ISMG & CMU SEI Presents:

Counter AI: What Is It and What Can You Do About It

October 7

11:00 am est | VIRTUAL

Presented By

Event Overview

This session will describe the technologies, counter-AI attacks, and threat models that occur within the Machine Learning Operations (MLOps) lifecycle. As the strategic importance of AI increases, so too does the importance of defending those AI systems.

To understand AI defense, it is necessary to understand AI offense—that is, counter AI. This session describes counter AI.

First, we describe the technologies that compose AI systems (the AI Stack) and how those systems are built in a MLOps lifecycle. Second, we describe three kinds of counter-AI attacks across the AI Stack and five threat models detailing when those attacks occur within the MLOps lifecycle.

Finally, based on Carnegie Mellon University Software Engineering Institute research and practice in counter AI, we give two recommendations. In the long term, the field should invest in AI engineering research that fosters processes, procedures, and mechanisms that prevent vulnerabilities being introduced into AI systems. In the near term, the field should develop the processes necessary to efficiently respond to and mitigate counter-AI attacks, such as building an AI Security Incident Response Team and extending existing cybersecurity processes like the Computer Security Incident Response Team Services Framework.


What Participants Will Learn:

  • The importance of defending AI systems
  • The difference between AI defense and AI offense
  • The technologies and counter-AI attacks within the MLOps lifecycle
  • Recommendations for near-and-long-term actions to take

Agenda

5:00 pm - 6:00 pm et

Networking and Registration

6:00 pm - 7:00 pm et

X-Force Cyber Range Experience

Following the Cyber Range experience, there will be a Debrief and Q&A session to discuss how AI can support compliance and regulatory challenges and best practices to promote cyber resiliency and executive readiness.

Discussion Points

  • What outcomes from the Cyber Range can you leverage to optimize compliance and cyber resiliency in your own organization?
  • What are the best practices for autonomous remediation to keep your cloud environment compliant, secure, and resilient?
  • How can you develop a comprehensive risk management strategy that integrates AI-powered threat detection to minimize the risk of non-compliance?
  • How can you leverage AI capabilities to automate and streamline security and compliance tasks?

 

7:00 pm - 7:15 pm et

Debrief and Q&A

7:15 pm - 8:30 pm et

Dinner, Drinks, and Roundtable Discussion

Moderator

 

Dr. Nathan VanHoudnos

Senior AI Security Research Scientist, CERT Division

Carnegie Mellon University Software Engineering Institute

 

Jayesh Kamat

Cybersecurity and Cloud Security Specialist | Consulting and Business Leader

IBM 

 

Moumita Saha

Senior Security Partner SA, Global Partner Security Initiative

AWS

Speaker

Join Dr. Nathan Vanhoudnos for a moderated session featuring insightful commentary. 

This  session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.