{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:58:51Z","timestamp":1776931131423,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"DOI":"10.1145\/3769694.3771166","type":"proceedings-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T10:03:58Z","timestamp":1766829838000},"page":"233-239","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Current State Of AI Education: Security As An Afterthought"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4832-1845","authenticated-orcid":false,"given":"Pavan","family":"Reddy","sequence":"first","affiliation":[{"name":"George Washington University, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"AttackIQ. 2024. AttackIQ Academy Launches Online AI Security Course to Help Security Teams Bridge the Knowledge Gap. AttackIQ Press Release (May 2024). https:\/\/attackiq.com\/press-release\/attackiq-academy-launches-online-ai-security-course"},{"key":"e_1_3_3_1_3_2","unstructured":"V. Benjamin et\u00a0al. 2024. Systematically Analyzing Prompt Injection Vulnerabilities in Diverse LLM Architectures. arXiv:https:\/\/arXiv.org\/abs\/2410.23308 [cs.CR] (October 2024). https:\/\/arxiv.org\/abs\/2410.23308"},{"key":"e_1_3_3_1_4_2","volume-title":"The Hacking of ChatGPT Is Just Getting Started","author":"Burgess Matt","year":"2023","unstructured":"Matt Burgess. 2023. The Hacking of ChatGPT Is Just Getting Started. WIRED. https:\/\/www.wired.com\/story\/chatgpt-jailbreak-generative-ai-hacking"},{"key":"e_1_3_3_1_5_2","volume-title":"Companies skip security hardening in rush to adopt AI","author":"Constantin Lucian","year":"2024","unstructured":"Lucian Constantin. 2024. Companies skip security hardening in rush to adopt AI. CSO Online. https:\/\/www.csoonline.com\/article\/3529615\/companies-skip-security-hardening-in-rush-to-adopt-ai.html"},{"key":"e_1_3_3_1_6_2","volume-title":"Researchers Detail Zero-Click Copilot Exploit \u2018EchoLeak\u2019","author":"Culafi Alexander","unstructured":"Alexander Culafi. [n. d.]. Researchers Detail Zero-Click Copilot Exploit \u2018EchoLeak\u2019. Dark Reading. https:\/\/www.darkreading.com\/application-security\/researchers-detail-zero-click-copilot-exploit-echoleak"},{"key":"e_1_3_3_1_7_2","volume-title":"Fundamentals of Secure AI Systems with Personal Data","author":"Board European Data Protection","year":"2025","unstructured":"European Data Protection Board. 2025. Fundamentals of Secure AI Systems with Personal Data. Technical Report. edpb. https:\/\/www.edpb.europa.eu\/system\/files\/2025-06\/spe-training-on-ai-and-data-protection-technical_en.pdf"},{"key":"e_1_3_3_1_8_2","volume-title":"Hack The Box and Google partner to lead the future of AI security education (Launching the AI Red Teamer path)","author":"Box Hack The","year":"2025","unstructured":"Hack The Box. 2025. Hack The Box and Google partner to lead the future of AI security education (Launching the AI Red Teamer path). Hack The Box Blog. https:\/\/www.hackthebox.com\/blog\/google-ai-red-teamer"},{"key":"e_1_3_3_1_9_2","unstructured":"HackerOne. 2025. The Cost Savings of Fixing Security Flaws in Development. HackerOne Blog (February 2025). https:\/\/www.hackerone.com\/blog\/cost-savings-fixing-security-flaws"},{"key":"e_1_3_3_1_10_2","volume-title":"Professors integrate cybersecurity, AI curriculum to prepare the next-generation cyber workforce","author":"Hernandez-Alende Diana","year":"2020","unstructured":"Diana Hernandez-Alende. 2020. Professors integrate cybersecurity, AI curriculum to prepare the next-generation cyber workforce. FIU News. https:\/\/news.fiu.edu\/2020\/professors-integrate-cybersecurity%2C-ai-curriculum-to-prepare-the-next-generation-cyber-workforce"},{"key":"e_1_3_3_1_11_2","volume-title":"An Eating Disorder Chatbot Is Suspended for Giving Harmful Advice","author":"Hoover A.","year":"2023","unstructured":"A. Hoover. 2023. An Eating Disorder Chatbot Is Suspended for Giving Harmful Advice. https:\/\/www.wired.com\/story\/tessa-chatbot-suspended\/"},{"key":"e_1_3_3_1_12_2","volume-title":"Scaling AI Too Fast: The Cybersecurity Blind Spots No One Talks About","author":"Joshua G.","year":"2025","unstructured":"G. Joshua. 2025. Scaling AI Too Fast: The Cybersecurity Blind Spots No One Talks About. SecPod Labs Blog. https:\/\/www.secpod.com\/blog\/scaling-ai-cybersecurity-risks\/"},{"key":"e_1_3_3_1_13_2","unstructured":"E. Koblentz. 2025. Collaboration Between NJIT Rutgers Temple Adds Security to AI Education. NJIT News (January 2025). https:\/\/news.njit.edu\/collaboration-between-njit-rutgers-temple-adds-security-ai-education"},{"key":"e_1_3_3_1_14_2","unstructured":"Nick Kolakowski. 2024. More Cybersecurity Experts Need AI Skills: Survey. Dice Insights (October 2024). https:\/\/www.dice.com\/career-advice\/more-cybersecurity-experts-need-ai-skills-survey"},{"key":"e_1_3_3_1_15_2","unstructured":"Eduard Kovacs. [n. d.]. Secrets Exposed in Hugging Face Hack. SecurityWeek ([n. d.]). https:\/\/www.securityweek.com\/secrets-exposed-in-hugging-face-hack\/"},{"key":"e_1_3_3_1_16_2","volume-title":"O\u2019Reilly: Bridging the Cybersecurity Skills Gap","author":"Law Marcus","year":"2024","unstructured":"Marcus Law. 2024. O\u2019Reilly: Bridging the Cybersecurity Skills Gap. Cyber Magazine. https:\/\/cybermagazine.com\/articles\/global-survey-reveals-critical-ai-security-skills-shortage"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Bertalan Mesko. 