Present Harms and Future Risks: A Case for Responsible AI

Lee Lounge/109


In our session, we will:

  1. Provide an overview of present-day AI capabilities and the risks and harms stemming from their increasingly widespread adoption, and give an approachable introduction to concepts in AI Safety, Ethics, and Security.
  2. Present interactive, live demonstrations recently shown to Congressional Staffers in D.C. at the Center for AI Policy’s Advanced AI Expo. We will demonstrate the security risk of voice models that mimic emotional speech—posing threats to businesses, enabling floods of fake 911 calls, or misleading Congressional representatives through coordinated fake constituent campaigns. We will also show how integrating LLM agents into business workflows can create unique vulnerabilities in multi-agent systems.
  3. Demonstrate how, even at current capability levels, AI systems already pose significant risks relevant to IT professionals.
  4. Outline how AI capabilities have developed over recent years and present arguments for why this rapid pace will continue. We’ll briefly explore the implications for industry and society, including risks associated with frontier and future AI, and provide a high-level overview of mitigation efforts underway.

We will close with a discussion of our work at WAISI, how to get involved in responsible AI, and what this means for IT professionals.


Presenters


Recording (with captions)

Recording (with audio description)

 

Meet the Wisconsin Cyber Response Team

Room 112


Learn about CRT’s Wisconsin public sector outreach, networking, training, intel and other opportunities that CRT provides to its members. Here from UW–Madison employees who are current CRT members and the benefit it’s brought to their teams.


Presenters


Recording (with captions)

Recording (with audio description)

Navigating Cybersecurity via LabArchives: Defining Roles to Strengthen Data Integrity and Risk Management

Virtual

Join the Zoom Event


“Navigate the intricacies of Software as a Service (SaaS) cybersecurity at UW Madison and discover Plan of Action and Milestones (POA&M) risk remediation strategies to achieve a low-risk score while maintaining compliance. Explore the crucial role of principal investigators (PIs) and other essential stakeholders in data stewardship and discuss the challenges they encounter. Gain insights from the Research Data Governance common solution group discussion and identify ways to support PIs in safeguarding research data, improving risk management, and ensuring compliance.

Attendees will:

  • Learn the fundamentals of the SaaS cybersecurity review process for the LabArchives ELN
  • Understand the importance of defining and documenting roles and responsibilities at various levels and categories of security
  • Hear key takeaways from the common solutions group held two weeks ago (May 15-17)
  • Identify methods to better support PIs in expanding human knowledge while responsibly managing data

Presenter

Enhancing cloud security: From basics to advanced strategies

Virtual

Join the Zoom Event


As more data, applications and business components move from on-premises environments to the cloud, it’s crucial to understand and address the unique security challenges that arise. This session provides a concise overview of cloud security, starting from the basics and progressing to advanced topics. Attendees will gain a foundational understanding of cloud security principles and learn how to implement robust security measures in their cloud environments.

Attendees will:

  • Learn the foundational concepts of cloud security, including common threats and best practices for mitigation
  • Discover how to use automation for secure configuration in the cloud
  • Understand the risk assessment process at UW Madison
  • Recognize the importance of establishing security baselines in a cloud environment and learn how to implement them<

Presenters

Understanding the New Federal Requirements for Research Security

Virtual

Join the Zoom Event


Join us for an informative session that will provide an overview of the upcoming federal requirements for UW–Madison’s research security program. As federal agencies implement new regulations, our institution must understand and adapt to these changes. This presentation will cover key areas such as cybersecurity, export control and other IT-related aspects of the research security landscape.

Attendees will:

  • Gain a comprehensive understanding of the new federal requirements and their implications for UW–Madison
  • Learn about the university’s response plan and how it will be implemented across campus
  • Discover how these changes will specifically impact the IT sector and its role in maintaining research security
  • Have the opportunity to ask questions and engage in discussions about the upcoming changes

Participants will leave the session with a clear understanding of the new federal requirements, the university’s response, and how these developments will affect the campus community, particularly within the IT domain. This knowledge will help attendees navigate the evolving research security landscape and contribute to successfully implementing the new program.


Presenters

Cybersecurity Appscanner: New features and best practices for secure web apps

Room 313
Note: Presenters will be virtual for this session.

Join the Zoom Event


Discover the latest enhancements to Cybersecurity Appscanner, the user-friendly web application vulnerability scanner developed by DoIT’s Web and Mobile Solutions (WaMS) team and the Office of Cybersecurity. Check out new features they developed based on community feedback, including API setup, GitLab integration, and Manifest groups access control. Learn best practices for secure web application development and see a real-time application portfolio management dashboard in action.

Attendees will:

  • Explore new features of Cybersecurity Appscanner
  • Learn best practices for secure web application development
  • Discover application portfolio management strategies
  • Gain insights to strengthen web application security posture

Presenters

Platform X: How SMPH implemented a secure data enclave

Room 313

Join the Zoom Event


Discover how the School of Medicine and Public Health (SMPH) implemented a secure data enclave using DevOps, Azure cloud computing and Microsoft’s suite of security tools. SMPH’s platform enables researchers, data engineers and data scientists to utilize resources like virtual machines, databases, OpenAI, data lakes and Power BI, all while protecting patient privacy. Gain insights into creating and scaling a secure computing environment in the cloud and learn about the platform’s capabilities.

Attendees will:

  • Learn about the approach SMPH took in creating their secure enclave
  • Hear about the various resources available within the platform
  • Discover how the platform maintains patient privacy while providing access to powerful tools for research and analysis
  • Gain practical tips about how to create and scale your own secure computing enclave in your IT environment

Presenter