Teaser: The Non Deterministic Challenge—Why New Tech is Different

Channel:
Subscribers:
4,550
Published on ● Video Link: https://www.youtube.com/watch?v=KEHWW040EpE



Duration: 0:00
3 views
0


⬥EPISODE NOTES⬥

The rise of large language models (LLMs) has reshaped industries, bringing both opportunities and risks. The latest OWASP Top 10 for LLMs aims to help organizations understand and mitigate these risks. In a recent episode of Redefining Cybersecurity, host Sean Martin sat down with Sandy Dunn and Rock Lambros to discuss the latest updates to this essential security framework.

The OWASP Top 10 for LLMs: What It Is and Why It Matters

OWASP has long been a trusted source for security best practices, and its LLM-specific Top 10 is designed to guide organizations in identifying and addressing key vulnerabilities in AI-driven applications. This initiative has rapidly gained traction, becoming a reference point for AI security governance, testing, and implementation. Organizations developing or integrating AI solutions are now evaluating their security posture against this list, ensuring safer deployment of LLM technologies.

Key Updates for 2025

The 2025 iteration of the OWASP Top 10 for LLMs introduces refinements and new focus areas based on industry feedback. Some categories have been consolidated for clarity, while new risks have been added to reflect emerging threats.

• System Prompt Leakage (New) – Attackers may manipulate LLMs to extract system prompts, potentially revealing sensitive operational instructions and security mechanisms.

• Vector and Embedding Risks (New) – Security concerns around vector databases and embeddings, which can lead to unauthorized data exposure or manipulation.

Other notable changes include reordering certain risks based on real-world impact. Prompt Injection remains the top concern, while Sensitive Information Disclosure and Supply Chain Vulnerabilities have been elevated in priority.

The Challenge of AI Security

Unlike traditional software vulnerabilities, LLMs introduce non-deterministic behavior, making security testing more complex. Jailbreaking attacks—where adversaries bypass system safeguards through manipulative prompts—remain a persistent issue. Prompt injection attacks, where unauthorized instructions are inserted to manipulate output, are also difficult to fully eliminate.

As Dunn explains, “There’s no absolute fix. It’s an architecture issue. Until we fundamentally redesign how we build LLMs, there will always be risk.”

Beyond Compliance: A Holistic Approach to AI Security

Both Dunn and Lambros emphasize that organizations need to integrate AI security into their overall IT and cybersecurity strategy, rather than treating it as a separate issue. AI governance, supply chain integrity, and operational resilience must all be considered.

Lambros highlights the importance of risk management over rigid compliance: “Organizations have to balance innovation with security. You don’t have to lock everything down, but you need to understand where your vulnerabilities are and how they impact your business.”

Real-World Impact and Adoption

The OWASP Top 10 for LLMs has already been widely adopted, with companies incorporating it into their security frameworks. It has been translated into multiple languages and is serving as a global benchmark for AI security best practices.

Additionally, initiatives like HackerPrompt 2.0 are helping security professionals stress-test AI models in real-world scenarios. OWASP is also facilitating industry collaboration through working groups on AI governance, threat intelligence, and agentic AI security.

How to Get Involved

For those interested in contributing, OWASP provides open-access resources and welcomes participants to its AI security initiatives. Anyone can join the discussion, whether as an observer or an active contributor.

As AI becomes more ingrained in business and society, frameworks like the OWASP Top 10 for LLMs are essential for guiding responsible innovation. To learn more, listen to the full episode and explore OWASP’s latest AI security resources.

⬥SPONSORS⬥

LevelBlue: https://itspm.ag/attcybersecurity-3jdk3

ThreatLocker: https://itspm.ag/threatlocker-r974

⬥RESOURCES⬥

OWASP GenAI: https://genai.owasp.org/

Link to the 2025 version of the Top 10 for LLM Applications: https://genai.owasp.org/llm-top-10/

Getting Involved: https://genai.owasp.org/contribute/

OWASP LLM & Gen AI Security Summit at RSAC 2025: https://genai.owasp.org/event/rsa-conference-2025/

AI Threat Mind Map: https://github.com/subzer0girl2/AI-Threat-Mind-Map

Guide for Preparing and Responding to Deepfake Events: https://genai.owasp.org/resource/guide-for-preparing-and-responding-to-deepfake-events/

AI Security Solution Cheat Sheet Q1-2025:https://genai.owasp.org/resource/ai-security-solution-cheat-sheet-q1-2025/

HackAPrompt 2.0: https://www.hackaprompt.com/




Other Videos By ITSPmagazine


2025-02-15Black & White, Color and The Collision of Analog and Digital in Film and Photography
2025-02-14Is there no other way? 🤔
2025-02-14I love that the podcast is Music Evolves—couldn't have a better name to describe the vinyl comeback.
2025-02-14Pressing Forward: The Vinyl Revival | The Sound. The Experience. The Future. | A Conversation wit...
2025-02-14Pressing Forward: The Vinyl Revival | The Sound. The Experience. The Future. | A Conversation wit...
2025-02-14Teaser: Revolutionizing Vinyl—The Future is Plant Based!
2025-02-14Pressing Forward: The Vinyl Revival | The Sound, The Experience, The Future | Larry Jaffee
2025-02-14Black, White, and Color: The Collision of Analog and Digital in Film and Photography | Random and...
2025-02-14Sitting in a public café, no Wi-Fi, no streaming, and no algorithms curating the experience for us
2025-02-13Bio-manufacturing: How It Can Reshape Industries and Our Planet | A Conversation with Edward Shen...
2025-02-12Teaser: The Non Deterministic Challenge—Why New Tech is Different
2025-02-11From Access to Automation: The New Playbook for IT and Security Teams | A JumpCloud Brand Story w...
2025-02-11From Access to Automation: The New Playbook for IT and Security Teams | A JumpCloud Brand Story w...
2025-02-11From Access to Automation: The New Playbook for IT and Security Teams | A JumpCloud Brand Story
2025-02-11Book "My Limitless Life" I Interview with Authors Karen Meades  and Barry Finlay | Audio Signals ...
2025-02-11Book "My Limitless Life" I Interview with Authors Karen Meades  and Barry Finlay | Audio Signals ...
2025-02-11(Teaser Video) Book "My Limitless Life" I Interview with Authors Karen Meades and Barry Finlay
2025-02-11Book "My Limitless Life" I Interview with Authors Karen Meades and Barry Finlay
2025-02-08Let's go to Italy With Sean Martin
2025-02-06Cyber Security The New Road Safety | Teaser for Australian Social Media Ban with Jaqueline Jayne
2025-02-06The Great Australian Social Media Ban: Fixing a Broken System or Just Breaking It More? | Guest: ...