Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Mindgard: No, Your LLM Isn’t Safe Yet

Truth in IT
05/05/2025
64
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett with Small World Big Data. We are here at RSAC 2025. We're with Mindgard right now, and we're going to talk a little bit about some of the ways you can use cybersecurity to, I don't know, attack yourself in a way just for the for the good of everybody. I've got a Fergal. Is that right? Yeah. Fergal Glynn. Hi, Mike. Hi. Uh, so let's just start a little bit with the Mindgard. Uh, tell us about the sort of the pen testing, red teaming approach that you guys are bringing to cybersecurity. Yeah, certainly. So we have an attack library that we have built to test AI applications, models and agents for safety concerns, security concerns and business concerns. So this is really, uh, coming against AI. This is a very AI. Exactly. It's AI specific. Um, our background is actually in academia. And so we spent ten years at the University of Lancaster in the UK researching this space of the security of AI. Uh, in 2022, we spun that research out and formed Mainguard. So I think looking across all the companies in the space. We have the most research put in to this very new, very unique, very fast changing area. Um, and so the attacks that we have built up, we have a considerable large amount of attacks, um, some proprietary to us. We also work closely with the open source community, um, to, to leverage and also give back to the work that they're doing. Um, and then, as I said, like the attacks, we focus on safety issues, which could be, uh, an AI application generating harmful content, security issues where it could be an attacker using, uh, looking to use the application to get access to additional data within the organization and also business concerns where, um, we attempt to get an AI application, maybe to talk about things that you don't want to talk about. For example, imagine you have a candle shop and you put a chatbot up on your e-commerce store. Well, you probably don't want that, uh, that application talking about your competitors candles. And so our attack library, um, will go and will check, um, models, agents and applications for those three different use cases. All right. I mean, 20, 2022 gives you like a three year head start on some other people who are just now thinking about AI and what can go wrong with it, and how to validate that their use of AI. So I imagine you've got a quite, a quite an advantage on that for just that library stuff. Yeah. Yeah, certainly. So. Um, we've got this great R&D background. And then also, um, we feel that just the usability of these types of solutions is very important. And then also the flexibility. So in terms of usability, one of the things that we've invested in on our product is looking to make it faster for a pentester to get up and running with their job. So we take what is taken in the past 2 or 3 days worth of work that a pentester does to just get started with their project, and we have automated that down now to a matter of minutes. And then in terms of the flexibility of what we do, like we're integrating with the tools like Burpsuite that Pentesters are already using. Uh, are you using AI at all in that way to help somebody get up to speed on testing AI? Um, so there is AI in the product, uh, not on getting up to speed, but there is AI in some of the attacks that we are running. Right. So we're going to see that in the future, I'm sure though is like these Red Queen things about AI helping tech AI. If there's one sort of thing you wanted to tell everyone here at the show, and there's like 25,000 people here, uh, about AI and securing AI, what would that be? Yeah. So AI is software. We all know that software has vulnerabilities. And so AI has vulnerabilities. And our mission is to help our customers and help the world to secure their AI. Yeah. So, uh, that's a very, uh, just totally on target, right? For what's going on in the world today. Uh, is AI everywhere, and people should be pushing that. Uh, so if someone wanted to learn more about mine, guard and scratch a little deeper into the libraries of things that you test for some of the things you can help validate and secure, uh, what would you point them out? Uh, mine guard I also go check out our GitHub and if you come to our website, go check out our documentation. All right. Thank you so much Fergal. Thank you Mike. All right take care folks.
Mindgard is building tools to simulate adversarial threats against AI models, especially in high-risk sectors like finance and defense. From poisoning datasets to jailbreaking LLMs, they’re helping enterprises understand how AI can be exploited—and how to secure it. Think red teaming, but for neural networks. Because you can’t secure AI if you don’t know how it breaks.
Categories:
  • » Cloud Webinars
  • » Cloud Webinars » Public Cloud Webinars
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Data Management » DevOps
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • mindgard
  • ai
  • security
  • adversarial
  • ai
  • llm
  • ai
  • red
  • teaming
  • machine
  • learning
  • threats
  • neural
  • network
  • security
  • ai
  • model
  • hardening
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Mindgard: No, Your LLM Isn’t Safe Yet

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Enhancing Threat Prevention with AD CS Protection Techniques in Learning Lab 8.0
                https://www.truthinit.com/index.php/channel/1775/enhancing-threat-prevention-with-ad-cs-protection-techniques-in-learning-lab-8-0/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Enhancing Threat Prevention with AD CS Protection Techniques in Learning Lab 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      29

                      Preparing Your Cybersecurity Strategy for the Challenges of 2026

                      01/29/202610:00 AM ET
                      More events

                      Recent Spotlight Events

                      • Dec
                        10

                        The Next Generation of Managed Data Security Services

                        12/10/202501:00 PM ET
                        • Dec
                          02

                          The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                          12/02/202501:00 PM ET
                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • Dec
                              18

                              Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                              12/18/202501:00 PM ET
                              • Dec
                                16

                                HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                12/16/202501:00 PM ET
                                • Dec
                                  11

                                  Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                  12/11/202501:00 PM ET
                                  More events
                                  Truth in IT
                                  • Sponsor
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Preference Management
                                  Desktop version
                                  Standard version