distorted human figures in shades of black and dark green with binary code and the words "cyber attack" overlapping

AI in Cybersecurity: Socio-Technical & Environmental Considerations

The Fourteenth Workshop on the Social Implications of National Security (SINS21) Human Factors Series

Dates and locations

18 February 2021, Sydney Australia at 7:30 a.m.

17 February 2021, London, Britain at 8:30 p.m. 

17 February 2021, Phoenix Arizona at 1:30 p.m.

18 February 2021, Hong Kong at 4:30 a.m.

17 February 2021, Washington DC at 3:30 p.m.

18 February 2021, New Delhi, India at 2:00 a.m.

In July 2017, China released the “New Generation Artificial Intelligence Development Plan” outlining its strategy to build a domestic AI industry worth nearly US$150 billion with the aim of becoming the leading AI power by 2030. This policy has fueled increasing concerns over potential security breaches, economic consequences, and political threats regarding AI and cybersecurity in the intelligence alliance of Five Eyes (FVEY). There is an urgent need to more fully understand the range of factors that might shape how AI could be used in cybersecurity for good or harm, beyond the organizational level (Geels 2004), especially given diverse ideological positions and systems of governance. And, although there has been a considerable effort investigating socio-technical factors (i.e., the interaction of people, tasks, organizations, and technology) shaping cybersecurity, there has been limited focus on the complex external environment and dynamic socio-cyber-physical ecosystem that can shape these socio-technical factors.

The vast majority of security research has been related to the traditional CIA Triad (confidentiality, integrity, availability). While this strategy has continued to strengthen organizational and infrastructural defences, we have to consider the new emergent threats. These include: homogeneity in products at their core operating system, large storage area network providers and critical telecommunication exchanges and international banking interchanges, the supply of electricity and water and the respective interdependencies therein. Of particular importance are autonomous systems (in the form of software code), advanced machine learning approaches that incorporate blackbox neural nets, and highly complex technologies that may be microscopic and even embeddable and undetectable. The sociotechnical approach to security requires that the open environment be imagined as much as the inputs and outputs forming attack vectors, and the forces behind the players at interplay through productive movement (Michael Eldred).  

This workshop encourages a deeper examination of value chain stakeholders, their roles and responsibilities and their corresponding dynamic interactions and interdependencies in a turbulent environment (Abbas 2012). For example, how do different federal and state laws, regulations, policies, guidelines and economic infrastructure shape the AI and cybersecurity landscape in an international context? How is AI and cybersecurity being applied as a potential global offset. How can Cybersecurity specialists respond to these threats once they have been explicitly identified?

SINS 21 Schedule 

Program Schedule at a Glance

7:20 a.m. Welcome and Context Setting, Katina Michael, Arizona State University

7:30 a.m. Philosopher’s Perspective on AI, Dr Michael Eldred

7:40 a.m. Industry Perspectives on Cyber and the Need to Evolve our Defence Systems in the Unwinnable War- Angelo Friggieri, Managing Director of Government and Health Security, Accenture

8:00 a.m. Industry Perspectives Q&A - Facilitated by Elma Hajric, Arizona State University

8:10 a.m. Invited Speaker on Democracy by Design – Jeremy Pitt, Imperial College London

8:30 a.m. Invited Speaker Q&A – Facilitated by Kathleen Vogel, Arizona State University

9:00 a.m. - TEN Minute Break

9:10 a.m. Movement 1 - Opening facilitated by Theresa Anderson, University of Illinois at Urbana-Champaign

Breakout (14 min)

Julia Slupska (Logistics: Cindy Dick)

Rys Farthing (Logistics: Melissa Waite)

Nikki Stevens (Logistics: Katina Michael)

9:30 a.m. Report Back

9:40 a.m. Keynote: Operationalising Socio-Technical Theory: Examining Social, Technical and Environmental Subsystems - Roba Abbas, University of Wollongong

10:00 a.m. Keynote Q&A – Facilitated by Eusebio Scornavacca, University of Baltimore

10:30 a.m. - TWENTY Minute Break

10:50 a.m. Movement 2 - Facilitated by Kathleen Vogel, Arizona State University and Salah Hamdoun, Arizona State University

11:20 a.m. Luis Kun, Distinguished Lecturer IEEE SSIT, A Holistic View of the Information Age Challenges and the Social Implications of Technology

11:30 a.m. Jennifer Seberry, University of Wollongong

11:40 a.m. Samuel Visner, MITRE.org

11:50 a.m. Secrecy is still bad for democracy - Vanessa Teague, Thinking Cybersecurity

12:00 p.m. Psychosocial Dimensions of Insider Threat - Jordan Schoenherr, Carleton University

12:10 p.m. - RE Burnett, National Defense University

12:20 p.m. - Movement 3 - Presented by Joseph Carvalko, Yale University

12:35 a.m. Reflections in the Chat Window (* five minutes of silence)

12:40 p.m. - ONE Hour Break

1:30 p.m. Painting a Picture of AI in Cybersecurity: the Threat Landscape and our Collective Response, Patrick Scannell, TechneStar LLC

1:50 p.m. MITRE.org Session

Dave Cabrera

Conor Michael Mahoney

Josh Kiihne

2:20 p.m. - TEN Minute Break

2:30 p.m. PARALLEL BREAKOUTS

A: Theory: Socio-Technical & Environmental Theoretical Reflections* (Kobi Leins)

Mariana Zafeirakopoulos

Lindsay Robertson

Nicole Stephensen

Toby Shulruff

Paul Millea*

Matt Mytka, GreatherThanExperience, Operationalising data ethics frameworks

 Eusebio Scornavacca

Jai Galliot*

Colby Holenbaugh+ (pre-record)

    B: Tech: AI in Cybersecurity: Technical Challenges and Possible Solutions* (Shahriar Akter)

Shahriar Akter

Tyler Sweatt, Vice President of Growth at Second Front Systems, Seeing through the smoke - AI's security challenges

David Troy

Sara Jordan

Marcus Wigan

Rob Nicholls*

C: Governance: The Governance of Socio-Technical Systems* (Lyria Bennett Moses)

Lyria Bennet Moses

Salah Hamdoun, Innovation and Global Development PhD Candidate, Arizona State University, National security and digitalization of currencies

Elma Hajric, Human and Social Dimensions PhD Candidate, Arizona State University, Data Governance: The Ownership Problem

Greg Adamson

EJ Wise

Ethan Burger

3:30 p.m. Jann Karp

3:40 p.m. Jordan Brown

3:50 p.m. Roger Clarke, Australian National University, A Proposal for Protection against AI-Based Cybersecurity Protections

4:30 p.m. Close, Theresa Anderson

* Talks in these sessions will be 5 minutes long only. One slide (optional)

Keynote Speakers