing "Flawed Machine Learning Security". These "Flawed ML security" examples are analogous to the annual "OWASP Top 10" report that highlights the top vulnerabilities in the web space, and will highlight common high risk touchpoints.
Throughout this session we will cover a practical example that will showcase how we can leverage the plethora of cloud native tooling to mitigate these critical security vulnerabilities. We will cover concepts such as role base access control for ML system artifacts and resources, encryption and access restrictions of data in transit and at rest, best practices for supply chain vulnerability mitigation, tools for vulnerability scans, and templates that practitioners can introduce to ensure best practices.

Пікірлер
Why Security Is Important in ML and How To Secure Your ML-based Solutions | Rachid Kherrazi
54:44
Flawed ML Security: Mitigating Security Vulnerabilities in Data & Machine...- Adrián González Martín
28:15
Useful gadget for styling hair 🤩💖 #gadgets #hairstyle
00:20
FLIP FLOP Hacks
Рет қаралды 10 МЛН
ЧУТЬ НЕ УТОНУЛ #shorts
00:27
Паша Осадчий
Рет қаралды 10 МЛН
Why Is He Unhappy…?
00:26
Alan Chikin Chow
Рет қаралды 58 МЛН
Explained: The OWASP Top 10 for Large Language Model Applications
14:22
Top 12 Tips For API Security
9:47
ByteByteGo
Рет қаралды 88 М.
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
42:45
Log4J Vulnerability (Log4Shell)  Explained - for Java developers
20:50
Hypnotized AI and Large Language Model Security
13:22
IBM Technology
Рет қаралды 8 М.
How to Secure AI Business Models
13:13
IBM Technology
Рет қаралды 20 М.
Xiaomi SU-7 Max 2024 - Самый быстрый мобильник
32:11
Клубный сервис
Рет қаралды 539 М.
ноутбуки от 7.900 в тг laptopshoptop
0:14
Ноутбуковая лавка
Рет қаралды 3,4 МЛН
АЙФОН 20 С ФУНКЦИЕЙ ВИДЕНИЯ ОГНЯ
0:59
КиноХост
Рет қаралды 1,2 МЛН
📱магазин техники в 2014 vs 2024
0:41
djetics
Рет қаралды 479 М.
Новые iPhone 16 и 16 Pro Max
0:42
Romancev768
Рет қаралды 2,3 МЛН