{"id":7113,"date":"2025-08-08T13:56:30","date_gmt":"2025-08-08T20:56:30","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=7113"},"modified":"2025-08-19T09:57:52","modified_gmt":"2025-08-19T16:57:52","slug":"augmenting-ai-security","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/augmenting-ai-security\/","title":{"rendered":"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-image:url(&#039;https:\/\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/empty-background-1024x819.jpg&#039;);--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/empty-background-1024x819.jpg\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1024\" height=\"242\" title=\"AI-Risk-Summit-logo-1024&#215;242\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=1024%2C242&#038;ssl=1\" alt class=\"img-responsive wp-image-7114\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=66%2C16&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=177%2C42&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=200%2C47&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=300%2C71&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=320%2C76&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=400%2C95&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=460%2C109&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=500%2C118&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=540%2C128&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=600%2C142&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=669%2C158&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=700%2C165&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=768%2C182&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=800%2C189&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?resize=940%2C222&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AI-Risk-Summit-logo-1024x242-1.webp?fit=1024%2C242&amp;ssl=1 1024w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 1024px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-image:url(&#039;https:\/\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/empty-background-1024x819.jpg&#039;);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/empty-background-1024x819.jpg\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"918\" height=\"529\" title=\"Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=918%2C529&#038;ssl=1\" alt class=\"img-responsive wp-image-7116\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=66%2C38&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=177%2C102&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=200%2C115&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=300%2C173&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=320%2C184&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=400%2C231&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=460%2C265&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=500%2C288&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=540%2C311&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=600%2C346&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=669%2C386&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=700%2C403&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=768%2C443&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?resize=800%2C461&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_-_Augmenting_AI_Security_External_Strategies_for_Threat_Mitigation_906683.jpeg?fit=918%2C529&amp;ssl=1 918w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 918px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-image:url(&#039;https:\/\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/empty-background-1024x819.jpg&#039;);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/objectsecurity.com\/wp-content\/uploads\/2024\/11\/empty-background-1024x819.jpg\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"918\" height=\"529\" title=\"Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=918%2C529&#038;ssl=1\" alt class=\"img-responsive wp-image-7117\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=66%2C38&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=177%2C102&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=200%2C115&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=300%2C173&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=320%2C184&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=400%2C231&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=460%2C265&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=500%2C288&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=540%2C311&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=600%2C346&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=669%2C386&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=700%2C403&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=768%2C443&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?resize=800%2C461&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/Kramer_Lang_-_Opening_the_Black_Box_Trust_and_Transparency_with_AIBOMs_912016.jpeg?fit=918%2C529&amp;ssl=1 918w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 918px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><span>ObjectSecurity will present two sessions on AI security at the AI Risk Summit on August 19th, 2025 in Half Moon Bay, CA. <\/span><\/p>\n<p><span>As AI adoption accelerates across industry and government, the risks tied to unsecured models and opaque supply chains are becoming impossible to ignore. Despite growing awareness of adversarial threats, most efforts still focus narrowly on the models themselves, while the surrounding infrastructure remains dangerously exposed. <\/span><\/p>\n<p><span>The session titled \u201cAugmenting AI Security: External Strategies for Threat Mitigation\u201d will address this critical gap by introducing a set of defenses that go beyond internal model safeguards. Drawing from real-world deployment experience, this presentation will explore external techniques such as resource quotas to prevent denial-of-service attacks, rate limiting and input validation to block API abuse, and anomaly monitoring to detect threats in real time. <\/span><\/p>\n<p><span>The second session, \u201cOpening the Black Box: Trust and Transparency with AIBOMs\u201d, will shift focus to the AI supply chain itself. As open-source models, fine-tuned variants, and downloadable adapters become widely reused, organizations face significant uncertainty about what they are actually deploying. These components may be backdoored, legally risky, or poorly documented, making traditional governance tools insufficient. <\/span><\/p>\n<p><span>This talk will introduce the Artificial Intelligence Bill of Materials (AIBOM), a model transparency framework inspired by SBOMs but tailored for the unique complexity of AI systems. AIBOMs capture metadata such as model provenance, fine-tuning lineage, training data characteristics, licensing, and known risks. <\/span><\/p>\n<p><span>Together, these sessions offer a practical foundation for securing AI systems in production and governing AI adoption with greater clarity and control. With threat surfaces expanding and pressure mounting for more transparent, defensible AI pipelines, our approach offers a timely and actionable path forward.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.airisksummit.com\/event-session\/augmenting-ai-security-external-strategies-for-threat-mitigation\/\"><span class=\"fusion-button-text\">Augmenting AI Security<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.airisksummit.com\/event-session\/opening-the-black-box-trust-and-transparency-with-aiboms\/\"><span class=\"fusion-button-text\">Opening the Black Box<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.airisksummit.com\/\"><span class=\"fusion-button-text\">AI Risk Summit 2025 <\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-4 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Contact Us To Learn More<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":7168,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[60,90,17],"tags":[],"class_list":["post-7113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-education","category-event"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit\",\"datePublished\":\"2025-08-08T20:56:30+00:00\",\"dateModified\":\"2025-08-19T16:57:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/\"},\"wordCount\":6779,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/AIRISKJason.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Artificial Intelligence\",\"Education\",\"Event\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/\",\"name\":\"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/AIRISKJason.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-08-08T20:56:30+00:00\",\"dateModified\":\"2025-08-19T16:57:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/AIRISKJason.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/AIRISKJason.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/augmenting-ai-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit","datePublished":"2025-08-08T20:56:30+00:00","dateModified":"2025-08-19T16:57:52+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/"},"wordCount":6779,"image":{"@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AIRISKJason.png?fit=600%2C337&ssl=1","articleSection":["Artificial Intelligence","Education","Event"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/","url":"https:\/\/objectsecurity.com\/augmenting-ai-security\/","name":"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AIRISKJason.png?fit=600%2C337&ssl=1","datePublished":"2025-08-08T20:56:30+00:00","dateModified":"2025-08-19T16:57:52+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/augmenting-ai-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AIRISKJason.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AIRISKJason.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/augmenting-ai-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"ObjectSecurity Presents Augmenting AI Security External Strategies for Threat Mitigation at AI Risk Summit"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/08\/AIRISKJason.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=7113"}],"version-history":[{"count":11,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7113\/revisions"}],"predecessor-version":[{"id":7139,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7113\/revisions\/7139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/7168"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=7113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=7113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=7113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}