πŸ“Œ Open question for the Lab this week: Shadow AI
Your CFO pastes a forecast into ChatGPT. Your PM runs customer tickets through Claude. Your engineer drops code into a coding assistant with an API key still in the config.
None of it is malicious. All of it is happening.
What we want to know from you:
– Are you trying to detect it, block it, or govern it?
– What's actually working?
– What question keeps coming back that nobody has answered well?
Drop it here and I'll bring the sharpest ones into the next session: https://pillar-security.notion.site/39b698e30aae46419df70838da036cd9?pvs=105
1
1 comment
Stephanie Macahis
2
πŸ“Œ Open question for the Lab this week: Shadow AI
AI Cloud Security Lab
skool.com/cloud-security-lab
Learn cloud security using AI by building real cloud labs, security programs, and portfolio artifactsβ€”not just studying for certifications.
Leaderboard (30-day)
Powered by