The conference that changed our minds about AI

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, The conference that changed our minds about AI. The summary for this episode is: <p>Follow the Security Intelligence podcast on your preferred platform →&nbsp; <a href="https://www.ibm.com/think/podcasts/security-intelligence" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/podcasts/security-intelligence</a>&nbsp;</p><p><br></p><p>Did you miss out on the [un]prompted AI security conference? So did most of us. Except our very own Dustin “Evil Mog” Heywood, who joins us today to share highlights from the event.&nbsp;</p><p><br></p><p>And speaking of [un]prompted, we also discuss one of the biggest announcements to come out of the event: the Zero Day Clock. This coalition of experts is arguing that we need to radically rethink vulnerability management in the face of plummeting time-to-exploit values for new vulnerabilities.&nbsp;&nbsp;</p><p><br></p><p>Among their demands that might prove to be quite controversial: holding software makers liable for flaws and building more disposable architecture.&nbsp;</p><p><br></p><p>Then we talk about some notably nasty AI agent behavior, including manipulating prescriptions and writing mean blog posts about human users.&nbsp;</p><p><br></p><p>Finally, we round out the week with a discussion of burnout among cybersecurity pros. We’re working, on average, 10 overtime hours per week. It’s exhausting—and really, really bad for security.&nbsp;</p><p><br></p><p>All that and more on <em>Security Intelligence</em>.&nbsp;</p><p><br></p><p>00:00 -- Introduction&nbsp;</p><p>01:26 -- Report back from [un]prompted&nbsp;&nbsp;</p><p>09:07 -- The zero day collapse&nbsp;&nbsp;</p><p>21:26 -- AI agents harassing humans&nbsp;&nbsp;</p><p>31:26 -- Burnout in cybersecurity&nbsp;</p><p><br></p><p><em>The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.</em>&nbsp;</p><p><br></p><p>Subscribe to the IBM Think newsletter → <a href="https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120" rel="noopener noreferrer" target="_blank">https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120</a>&nbsp; </p><p><br></p><p>#zerodaysexploits #AIsecurity #AIagentsecurity #vulnerabilitymanagement</p>

DESCRIPTION

Follow the Security Intelligence podcast on your preferred platform →  https://www.ibm.com/think/podcasts/security-intelligence 


Did you miss out on the [un]prompted AI security conference? So did most of us. Except our very own Dustin “Evil Mog” Heywood, who joins us today to share highlights from the event. 


And speaking of [un]prompted, we also discuss one of the biggest announcements to come out of the event: the Zero Day Clock. This coalition of experts is arguing that we need to radically rethink vulnerability management in the face of plummeting time-to-exploit values for new vulnerabilities.  


Among their demands that might prove to be quite controversial: holding software makers liable for flaws and building more disposable architecture. 


Then we talk about some notably nasty AI agent behavior, including manipulating prescriptions and writing mean blog posts about human users. 


Finally, we round out the week with a discussion of burnout among cybersecurity pros. We’re working, on average, 10 overtime hours per week. It’s exhausting—and really, really bad for security. 


All that and more on Security Intelligence


00:00 -- Introduction 

01:26 -- Report back from [un]prompted  

09:07 -- The zero day collapse  

21:26 -- AI agents harassing humans  

31:26 -- Burnout in cybersecurity 


The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. 


Subscribe to the IBM Think newsletter → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120 


#zerodaysexploits #AIsecurity #AIagentsecurity #vulnerabilitymanagement