2023. The ChatGPT Revolution Has Made AI Approachable for Medical Professionals. J. Med. Internet Res. 25 (2023) e48392. 10.2196\/48392","DOI":"10.2196\/48392"},{"key":"e_1_3_3_1_18_2","unstructured":"Dan Milmo. 2024. Company worker in Hong Kong pays out \u00a320m in deepfake video call scam. The Guardian (February 2024). https:\/\/www.theguardian.com\/world\/2024\/feb\/05\/hong-kong-company-deepfake-video-conference-call-scam"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Grace\u00a0C. Nickel Serena Wang Jethro C.\u00a0C. Kwong and Joseph\u00a0C. Kvedar. 2024. The case for inclusive co-creation in digital health innovation. npj Digital Medicine 7 251 (2024). 10.1038\/s41746-024-01256-9","DOI":"10.1038\/s41746-024-01256-9"},{"key":"e_1_3_3_1_20_2","volume-title":"Artificial Intelligence Risk Management Framework (AI RMF 1.0)","year":"2023","unstructured":"NIST. 2023. Artificial Intelligence Risk Management Framework (AI RMF 1.0). Technical Report NIST AI 100-1. National Institute of Standards and Technology. https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/nist.ai.100-1.pdf"},{"key":"e_1_3_3_1_21_2","unstructured":"OpenAI. 2023. Announcing OpenAI\u2019s Bug Bounty Program. OpenAI Blog (April 2023). https:\/\/openai.com\/index\/bug-bounty-program\/"},{"key":"e_1_3_3_1_22_2","unstructured":"OWASP Foundation. 2025. OWASP Top 10 for Large Language Model Applications. Online resource. https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/ List of the top 10 security risks for LLM applications as defined by the OWASP GenAI Security Project."},{"key":"e_1_3_3_1_23_2","volume-title":"O\u2019Reilly 2024 State of Security Survey Reveals Critical AI Skills Gap as Organizations Grapple with Evolving Cyber Threats","author":"Media O\u2019Reilly","year":"2024","unstructured":"O\u2019Reilly Media. 2024. O\u2019Reilly 2024 State of Security Survey Reveals Critical AI Skills Gap as Organizations Grapple with Evolving Cyber Threats. BusinessWire. https:\/\/www.businesswire.com\/news\/home\/20241007110624\/en\/"},{"key":"e_1_3_3_1_24_2","unstructured":"Kevin Paeth Daniel Atherton Nikiforos Pittaras Heather Frase and Sean McGregor. 2024. Lessons for Editors of AI Incidents from the AI Incident Database. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.16425 (September 2024)."},{"key":"e_1_3_3_1_25_2","unstructured":"Practical DevSecOps. 2023. Certified AI Security Professional (CAISP) Program. https:\/\/www.practical-devsecops.com\/certified-ai-security-professional\/"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.17345571"},{"key":"e_1_3_3_1_27_2","unstructured":"Stanford University Institute for Human-Centered AI. 2025. Artificial Intelligence Index Report 2025. https:\/\/hai.stanford.edu\/ai-index\/2025-ai-index-report."},{"key":"e_1_3_3_1_28_2","volume-title":"ChatGPT\u2019s alter ego, Dan: users jailbreak AI program to get around ethical safeguards","author":"Taylor Josh","year":"2023","unstructured":"Josh Taylor. 2023. ChatGPT\u2019s alter ego, Dan: users jailbreak AI program to get around ethical safeguards. The Guardian. https:\/\/www.theguardian.com\/technology\/2023\/mar\/08\/chatgpt-alter-ego-dan-jailbreak-ai-program-ethical-safeguards"},{"key":"e_1_3_3_1_29_2","volume-title":"Breaking down \u2018EchoLeak\u2019, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot","author":"Team Aim\u00a0Labs","year":"2025","unstructured":"Aim\u00a0Labs Team. 2025. Breaking down \u2018EchoLeak\u2019, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot. Aim Security. https:\/\/www.aim.security\/lp\/aim-labs-echoleak-blogpost"},{"key":"e_1_3_3_1_30_2","unstructured":"Wiz Research Team. 2025. AI Is Everywhere\u2014But Security Teams Are Still Catching Up. Wiz Blog (June 2025). https:\/\/www.wiz.io\/blog\/ai-security-readiness-report"},{"key":"e_1_3_3_1_31_2","volume-title":"People are \u2019Jailbreaking\u2019 ChatGPT to Make It Endorse Racism, Conspiracies","author":"Xiang C.","year":"2023","unstructured":"C. Xiang. 2023. People are \u2019Jailbreaking\u2019 ChatGPT to Make It Endorse Racism, Conspiracies. VICE. https:\/\/www.vice.com\/en\/article\/people-are-jailbreaking-chatgpt-to-make-it-endorse-racism-conspiracies\/"}],"event":{"name":"ACM SIGCITE 2025: 26th Annual ACM Conference on Cybersecurity and Information Technology Education","location":"Sacramento , California , USA","acronym":"ACM SIGCITE 2025","sponsor":["SIGCITE ACM Special Interest Group on Cybersecurity & Information Technology Education"]},"container-title":["Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769694.3771166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T23:59:06Z","timestamp":1769471946000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769694.3771166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":30,"alternative-id":["10.1145\/3769694.3771166","10.1145\/3769694"],"URL":"https:\/\/doi.org\/10.1145\/3769694.3771166","relation":{},"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2025-12-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}