Testing the System: A Holistic Approach to Security in Systems Development

58:48
Research to Reality Building Production Ready LLM Apps Users Can Trust

30:23
From Transparency to Accountability and Back: A Discussion of Access and Evidence in AI Auditing

1:59:40
NIST Cybersecurity Framework: A Beginner's Guide

1:01:59
ACM2Y Online BoF - Generative AI Use in Community College Computing Programs - Feb 18, 2025

51:29
Project Success in Cybersecurity Initiatives

4:21
February 2025 CACM: Meta’s Hyperscale Infrastructure: Overview and Insights

39:15
Ask the Expert - Oilfield Industry

4:45