VIRTUAL EVENT

Securing AI: Navigating Shadow Data and Emerging Threats

Wednesday, May 7, 2025 • 2:00–3:00 p.m. ET

 

Explore the Complexities of AI Shadow Data

Join us for an insightful webinar on Securing AI: Navigating Shadow Data and Emerging Threats. We’ll explore the complexities of vector databases, including RAG workflows, shadow data, and data multiplication. Discover the security vulnerabilities targeting AI data, with a focus on OWASP’s updated Top 10 for LLMs. Learn effective strategies for mitigating risks, from securing vectors and managing logs to ensuring compliance with data privacy regulations like PCI. We’ll delve into best practices for internal AI project management and how to collaborate with external vendors while safeguarding your data. We’ll provide valuable insights into the future trends in AI security, offering actionable recommendations for today and tomorrow.

Don’t miss this opportunity to equip yourself with the knowledge to navigate the evolving landscape of AI security!  

IN PARTNERSHIP WITH

 

Discussion Topics

Common Security Threats to Vector Databases

  • Unauthorized access and insider threats
  • Lack of encryption and malicious vector injections
  • Weaknesses in indexing processes and DoS attacks
  • Accidental data exposure through API responses, logs, or backups

Key Security Features for Vector Databases

  • Encryption: Protecting data at rest and in transit
  • Secure Data Transmission: Using protocols like TLS
  • Access Controls: Robust authentication and authorization
  • Backup and Store: Reliable backup and restore processes

Data Privacy Considerations

  • Compliance with GDPR, CCPA, and HIPAA
  • Access control, data encryption, retention policies, breach reporting, and database auditing

Best Practices for Securing Vector Databases

  • Implementing role-based access control (RBAC) and multifactor authentication (MFA)
  • Monitoring user activity and enforcing least privilege access
  • Validating and sanitizing input data to prevent malicious injections
  • Using scalable infrastructure to mitigate DoS attacks

Case Studies and Real-world Examples

  • Success stories for securing vector databases in different industries
  • Lessons learned from past security breaches

Future Trends and Emerging Technologies

  • Property-preserving encryption and application-layer encryption
  • Emerging threats and how to stay ahead

Agenda

8:00-8:30 a.m.

Registration and Networking Breakfast

8:30-8:45 a.m.

Welcome Remarks

8:45-9:15 a.m.

Keynote Presentation–Jamal Khan: Government IT Trends and Challenges

9:15-10:00 a.m.

Partner and Customer Engagement

10:00-10:15 a.m.

Networking Break

10:15-11:00 a.m.

Panel Discussion–Topic: Cybersecurity, Cloud, AI, or IT Modernization

11:00-11:30 a.m.

IronYun Spotlight

11:30 a.m.-12:00 p.m.

Fireside Chat

12:00-1:30 p.m.

Lunch and Networking - CarahCafe Terrace, weather permitting


FEATURED SPEAKERS

Jamal Khan


Jamal Khan

Chief Growth and Innovation Officer, Connection

Learn about Jamal ›

 

Patrick Walsh

CEO, IronCore Labs

Learn about Patrick ›

Privacy Statement

Due to the confidential nature of this event and the open discussion format, we will make every possible effort to respect the privacy of attendees, including limiting the publication of any comments or information related to your participation. Please note that static photography and video recording will be conducted during select portions of the event. If you do not wish to have your likeness recorded in photos or video, please let a member of our Events Team know within the registration process.

Learn more about the CNXN Helix Center for Applied AI and Robotics at
www.cnxnhelix.com