Beyond ChatGPT, Building Security Applications using OpenAI API

Beyond ChatGPT, Building Security Applications using OpenAI API
ChatGPT was launched by OpenAI in November 2022. Since then, it has been the subject of many discussions. ChatGPT itself is one application that was built on top of OpenAI’s GPT-3 models. We can programmatically interact with these models via OpenAI API. In this talk, we will go beyond ChatGPT and discuss OpenAI API, fine-tuning our own models for specific tasks, and building security applications on top of them. We will be building a sample application that interprets human requests and performs the basic tasks requested.
Watch Now

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

OTHER ON-DEMAND WEBINARS

How to Outmatch Data Security Challenges with Cost-Effective, Practical Strategies

IBM

Today’s threat landscape requires businesses of all sizes to gain visibility and control over sensitive data in order to comply with a tangled web of security and privacy requirements. Addressing insider threats and defending intellectual property, customer data and other confidential information across hybrid and multi-cloud environments can overwhelm even the savviest of security and IT teams, especially when resources are scarce. However, data security defenses don’t have to be costly or overly complex to carry out.
Watch Now

Practical Risk Management Steps for the Threat Hunter

Simplilearn

What is threat hunting and why is this field gaining popularity among security organizations? Threat hunting emphasizes on a proactive approach to security and encourages organizations to anticipate and manage potential security breaches and hacks. Join Dr. James Stanger, Sr Director of Products at CompTIA, in a live webinar as he walks us through the critical areas of threat hunting and how this can enhance current cyber security measures for organizations.
Watch Now

Unlock Your AppSec Future: Web App Security without Tradeoffs

We see you, exhausted security professionals. Web attack surfaces are growing unchecked, but your teams aren’t. You don’t even have your apps mapped, much less scanned regularly. The apps you do test have more vulnerabilities than you can remediate — how do you prioritize?
Watch Now

How to Secure Your Applications Against API Attacks

Application programming interfaces (APIs) are the basic building blocks to enabling business applications and software to communicate and share data. Therefore, cyber-attacks targeting APIs can be a major headache to businesses, potentially leading to large-scale data breaches as well as causing massive disruption. Yet, API security has never been more broken, with security teams unprepared for surging levels of attacks targeting these software intermediaries. In this webinar, a panel of experts will review the state of API cybersecurity and provide insights into how to protect these interfaces from an increasingly high volume of attacks. Join this session to learn:
Watch Now

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

resources