Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Mindgard: No, Your LLM Isn’t Safe Yet

Truth in IT
05/05/2025
63
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett with Small World Big Data. We are here at RSAC 2025. We're with Mindgard right now, and we're going to talk a little bit about some of the ways you can use cybersecurity to, I don't know, attack yourself in a way just for the for the good of everybody. I've got a Fergal. Is that right? Yeah. Fergal Glynn. Hi, Mike. Hi. Uh, so let's just start a little bit with the Mindgard. Uh, tell us about the sort of the pen testing, red teaming approach that you guys are bringing to cybersecurity. Yeah, certainly. So we have an attack library that we have built to test AI applications, models and agents for safety concerns, security concerns and business concerns. So this is really, uh, coming against AI. This is a very AI. Exactly. It's AI specific. Um, our background is actually in academia. And so we spent ten years at the University of Lancaster in the UK researching this space of the security of AI. Uh, in 2022, we spun that research out and formed Mainguard. So I think looking across all the companies in the space. We have the most research put in to this very new, very unique, very fast changing area. Um, and so the attacks that we have built up, we have a considerable large amount of attacks, um, some proprietary to us. We also work closely with the open source community, um, to, to leverage and also give back to the work that they're doing. Um, and then, as I said, like the attacks, we focus on safety issues, which could be, uh, an AI application generating harmful content, security issues where it could be an attacker using, uh, looking to use the application to get access to additional data within the organization and also business concerns where, um, we attempt to get an AI application, maybe to talk about things that you don't want to talk about. For example, imagine you have a candle shop and you put a chatbot up on your e-commerce store. Well, you probably don't want that, uh, that application talking about your competitors candles. And so our attack library, um, will go and will check, um, models, agents and applications for those three different use cases. All right. I mean, 20, 2022 gives you like a three year head start on some other people who are just now thinking about AI and what can go wrong with it, and how to validate that their use of AI. So I imagine you've got a quite, a quite an advantage on that for just that library stuff. Yeah. Yeah, certainly. So. Um, we've got this great R&D background. And then also, um, we feel that just the usability of these types of solutions is very important. And then also the flexibility. So in terms of usability, one of the things that we've invested in on our product is looking to make it faster for a pentester to get up and running with their job. So we take what is taken in the past 2 or 3 days worth of work that a pentester does to just get started with their project, and we have automated that down now to a matter of minutes. And then in terms of the flexibility of what we do, like we're integrating with the tools like Burpsuite that Pentesters are already using. Uh, are you using AI at all in that way to help somebody get up to speed on testing AI? Um, so there is AI in the product, uh, not on getting up to speed, but there is AI in some of the attacks that we are running. Right. So we're going to see that in the future, I'm sure though is like these Red Queen things about AI helping tech AI. If there's one sort of thing you wanted to tell everyone here at the show, and there's like 25,000 people here, uh, about AI and securing AI, what would that be? Yeah. So AI is software. We all know that software has vulnerabilities. And so AI has vulnerabilities. And our mission is to help our customers and help the world to secure their AI. Yeah. So, uh, that's a very, uh, just totally on target, right? For what's going on in the world today. Uh, is AI everywhere, and people should be pushing that. Uh, so if someone wanted to learn more about mine, guard and scratch a little deeper into the libraries of things that you test for some of the things you can help validate and secure, uh, what would you point them out? Uh, mine guard I also go check out our GitHub and if you come to our website, go check out our documentation. All right. Thank you so much Fergal. Thank you Mike. All right take care folks.
Mindgard is building tools to simulate adversarial threats against AI models, especially in high-risk sectors like finance and defense. From poisoning datasets to jailbreaking LLMs, they’re helping enterprises understand how AI can be exploited—and how to secure it. Think red teaming, but for neural networks. Because you can’t secure AI if you don’t know how it breaks.
Categories:
  • » Cloud
  • » Cloud » Public Cloud
  • » Cybersecurity » Data Security
  • » Cybersecurity » Application Security
  • » Data Management » DevOps
  • » Small World Big Data
  • » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • mindgard
  • ai
  • security
  • adversarial
  • ai
  • llm
  • ai
  • red
  • teaming
  • machine
  • learning
  • threats
  • neural
  • network
  • security
  • ai
  • model
  • hardening
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Mindgard: No, Your LLM Isn’t Safe Yet

            Upcoming Spotlight Events

            • Sep
              11

              An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      19

                      CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                      08/19/202512:00 PM ET
                      • Aug
                        21

                        Risk in Real Time: Visibility Into Cloud Based Vulnerabilities

                        08/21/202511:00 AM ET
                        • Aug
                          25

                          Harnessing AI to Transform the Landscape of Data Security

                          08/25/202510:55 AM ET
                          More events

                          Recent Industry Events

                          • Aug
                            13

                            Understanding the Limitations of WAFs and API Gateways Against Modern Threats

                            08/13/202501:00 PM ET
                            • Jul
                              23

                              Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                              07/23/202501:00 PM ET
                              • Jul
                                10

                                Discover the Latest Features of Netwrix 1Secure for MSPs

                                07/10/202501:00 PM ET
                                More events

                                Upcoming Events Calendar

                                • 08/19/2025
                                  12:00 PM
                                  08/19/2025
                                  CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective
                                  https://www.truthinit.com/index.php/channel/1401/cmmc-2-0-insights-understanding-compliance-from-an-expert-auditors-perspective/
                                • 08/21/2025
                                  11:00 AM
                                  08/21/2025
                                  Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                  https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                • 08/25/2025
                                  10:55 AM
                                  08/25/2025
                                  Harnessing AI to Transform the Landscape of Data Security
                                  https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                • 08/26/2025
                                  10:55 AM
                                  08/26/2025
                                  Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                  https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 08/27/2025
                                  10:55 AM
                                  08/27/2025
                                  Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                  https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                • 08/28/2025
                                  10:55 AM
                                  08/28/2025
                                  A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                  https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                • 08/29/2025
                                  10:55 AM
                                  08/29/2025
                                  Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                  https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version