logo
episode-header-image
Mar 2024
26m 9s

LLM Security and Privacy

Massive Studios
About this episode

Sean Falconer (@seanfalconer, Head of Dev Relations @SkyflowAPI, Host @software_daily) talks about security and privacy of LLMs and how to prevent PII (personally identifiable information) from leaking out

SHOW: 807

CLOUD NEWS OF THE WEEK -
http://bit.ly/cloudcast-cnotw

NEW TO CLOUD? CHECK OUT OUR OTHER PODCAST -
"CLOUDCAST BASICS"

SHOW SPONSORS:

SHOW NOTES:

Topic 1 - Our topic for today is the security and privacy LLMs. What’s Sean’s origin story?

Topic 2 - Let’s dig into LLM security and privacy. We see this concern a lot on the podcast and we’ve touched on it with various past shows, but we haven’t dug in deep. First, let’s frame the problem. What are we talking about when we talk about LLM security and privacy?

Topic 3 - First, there is a fear that customer PII information might leak out. Second, company IP or confidential into might leak out related to products or offerings. We’ve seen examples of both to date. This could be exposed in the form of integration into a model (query it for the answer) or in the fine-tuning or RAG stage. Either one could lead to compliance issues, lost rev etc. But, that same data at risk is the potential differentiation of the models. How do you both mask the data but take advantage of the data?

Topic 4 - One thing I’ve noticed is many orgs only think about privacy in relation to the fine-tuning stage where they are taking a broad model and making it company specific. It is about much more than that though. Just like standard software development, we have different stages. How is the data collected and stored, how is it used for training and fine-tuning, how is it used after deployment and during interaction stage, etc. How should security and privacy be handled across all phases?

Topic 5 - Let’s talk beyond LLMs for a bit. What about Data Lakes and Data Warehousing? I see this as a problem across all big data, correct?

Topic 6 - How does API security fit into this? Much of what we are talking about is at the storage and retrieval level. But, increasingly we see API issues exposing data. How does that fit in here?

Topic 7 - Let’s talk podcasts, we had Jeff, the previous host of Software Engineering Daily on a few times. How are things over at Software Engineering Daily? Tell everyone a bit about the show.

FEEDBACK?

Up next
Yesterday
Data Pipelines with Apache Airflow
Julian LaNeve (@JulianLaneve, CTO @astronomerio) discusses data pipelines, Apache Airflow, Astronomer’s managed offering, and the benefits of data pipelines for both developers and operations.SHOW: 939SHOW TRANSCRIPT: The Cloudcast #939 TranscriptSHOW VIDEO: https://youtube.com/@ ... Show More
25m 36s
Jul 6
A Mid-Year Cloud Check-In
As we get to the mid-point of 2025, let’s take a look at where the cloud is - what’s doing well, what’s going through some changes, and what might be in store for the rest of 2025. SHOW: 938SHOW TRANSCRIPT: The Cloudcast #938 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcas ... Show More
25m 53s
Jul 1
AI & Cloud Trends for June 2025
Brian Gracely (@bgracely) and Brandon Whichard (@bwhichard, @SoftwareDefTalk) discuss the top stories in Cloud and AI from June 2025.SHOW: 937SHOW TRANSCRIPT: The Cloudcast #937 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcastNET NEW TO CLOUD? CHECK OUT OUR OTHER PODCAST: ... Show More
42m 46s
Recommended Episodes
Jun 2022
Simplify Data Security For Sensitive Information With The Skyflow Data Privacy Vault
Summary The best way to make sure that you don’t leak sensitive data is to never have it in the first place. The team at Skyflow decided that the second best way is to build a storage system dedicated to securely managing your sensitive information and making it easy to integrate ... Show More
54m 5s
Jul 2021
Strategies For Proactive Data Quality Management
Summary Data quality is a concern that has been gaining attention alongside the rising importance of analytics for business success. Many solutions rely on hand-coded rules for catching known bugs, or statistical analysis of records to detect anomalies retroactively. While those ... Show More
1h 1m
Jun 2021
At the Intersection of Data and Privacy with Salesforce’s Marla Hay
So you want to build a giant enterprise platform. Great. You want mission critical and private data to flow between CRMs and other critical applications flawlessly, with no leaks, no breaches, and no compromises. You also want to build infinite user controls and optionality, and ... Show More
41m 1s
Jun 2023
Digital Law: Cyber Security, Data Protection & Privacy - Peter Wright - S7E6
Send us a text Have you ever wondered how Digital Law has evolved over the years and what it takes to be at the forefront of this dynamic field? Well, today's episode is your chance to find out! This week we're super excited to be chatting with Peter Wright, someone who is making ... Show More
49m 31s
Dec 2021
#497: Enabling Business Through Security
How does building in the cloud make it easier to achieve positive security outcomes? What role does security culture play and how can the department of no become the department of yes? In this episode, Simon speaks with Paul Hawkins from the Office of the CISO at AWS, to answer t ... Show More
30m 22s
Oct 2019
Security at Splunk and Everywhere Else, with Splunk’s SVP and GM of Security Markets, Haiyan Song
You know all those hacks and data breaches you read about in the newspaper? Do you understand them? It’s fine if you don’t, most people can’t figure out exactly what all that noise means. But Haiyan Song does, and it’s a good thing because as the SVP and GM of Security Markets at ... Show More
44m 23s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Mar 2021
Wed. 03/10 – Now The Hackers Are In The Security Cams
Hackers breached the security cameras used by everybody from prisons and hospitals to Tesla factories. Why you will no longer “subscribe” to this podcast, but will “follow” it. Why T-Mobile is signing everyone up to have their usage data tracked by advertisers. And Facebook’s 10 ... Show More
17m 35s