AI Technology and Risk

 View Only
  • 1.  2023-12-20 AI Tech & Risk Meeting Minutes

    Posted Dec 22, 2023 10:54:00 AM

    AI Tech & Risk Meeting Minutes

    Dec 20, 2023

    Meeting Summary

    During the meeting, the participants discussed the news about a Chevy dealer selling a car for $1, expressing concerns about reputational risk and potential bad PR. They also introduced the elected co-chairs for the AI Technology & Risk Working Group and discussed their roles and responsibilities. The ongoing work on risk identification for AI was discussed, including the collaboration between different working groups. The MECE model was explained, with a focus on threats and vulnerabilities in AI models. Risks related to AI infrastructure and data infrastructure were also discussed, along with the need for a risk-centric approach. The participants discussed the scope of risk assessment, the identification of objects of attack, and the measurement of risk and impact level. Collaboration and next steps were decided, including the use of a working spreadsheet for collaboration and the need for human-in-the-loop review.


    Next Steps

    • Please review the shared spreadsheet:
      • AI Risks Categories
      • Is the spreadsheet too complex, too simplified, or just right?
      • The spreadsheet has been locked to comment/suggestion mode so that we can track contributions properly.
    • The next meeting will be on January 3, 2023, for those that can attend. We will be continuing the biweekly cadence, with the next meeting after that being Jan 17, and so on.

    Topics & Highlights

    1. Discussion about the Chevy dealer selling a car for $1

    • The participants mentioned the news about a Chevy dealer supposedly selling a car for $1.

    • They discuss the reputational risk and potential bad PR if the news turns out to be true.

    • They mention the possibility of it being a marketing strategy and the uncertainty about its authenticity.

    • They discussed the high prices of cars in Canada and the current state of car sales.

    2. Introduction of the elected co-chairs

    • The participants introduce the elected co-chairs for the AI Technology & Risk Working Group.

      • Mark Yanalitis

      • Satish Govindappa

      • Chris Kirschke

    • Mark Yanalitis provides a brief introduction about himself and his experience with the CSA.

    • Satish mentions his role as a chapter lead for CSA San Francisco and his involvement in working teams.

    • The speaker mentions their primary role in reviewing all kinds of AI-based applications.

    • The speaker expressed their interest in AI and thanked Sean for selecting them.

    3. Introduction of the main research analyst

    • Josh Buker introduces himself as a former developer with a technical background who will be supporting the co-chairs as the main research analyst from their team.

    4. Discussion on risk identification for AI

    • Daniele discusses the ongoing work on risk identification for AI and the collaboration between the risk and technologies working group and the AI controller framework working group.

    5. Discussion on Risk Categories and Spreadsheet

    • Marco presented the worksheet based on Daniele's document and included categories such as lifecycle, asset, component, threat, and impact.

    • The Excel spreadsheet was still a work in progress and open for review.

    • Sunil shared his approach, which aimed to establish a top-down view of the problem.

    6. MECE Model

    • The speaker mentions that the MECE model originated from Gary McGraw and his Berryville Institute, with some adaptations made. They explain that a MECE model ensures completeness in the model itself.

    • The speaker discusses the possibility of adding threats against availability to the MECE model, even though it was initially excluded due to the lack of interesting threats at the time.

    • The speaker explains the concept of objects of attack and the importance of considering them in the MECE model. They mention the need for a separate model if the objects of attack overlap too much with other aspects.

    • A question is raised about whether there are any objects of attack not incorporated when it comes to AI.

    7. Vulnerabilities in AI Models

    • The speaker contrasts vulnerabilities in AI with traditional vulnerability discoveries, highlighting the difference in nature and impact. They mention that vulnerabilities in AI can be silent failures, biases, or statistical violations.

    • The speaker acknowledges the valid question about how vulnerabilities in AI intersect with the MECE model. They explain that the current discussion focuses on threats rather than vulnerabilities, and there might not be a well-defined MECE model for vulnerabilities as a whole.

    • A question is raised about how a MECE model would address silent failures and other vulnerabilities specific to AI models.

    8. Definition of Risks

    • The speaker defines risks as threats and expresses the need to understand the domain and context.

    • The speaker appreciates the explanation.

    9. MECE Models

    • The speaker mentions that MECE models are hard to craft.

    • The speaker discusses fitting information into the model and making it mutually exclusive, comprehensively exhaustive.

