Preparing IR for AI Incidents with Gerard Johansen
E8

Preparing IR for AI Incidents with Gerard Johansen

Is your Incident Response plan AI ready?

Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.

You’ll learn how AI incidents actually happen and how to respond to them.

Gerard will also cover what to include in your incident response plan so you’re prepared as your organization adopts AI.

🛝 Webcast Slides
https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf

Chapters
  • (00:00) - Intro
  • (02:33) - Who is Gerard Johansen
  • (03:10) - Webcast Agenda
  • (04:58) - Our Guardrails
  • (07:36) - Challenges in AI Incident Response
  • (09:48) - Artificial Intelligence Hype
  • (10:46) - Our Assets Column
  • (11:59) - History doesn’t repeat, it rhymes.
  • (15:09) - Classification Model
  • (17:08) - Threat Actor Use
  • (18:40) - Threat Actor - Case Studies
  • (20:01) - Key Points to Consider
  • (21:40) - GenAI Targeting
  • (22:21) - GenAI Targeting - Case Studies
  • (23:02) - [more] Key Points to Consider
  • (24:33) - Internally Generated AI Incident
  • (26:02) - Internally Generated - Case Studies
  • (27:00) - [even more] Key Points to Consider
  • (29:09) - AI Readiness Planning - Key Assumptions
  • (30:06) - AI Readiness Planning
  • (30:46) - Establish a clear and concise definition
  • (32:19) - Establish Incident Criteria
  • (34:24) - Rework Existing Processes
  • (36:26) - Tie in Additional Stakeholders
  • (37:44) - Information Sharing
  • (41:13) - AI Incident Premortem
  • (44:13) - Continuously Review
  • (46:13) - Hypothesize, Test & Improve
  • (48:23) - Key Points for the plan
  • (50:47) - Sumamry
  • (52:03) - Questions & Discussion



Chat with your fellow attendees in the BHIS Discord server:
https://discord.gg/bhis
in the #🔴live-chat channel

🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –
https://poweredbybhis.com

Click here to watch a video of this episode.


Brought to you by:
Black Hills Information Security 

Antisyphon Training

Active Countermeasures

Wild West Hackin Fest

Episode Video

Creators and Guests

Deb Wigley
Host
Deb Wigley
Deb Wigley is the Director of Kindness and Generosity for Black Hills Information Security (BHIS). She joined the team in 2019 after celebrating 20 years of working in customer engagement and satisfaction in the Automotive Industry. She brings her passion for helping and serving people to the work she does at BHIS. The part of her role she enjoys the most is interacting with the community through our webcasts and educational content, our Discord servers, and conferences. She loves being a mom to her four kiddos and in her spare time, she enjoys reading, hiking, frequently entertaining a beach day, and being whisked away on rewilding adventures with her husband of 20+ years as much as possible.
Jason Blanchard
Host
Jason Blanchard
Jason Blanchard has been happily adopted into the hacker community at Black Hills Information Security (BHIS) since 2019, even though he “works in marketing.” He’s had every dream job imaginable: teaching filmmaking, owning the world’s most famous comic book store, and fostering the infosec community efforts for SANS. While some at BHIS call him the “Director of Excitement,” he is formally known as the Excitement Co-Creator. In his day-to-day work of “sucking at capitalism,” Jason enjoys helping others, sharing his knowledge, and giving away lots of free stuff. When he’s not working, Jason spends time with his wife and daughter, hosts a semiweekly job-hunting Twitch stream, and enjoys writing short stories and performing stand-up comedy.
Gerard Johansen
Guest
Gerard Johansen
A cyber security professional with over a decade of experience specializing in digital forensics, incident response, and threat intelligence. After a decade in law enforcement, transitioned into the private sector working in large enterprise and consulting. During my tenure in cyber security, I have been fortunate enough to work on complex digital investigations as well as develop training and enablement programs for cyber security defenders all over the world.