Knowledge Series

Exploiting Conversational AI: Weaknesses and Bypass Techniques

We record all our sessions so that you can watch at your convenience

Exploiting Conversational AI: Weaknesses and Bypass Techniques | Full attack chain testing: Giving security products enough rope to hang themselves?

22 May 2025 | 5:30 PM SGT
Exploiting Conversational AI: Weaknesses and Bypass Techniques

Ankit Anubhav

Manager, Threat Research
Agoda

Bio:

Ankit Anubhav is a CyberSecurity Researcher with 13 years of experience in CyberSecurity domain, currently managing Threat Research at Agoda. Starting his career with malware detection at McAfee, he moved to behavior based EDR detection at FireEye ,and worked on IOT threat intelligence and red teaming at NewSky Security. Ankit is also an avid believer of contributing to the research community, sharing blogs and open source indicators. Ankit has also previously presented his IOT security research in Avar China in 2017 and written blogs for VirusBulletin.

Abstract:

With the rise of AI models, many organizations are using AI powered chatbots to interact with their clients and customers. However, with proper AI bypass methods, a hacker can trick the AI into prompt injection, false promises, as well as providing data which can cause a full-scale breach. In this webinar, we will discuss techniques of bypassing in-built AI guardrails to make AI do things it is not supposed to do, see some real examples, as well as discuss methods to protect the AI model against such attacks.

Full attack chain testing: Giving security products enough rope to hang themselves?

Simon Edwards

CEO
SE Labs

UK

Bio:

Simon Edwards is the founder and CEO of SE Labs, a London-based company that specialises in advanced security testing. He provides tailored security advice to large businesses and more general technical advice to small businesses and individuals.
Simon focuses on cybersecurity and develops ways to test computer security products and services. He built and ran the world’s first real-world anti-virus test and continues to innovate in testing that involves computer hacking.

Abstract:

Cyber security vendors make extraordinary claims about their products and services. These require extraordinary evidence. Testing is one way to provide that evidence, or to refute it. But there are so many ways to test a product. In this webinar we look at some difference approaches and look deeply into how testing like real attackers can truly provide useful, actionable insight into the cyber security products on sale. And how testing ‘properly’ might not be what some cyber security vendors want…

About Security Insights101

A knowledge sharing platform with monthly/bi-monthly webinars, covering ground-breaking security topics in the current context that impacts both technical and operations community as well as leadership and even businesses as a whole.

About Cyber Buzz

Find out what’s buzzing in the cybersecurity domain, what is making headlines or has potential to do so. This section we will cover the latest research from our members – expert analyses, original study/reports, or summary of an industry-wide policy issue and more.

Contact Us

For Speaker & Sponsorship Opportunities
Email id: rgdwivedy@aavar.org
For Queries
Email id: admin@aavar.org