BEGIN:VCALENDAR
PRODID:-//Microsoft Corporation//Outlook 12.0 MIMEDIR//EN
VERSION:2.0
METHOD:PUBLISH
X-MS-OLK-FORCEINSPECTOROPEN:TRUE
BEGIN:VEVENT
CLASS:PUBLIC
CREATED:20260411T084622Z
DESCRIPTION:Large language models (LLMs) are used in an increasing number of applications that handle more critical tasks and are granted greater degrees of autonomy. While such agentic applications are powerful and versatile, LLM-based applications remain brittle and vulnerable to LLM-specific security threats.\nJoin this webinar AI Agents vs. Prompt Injections, Vladislav Tushkanov from Kaspersky AI Research Center will introduce one of these key vulnerabilities, prompt injection. He will examine the most recent and notable cases, such as EchoLeak, where prompt injections in production LLM applications led to significant privacy breaches. Finally, we will implement a demonstration agent to explore how these attacks function under the hood.\nHighlights\n• a concise overview of the recent cases of attacks on LLMs\n• an in-depth look into the underlying mechanics of the attacks\n• a Q&A session with the speaker\nAdditionally, Vladislav will present a newly released Kaspersky online training program on Large Language Model Security. This course covers both the theoretical foundations of how LLMs are trained to resist attacks and why this training may fail, while also providing extensive practical guidance for testing LLM application security and implementing effective safeguards against real-world attacks.\n
DTSTART:20261223T050000
DTEND:20261223T060000
DTSTAMP:20260411T084622Z
LOCATION:Online
PRIORITY:5
SEQUENCE:0
SUMMARY;LANGUAGE=es-es:Tecnowebinars.com - :: AI Agents vs. Prompt Injections
TRANSP:OPAQUE
UID:2ae7d49e4e0f62d6d63c547c6be53da1 Tecnowebinars.com
X-MICROSOFT-CDO-BUSYSTATUS:BUSY
X-MICROSOFT-CDO-IMPORTANCE:1
X-MICROSOFT-DISALLOW-COUNTER:FALSE
X-MS-OLK-ALLOWEXTERNCHECK:TRUE
X-MS-OLK-AUTOFILLLOCATION:FALSE
X-MS-OLK-CONFTYPE:0
BEGIN:VALARM
TRIGGER:-PT1440M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
