NSF CyberAI Workshop

Security for AI and AI for Cybersecurity present critical challenges to our nation. The goal of this important workshop, funded by the National Science Foundation, is to create an NSA NCAE-C Program of Study for Cyber AI. This will include KUs focusing on ‘Security of AI’ and ‘AI in Cybersecurity’.

This is an invitation only event.

April 2024, Louisville, KY

Monday, April 15: 9AM – 4:30PM

Time  Room  Title
8:30  Daisy  Registration
9:00 – 9:15  Daisy  Welcome & Introductory Remarks 
      Blair Taylor & Sidd Kaza, Towson University
9:15 – 10:15  Daisy 

Agency Briefings 
National Science Foundation 
      Victor Piotrowski (slides) (15 minutes) 

 

National Security Agency 
      Lynne Clark (slides) (20 minutes) 

Workshop Overview (slides
      Blair & Sidd, Towson University 

      The leadership team 
      Goal today and the attendees 
      What is ‘Security of AI’ (SecureAI) and ‘AI in Cybersecurity’ (AI Cyber)
      Summary of Workshop 1 
      Stipend process 
      Q & A

10:15 – 10:30  Break  Break
10:30 – 11:00  Daisy  KUs produced in Workshop 1 (slides)
      Paul Wagner, University of Arizona 
      Sajid, Md*, Towson University
11:00 – 11:30  Daisy  Activity 1: Speed Dating CyberAI Draft KU 
(Read only link to DRAFT Cyber AI KUs)
(Feedback form)
11:30 – 1:00  Daisy 
Working Lunch 

Noon – Infusing AI into Higher Ed (slides)
Eman El-Sheikh, University of West Florida 

12:20 – AI in Cybersecurity (slides)
Vincent Nestler, California State San Bernardino 

12:40 – Securing AI (slides)
Sagar Samtani, Indiana University

1:00-1:45 pm Daisy
Azalea

Breakout 1A – Cyber Foundations  Daisy (stage left) 
What cyber do we need for SecureAI and AICyber?

Goal: Given the existing CAE-CD and CAE-CO KUs, which KUs will serve as the cybersecurity foundational KUs for both SecureAI and AICyber
Outcome: Cybersecurity Foundational KUs
Facilitator: Seth Hamman, Cedarville University 

Breakout 1B – SecureAI Daisy (stage right) 

Goal: Given the Draft Cyber AI KUs, identify core KUs for Security of AI
Outcome: Core KUs for SecureAI
Facilitator: Shankar Banik, Citadel

Breakout 1C – AI Cyber Azalea

Goal: Given the Draft Cyber AI KUs, identify core KUs for AI for Cybersecurity
Outcome: Core KUs for AICyber
Facilitator: Yair Levy, Nova Southeastern 

1:45-2:15 pm  Daisy Report back from breakouts
2:15-3:00 pm

Daisy 

Azalea

Breakout 2A – Develop specific KUs (1-7)

Daisy (stage left) – Seth Hamman, Cedarville

Goal: Develop a given set of draft Cyber AI KUs
Outcome: Topics and outcome suggestions for a set of KUs

Breakout 2B – Develop specific KUs (8-14)

Daisy (stage right) – Shankar Banik, Citadel

Goal: Develop a given set of draft Cyber AI KUs

Outcome: Topics and outcome suggestions for a set of KUs

Breakout 2C – Develop specific KUs (15-22)

Azalea – Yair Levy, Nova Southeastern

Goal: Develop a given set of draft Cyber AI KUs
Outcome: Topics and outcome suggestions for a set of KUs

Feedback upload: https://forms.gle/FY2Q6UMgSn17saQN9

3:00-3:30 pm Daisy Refreshment break
3:30-4:30 pm Discussion, questions, wrap up 
      Lynne Clark, NSA
      Blair Taylor & Sidd Kaza, Towson University

Galt House Hotel

Daisy and Azelea Rooms

140 N Fourth St, Louisville, KY 40202

Funding

The stipend for the NSF Cyber AI Workshop is partially funded by NSF through the CyberCorps program DGE#1663184 at Towson University and funded by California State University San Bernardino.

If you are eligible to receive this $500 stipend, which covers your additional travel expenses from the CAE Symposium and effort, please turn your name badge in to Marcy, located at the table outside of the Daisy room at the close of the workshop. You will receive confirmation of your stipend shortly after the workshop.

Future Workshops

In conjunction with the CAE Symposium in April, the NICE Conference will take place in June. A subset of this group (primarily those planning to attend this symposium or NICE conference) will be invited to attend these additional workshops. These future workshops will have a different funding structure. If you have specific questions regarding the future workshops and travel planning, please reach out to us directly for guidance.

Name Organization
Banik, Shankar The Citadel
Dias, Dennis United States Naval Academy
El-Sheikh, Eman University of West Florida
Flores, Paige Towson University
Hamman, Seth Cedarville University
Kaza, Sidd Towson University
Levy, Yair Nova Southeastern University (NSU)
Nestler, Vinnie Cal State San Bernardino
Sajid, Md Towson University
Samtani, Sagar Indiana University
Taylor, Blair Towson University
Wagner, Paul University of Arizona

 

 

Resources

Definitions 

Security of AI – Securing AI systems and infrastructure throughout their lifecycle 

AI for Cybersecurity – Leveraging AI to implement traditional cybersecurity

Curricular/Workforce Guidelines 

CAE ACM Workforce Frameworks

NCAE-C CD (Appendix 1)

NCAE-C CD KUs (Full Document)

NCAE-C CO (1 pager)

NCAE-C CO KUs (Full Document)

ACM CSEC 2017 (1 pager)

ACM CSEC 2017 (Full Document)

ACM CS 202X AI KA (latest draft)

ACM CS 202X Security KA (latest draft)

ACM CS 2023

DCWF AI Work Roles

NICE Framework 

AI Risk Management Framework

                  

Programs at other institutions

AI Academic Programs (NSF STEM Directorate, 170 programs across the nation)

Nova Southeastern University:

MS in Computer Science Artificial Intelligence Concentration

MS in Information Technology Artificial Intelligence Management Concentration*

MS in Information Systems Artificial Intelligence Management Concentration*

*(soon to be Artificial Intelligence Application Concentration)

MS in Data Analytics and Artificial Intelligence*

*(currently MS in Data Analytics)

Community College Resources:

AACC Artificial Intelligence Incubator Network (supported by Dell and Intel)

Miami Dade College AI Programs

Mississippi Artificial Intelligence Network (MAIN)

State of Mississippi’s Statewide Digital and AI Skills Initiative

Mississippi Legislation to Create an AI in Education Task Force for K12 Education

Business Industry Leadership Team (BILT) Model

Collins College IT Skill Standards

Additional Supplements: 

An Architectural Risk Analysis of Large Language Models: Applied Machine Learning Security

An Architectural Risk Analysis of Machine Learning Systems: Toward More Secure Machine Learning

 

Network: CAESymposium24

Password: Cybersecurity24!