ISSA Monthly Meeting | Hacking LLM: Attacks & Defenses Against Large Language Models | Ilker Adiyaman | Columbia, MD

IOActive Security Consultant, Ilker Adiyaman, will present ‘Hacking LLM: Attacks & Defenses Against Large Language Models,’ at this month’s ISSA Meeting hosted by the Information Systems Security Association’s (ISSA) Maryland Chapter and taking place January 22, 2025. This will be a hybrid event where registrants can meet virtually or in-person (Leidos, 6841 Benjamin Franklin Dr., Columbia, MD 21046).

ABSTRACT:

“In today’s rapidly evolving business landscape, organizations face increasing pressure to maintain robust cybersecurity practices while adopting cloud services, SaaS platforms, and AI tools. This presentation examines critical security practices that businesses should implement in 2024, highlighting how traditional security risks have transformed with the shift to third-party services. Through real-world examples of breaches and near-misses, we explore the often-overlooked risks in common business tools, the challenges of vendor risk management, and the critical importance of maintaining defensible security practices. Special attention is given to upmarket growth challenges, where larger clients demand extensive security documentation and proof of controls, along with emerging considerations for AI security policy. By understanding and implementing these essential security measures, businesses can better position themselves for growth while protecting against evolving cyber threats and meeting increasingly stringent client security requirements.”

Ilker Burak Adiyaman

“Ilker Burak Adiyaman is a Security Consultant at IOAcive. He has more than 15 years of industry experience, and has a proven track record of accomplishments on web engineering and security testing. During his professional experience, he worked with companies in Turkey and in US, gained significant experience on secure code development using multiple programming languages, web security testing and acquired skills on application and network security.”