All Episodes
This Locale — 65 episodes
Foundations of AI & Cybersecurity - Lesson 47: Use Cases for Using Al-Enabled Tools to Facilitate Security Tasks
Foundations of AI & Cybersecurity - Lesson 44: Using Al-Enabled Tools to Facilitate Security Tasks
Foundations of AI & Cybersecurity - Lesson 43: Applying Compensating Controls
Foundations of AI & Cybersecurity - Lesson 42: Scenario for Determining Root Cause and Evidence Strength
Foundations of AI & Cybersecurity - Lesson 41: Determining Root Cause and Evidence Strength
Foundations of AI & Cybersecurity - Lesson 40: Scenario for Identifying Direct Model-Targeted Attacks
Foundations of AI & Cybersecurity - Lesson 39: Identifying Direct Model-Targeted Attacks
Foundations of AI & Cybersecurity - Lesson 38: Scenario on Analyzing the Attack Surface,& Classify the Attack Type
Foundations of AI & Cybersecurity - Lesson 37: Analyzing the Attack Surface & Classify the Attack Type
Foundations of AI & Cybersecurity - Lesson 36: Scenario on Identifying the Attack Indicators
Foundations of AI & Cybersecurity - Lesson 35: Identifying the Attack Indicators
Foundations of AI & Cybersecurity - Lesson 34: Scenario on Auditing Model Output for Risks
Foundations of AI & Cybersecurity - Lesson 33: Audit Model Output for Risks
Foundations of AI & Cybersecurity - Lesson 32: Scenario on Analyzing Model Behavior
Foundations of AI & Cybersecurity - Lesson 31: Analyze Model Behavior
Foundations of AI & Cybersecurity - Lesson 30: Scenario on Generating and Processing Logs
Foundations of AI & Cybersecurity - Lesson 29: Generate & Process Logs
Foundations of AI & Cybersecurity - Lesson 28: Scenario on Capture & Observe AI Activity
Foundations of AI & Cybersecurity - Lesson 27: Monitoring and Auditing AI systems - Capture & Observe AI Activity
Foundations of AI & Cybersecurity - Lesson 26: Scenario on Data Safety
Foundations of AI & Cybersecurity - Lesson 25: Data Safety
Foundations of AI & Cybersecurity - Lesson 24: Scenario Using Encryption Requirements
Foundations of AI & Cybersecurity - Lesson 23: Encryption requirements
Foundations of AI & Cybersecurity - Lesson 22: Scenario Implementing Appropriate Access controls for an AI System
Foundations of AI & Cybersecurity - Lesson 21: Building Secure AI - Requirements Phase with API Gateway Security and Interaction Controls
Foundations of AI & Cybersecurity - Lesson 20: Building Secure AI - Requirements Phase - Using Guardrail Assurance, Testing, and Validation
Foundations of AI & Cybersecurity - Lesson 19: Building Secure AI - Requirements Phase - Implementing Model-Level Security and Control Design
Foundations of AI & Cybersecurity - Lesson 18: Scenario using AI threat-modeling resources
Foundations of AI & Cybersecurity - Lesson 17: Explaining AI threat-modeling resources
Foundations of AI & Cybersecurity - Lesson 16: Bad Actors’ Use of AI in Cyber Attacks
Foundations of AI & Cybersecurity - Lesson 15: Secure Feedback, Audit, and Continuous Improvement
Foundations of AI & Cybersecurity - Lesson 14: Secure Deployment and Operational Defense
Foundations of AI & Cybersecurity - Lesson 13: Secure Model Engineering and Risk Controls
Foundations of AI & Cybersecurity - Lesson 12: Secure and Trusted Data Foundations
Foundations of AI & Cybersecurity - Lesson 11: Secure AI Strategy and Governance
Foundations of AI & Cybersecurity - Lesson 10: Retrieval Augmented Generation (RAG) - Vector Storage and Embeddings
Foundations of AI & Cybersecurity - Lesson 9: Model Output Watermarking and Model Parameter Watermarking
Foundations of AI & Cybersecurity - Lesson 8: Data Types - Structured, Semi Structured, Unstructured Data
Foundations of AI & Cybersecurity - Lesson 7: Module/Chapter Data Processing - Enhancement Processes with Data Augmentation, Data Balancing
Foundations of AI & Cybersecurity - Lesson 6: Module/Chapter 1.2.2 Data Processing - Traceability & Governance with Data Lineage, Data Provenance, and Data Governance
Foundations of AI & Cybersecurity - Lesson 5: Module/Chapter 1.2.1 Data Processing - Quality Assurance with Data Cleansing, Data Verification, Data Integrity
Foundations of AI & Cybersecurity - Lesson 4: Module/Chapter 1.1.4 Generative AI (Cross-Domain Content Creation)
Foundations of AI & Cybersecurity - Lesson 3: Module/Chapter 1.1.3 Language-Focused AI Systems (NLP Models)
Foundations of AI & Cybersecurity - Lesson 2: Module/Chapter Deep Learning & Neural Network Architectures (Modern AI Backbone)
Foundations of AI & Cybersecurity - Lesson 1 - Module/Chapter 1.1.1 Core Learning Paradigms (Foundational Categories)
The 2026 Pivot
November 2025 Beige Book: Proof that AI Is Replacing Workers, But Who Will Replace the Consumers?
The State of AI 2025 Report
The Rise of the Agentic Internet – pains and opportunities
Prosper or Peril: Restructuring the Global Trading System and the Future of the Fed
The Transformative Potential of AI in Higher Education
Post Labor Economics Part 2 - Rethinking Prosperity in an AI Dominated World Without Work
America’s AI Action Plan: Grand Vision Meets Ground Reality
Tariffs, Tech, and Hesitation - America’s Economy Is Treading Water
Preventing AI Catastrophe - The Hidden Risk Behind AI’s Breakneck Progress: Misaligned Power
Post Labor Economics - What If Owning Things, Not Working Jobs, Became the Way People Make Money?
AI Is Evolving Faster Than Markets Can Absorb - What Happens Next?
May 2025 Beige Book Review
AI Search is Not the Future It's the New Present
Current Business Economic Climate May 2025 - Better than what's being reported
April 2025 Beige Book Review
AI 2027 - Part 2 - Alternate Future Scenarios of Intelligence Emergence
AI 2027 - Part 1 - Future Scenario of Superintelligence Summary
WEF Global Risks Report 2025
2025 Tech Trends Report