Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

AI War Stories: Silent Failures, Real Consequences

Date:
Wednesday, August 20th
Time:
2 p.m. ET / 7 p.m. BST
Virtual event titled "AI War Stories: Silent Failures, Real Consequences" exploring real-world AI security incidents and silent compliance vulnerabilities.

AI systems rarely crash when compromised – they comply. Whether it’s a helpful browser extension leaking emails or a chatbot escalating privileges via persistent memory, AI failures don’t announce themselves. They quietly obey malicious instructions, often with no alerts, no errors, and no oversight.

In this webcast, Jessica Stinson, Senior Solutions Engineer, shares AI war stories drawn from real-world security assessments, revealing how trusted AI tools in production were silently manipulated to leak data, trigger unauthorized actions, and undermine system integrity. These aren’t theoretical risks; they’re failures happening in environments just like yours.

You’ll learn:

  1. How indirect prompt injection, memory manipulation, and AI-driven automation are being used in the wild
  2. Why architectural blind spots, not bad prompts, are the root cause of many AI security incidents
  3. How to apply structural defenses like modular execution layers, policy enforcement gates, and output sanitization

Who Should Watch:

  • AI/ML Engineers and Developers
  • Security Architects
  • Application Security Teams
  • DevSecOps Engineers
  • Cloud Security Professionals
  • Risk Management Teams
  • Product Security Managers
  • System Architects

If you’re building, deploying, or securing AI in your environment, this session will challenge your assumptions and equip you with a blueprint to prevent silent failures from becoming real-world breaches.


Jessica Stinson BF Headshot

About the speaker, Jessica Stinson

Senior Solutions Engineer

Jessica Stinson is a Senior Solutions Engineer at Bishop Fox, serving as a trusted advisor throughout the sales process, collaborating with delivery teams to ensure seamless client on-boarding and long-term satisfaction. Previously, Jessica was a Security Consultant III at Bishop Fox focused on Application Security, Cloud Security, and Source Code Review. Jessica's experience ranges from testing applications, internal and external networks, and cloud-based infrastructures for current threats and vulnerabilities with an emphasis on application and cloud security to conducting source code review, analyzing system architecture and threat models while using internal and external tools to identify vulnerabilities within applications and networks.

More by Jessica

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.