E. V. L.

Ethical Hacker | Ex-CISO | Security Expert

My professional background is defined by the combination of offensive security operational experience and strategic-level information security governance.

I built my expertise on the technological frontlines through vulnerability assessments of critical systems, and later integrated this operational knowledge into enterprise security strategies and the defense protocols of complex infrastructures. My core domain is the resilience of IT ecosystems, with a particular focus on the security validation of artificial intelligence architectures and the analysis of emerging algorithm-based threat vectors.

Academic and Professional Pillars

Early vulnerability research in natural language processing (2018):

Before the paradigm shift of generative models, I was already working on the integrity of conversational agents. My research focused on the theoretical methodology of extraction attacks against language models, with particular emphasis on unauthorized information extraction from training datasets and the reverse engineering of internal model logic.

Research on the future of cybersecurity:

During my studies at the University of Public Service, well before the widespread adoption of LLM technologies, I chose “AI-based cyberattacks” as my research domain. In my thesis, I examined the role of AI systems in cyber warfare, with a focus on automated attack mechanisms and the risks of predictive models.

My research included the analysis of complex technologies such as the embedding of malicious code within neural networks and AI-based context-dependent activation mechanisms. In this area, I investigated biometric and behavior-based target identification protocols, which enable autonomous activation of malicious code based on decision-making processes, ensuring precise execution timing and restricting the impact exclusively to designated targets.

Enterprise AI security: From February 2023, at the beginning of the global expansion of generative AI, I had the opportunity to become a member of the first dedicated AI task force within a highly regulated enterprise environment. In this sector, establishing appropriate security frameworks was critical, as innovative AI solutions had to simultaneously meet the strictest cybersecurity, data protection, and regulatory requirements.

As a cybersecurity expert, I was responsible for the secure and compliant integration of AI technologies into the organization’s critical business processes.

My responsibilities covered the entire AI lifecycle from a security perspective: from internally developed solutions, through comprehensive risk analysis of third-party models, to ensuring the integrity of training data and conducting cybersecurity validation of models. Practically, every domain at the intersection of AI and cybersecurity fell under my responsibility.

In my current advisory work, I focus on enabling partners to introduce AI solutions that enhance operational efficiency by establishing the right balance between innovation and security. This is achieved within optimized frameworks that avoid unnecessary costs while aligning security levels with real-world risks.

Mission of the Publication

I created this platform because I see that the AI revolution brings both unprecedented opportunities and risks never seen before.

My goal is to build a comprehensive, structured knowledge space capable of capturing, organizing, and making interpretable the full spectrum of AI security.

I aim to create a conceptual and informational map that not only summarizes the rapidly expanding body of knowledge but also organizes it into a coherent framework, enabling deeper understanding and critical analysis of the field.

I believe that a broad and in-depth understanding of how AI systems operate, their limitations, and their risk profiles forms the foundation of our collective responsibility. The more stakeholders — researchers, decision-makers, and society at large — are able to interpret the direct and indirect impacts of artificial intelligence, the greater the chance that technological advancement will be not only efficient, but also consciously guided from ethical and security perspectives.

Author

About the Author

E. V. L. Ethical Hacker | Former CISO | Cybersecurity Expert

Her professional career is defined by the duality of offensive technical experience and strategic information security leadership. As an early researcher in AI security, she was already working on the vulnerabilities of language models in 2018, and later became responsible for the secure integration of AI systems in enterprise environments. Through her publications, she aims to contribute to the development of a structured body of knowledge that supports understanding in the complex landscape of algorithm-driven threats and cyber resilience.

Contact

Get in Touch

For general inquiries, professional discussions, or consultations related to AI security, you can reach out using the contact information below.

Show email address
infoexamplecom