Cybersecurity in the AI Era
Deepfakes, AI phishing, shadow AI, prompt injection — threats are evolving. Secure your AI deployments and build your cyber governance.
What you'll be able to do
Identify emerging AI-related threats and assess their impact
Map attack surfaces of AI systems and shadow AI
Design specific defenses: guardrails, red teaming, deepfake detection
Develop a structured AI security governance
Align AI Act, GDPR and NIS2 obligations with operational security
Program
AI-augmented threats
- › Audio/video deepfakes, AI phishing, automated social engineering
- › Prompt injection, jailbreaking, data extraction
- › Live demos in secure sandbox
Attack surface and data
- › Shadow AI: detecting unauthorized usage
- › Data classification in AI projects
- › Sovereignty vs US cloud: alternatives and regulatory impact
Defenses and regulatory framework
- › Guardrails, OWASP LLM Top 10 red teaming, deepfake detection
- › AI-augmented SOC: SIEM + ML, threat hunting
- › AI Act art. 15, GDPR art. 32, NIS2, ISO 42001
Governance and action plan
- › AI usage policy, assessment process, access management
- › AI incident response plan
- › Workshop: 90-day AI security plan
Tools covered
Practical info
2 days (14h)
CISO, CTO, DPO, IT managers, security project leads, executives
IT infrastructure or cybersecurity experience recommended
4 to 12 people
25% theory / 20% demos / 55% practice
Oscar Robert-Beslé
Pricing
Post-training support
Related programs
Coding with AI: Claude Code, Cursor, Copilot
Multiply your development productivity. Autocompletion, refactoring, autonomous code agents — from completion to agentic dev.
Building AI Agents for Production
LangChain, CrewAI, MCP, RAG — design and deploy autonomous AI agents in production. The most advanced program in our catalogue.
Getting Compliant with the AI Act
Understand the EU regulation, classify your AI systems by risk, build your compliance file. Deadline August 2026.
Request the full program
Bespoke program, tailored to your industry. First call is free.