# enterprise
10 articlestagged with “enterprise”
Capstone: Design an Enterprise AI Security Program
Architect a comprehensive enterprise AI security program spanning governance, technical controls, risk management, and incident response for organizations deploying LLMs at scale.
Capstone: Enterprise RAG Assessment
Capstone exercise: complete red team assessment of an enterprise RAG system with role-based access.
Customer Service Chatbot Security
Security analysis of AI-powered customer service chatbots. Data leakage vectors, brand reputation attacks, refund fraud through AI manipulation, and social engineering techniques targeting chatbot systems.
Samsung Code Leak via ChatGPT
Analysis of the April 2023 incident where Samsung employees leaked proprietary source code, test data, and internal meeting notes by entering them into ChatGPT. Covers data loss prevention, acceptable use policies, and enterprise AI governance.
RAG Infiltrator: Level 2 — Enterprise Knowledge Base
Infiltrate and exfiltrate data from a multi-tier enterprise RAG system with access controls.
Simulation: Enterprise Chatbot Engagement
Full red team engagement simulation targeting a customer-facing chatbot deployed by a fictional e-commerce company, covering reconnaissance, prompt injection, data exfiltration, and PII harvesting.
Simulation: Enterprise RAG Security Assessment
Full engagement simulation assessing an enterprise RAG-powered knowledge base for poisoning, exfiltration, and injection vulnerabilities.
Enterprise Knowledge Management AI Assessment
Assess an enterprise knowledge management system with role-based access, document permissions, and multi-tenant isolation.
Full Engagement: Enterprise Multi-Agent System
Full engagement of an enterprise multi-agent system with specialized agents for HR, IT, Finance, and Legal.
Integrating PyRIT with Azure OpenAI and Content Safety
Intermediate walkthrough on integrating PyRIT with Azure OpenAI Service and Azure AI Content Safety for enterprise red teaming, including managed identity authentication, content filtering analysis, and compliance reporting.