AI Security Brief

AI Security Brief

AI Security Brief unpacks how AI is reshaping cybersecurity, from emerging attack techniques to zero-day research and real-world adversary activity. Powered by TrendAI threat intel and featuring conversations with international law enforcement, AI policy leaders, and security leaders, each episode delivers one insight worth bringing back to your team. Hosted by AI security practitioners Johnny Hand and Dustin Childs.

Trailer

Recent Episodes

Ep 1 | 4.13.26

New AI Security Podcast

Excited him now natural saw passage offices you minuter. At by asked being court hopes. Farther so friends am to detract. Forbade concern do private be.

TranscriptTranscript
AI Security Brief
Host(s)
Dustin Childs
Johnny Hand
Dustin C. Childs is a part of TrendAI's Zero Day Initiative (ZDI), which is the world's largest vendor-agnostic bug bounty program. Dustin began his infosec journey in the late 1990s at the Air Force Information Warfare Center. Following his time working for the government, Mr. Childs worked in the Microsoft Trustworthy Computing group, where he served as a case manager in the Microsoft Security Response Center (MSRC) with a focus on addressing vulnerabilities in the Windows operating system and in Microsoft's developer tools. In his current role, Mr. Childs gathers and analyzes threat intelligence from various TrendAI and open-source resources to understand and communicate risk to enterprises. He also creates, implements, and oversees internal and external communications programs that promote the work of the ZDI and its researchers. He has spoken at multiple conferences including Black Hat USA, ThotCon, BlueHat, B-Sides, and multiple ISSA events.
Johnny Hand is a seasoned cybersecurity leader with over 20 years of experience translating intricate technical concepts into business-critical operations. He is the VP, for AI Operational Excellence at TrendAI, where he spearheads the integration of artificial intelligence for enhanced security and operational efficiency. His background in securing critical infrastructure includes leading information security and technology operations for an international academic institution and overseeing communication and defensive cyber operations for specialized units within the U.S. Navy. His focus remains on building resilient security strategies that adapt to the evolving technology landscape.
Schedule: Biweekly