    10. AI Infrastructure and Data Infrastructure Risks

    • The speaker discusses risks related to foundational and data infrastructure, as well as AI-specific chipsets.

    • The speaker raises the question of whether the supply chain issues for AI-specific chipsets are distinct or general problems.

    • The discussion covers the impact of supply chain attacks and the significance of vulnerabilities in AI infrastructure.

    • The speaker emphasizes that the discussed risks are specific to AI infrastructure and chipsets.

    11. Risk-centric vs Impact-centric approach

    • The group discusses the need to define categories of risks but not determine the intensity of the risk.

    • The discussion includes aligning the objects of a task with the components in another document and distinguishing between AI-specific applications and general applications.

    12. Scope of Risk Assessment

    • The participants discuss the need to adjust the scope of risk assessment and propose a threat-centric and vulnerability-centric approach. They also mention the impact on business and the need for guidance to readers.

    13. Objects of Attack

    • The participants discuss the identification of objects of attack and the creation of a mutually exclusive model. They mention the spreadsheet they have worked on and the need for a standard definition. They also discuss the flow of how users or systems use LLMs and the concerns related to consumers.

    14. Risk measurement and impact level

    • The group expressed concern about the impact level and proposed using a tuple to measure the risk and apply it to the contour.

    • The group discussed the idea of adding the persona and the finer-grained asset or component.

    • The group discussed the OWASP cyclone DX and the machine learning bill of material for capturing dependencies between assets and components.

    • The group proposed combining efforts with Sunil to filter threats based on the scope and suggested including the object of the task in the spreadsheet.

    15. Collaboration and next steps

    • The group decided to use a spreadsheet for collaboration and agreed to review it.

    16. Working spreadsheet and human-in-the-loop review

    • The participants discussed integrating AI exchange with the threat and leveraging OWASP's effort for a comprehensive approach.



    ------------------------------
    Josh Buker
    Research Analyst
    Cloud Security Alliance
    ------------------------------


  • 2.  RE: 2023-12-20 AI Tech & Risk Meeting Minutes

    Posted Dec 25, 2023 11:26:00 AM

    Thank you for posting these minutes.  For those of us in time zones outside the United States, this helpful. We may not be able to participate but we can follow along.

    I have posted on here multiple times that the time zones don't work for everyone.  I was told that there may be more meaningful options available.  I guess those options are not going to be available.  



    ------------------------------
    Sai Honig, CCSP, CISSP


    Wellington, New Zealand
    ------------------------------



  • 3.  RE: 2023-12-20 AI Tech & Risk Meeting Minutes

    Posted Jan 02, 2024 09:57:00 AM

    Hello Sai, 

    We can have the co-chairs get a head count to see how many people outside of these normal meeting hours are not able to participate and potentially consider spin off groups should we have enough need to hold secondary meetings. Alternatively we can discuss changing the meeting time to accommodate all hours. Unfortunately we aren't always able to meet these needs, but I will see what can be done to ensure you are able to make the meetings. 



    ------------------------------
    Sean Heide M.Sc., CCSK
    Vancouver
    ------------------------------



  • 4.  RE: 2023-12-20 AI Tech & Risk Meeting Minutes

    Posted Dec 29, 2023 05:26:00 AM

    A great start of the AI risks... Love to contribute as well. Thanks!



    ------------------------------
    Xin Ai
    Ally Financial Inc
    Ally Financial Inc
    ------------------------------



  • 5.  RE: 2023-12-20 AI Tech & Risk Meeting Minutes

    Posted Dec 29, 2023 01:11:00 PM

    Thank you for sharing the meeting minutes. It is very helpful for those of us who could not participate. Is there any chance the meeting was recorded and the video/audio can be shared too? 

    Thanks,

    Jackson



    ------------------------------
    Jackson Munuo
    VP
    CNA
    ------------------------------



  • 6.  RE: 2023-12-20 AI Tech & Risk Meeting Minutes

    Posted Jan 02, 2024 10:06:00 AM

    Hi all,

    Good news and bad news. The good news is that we do have a recording available here: https://drive.google.com/file/d/1SpN-2FknTg0j5rWVcOke5TeEiVkn6q96/view?usp=sharing (use the account you signed up for the working group with to view)

    The bad news is that we forgot to turn the recording on at the beginning, so it is missing the meeting's first 20 minutes or so. However, most of the conversation should still be captured.



    ------------------------------
    Josh Buker
    Research Analyst
    Cloud Security Alliance
    ------------------------------