1、Workshop ReportOctober 2024Patricia EkeDaniel M.GersteinAlex LeblangMonty McGeeGreg RattrayLuke RichardsAlana ScottSecuring Critical Infrastructure inthe Age of AIAuthorsKyle Crichton*Jessica Ji*Kyle Miller*John Bansemer*Zachary ArnoldDavid BatzMinwoo ChoiMarisa Decillis*Workshop Organizers Center f
2、or Security and Emerging Technology|1 This workshop and the production of the final report was made possible by a generous contribution from the Microsoft Corporation.The views in this document are strictly the authors and do not necessarily represent the views of the U.S.government,the Microsoft Co
3、rporation,or of any institution,organization,or entity with which the authors may be affiliated.Reference to any specific commercial product,process,or service by trade name,trademark,manufacturer,or otherwise,does not constitute or imply an endorsement,recommendation,or favoring by the U.S.governme
4、nt,including the U.S.Department of the Treasury,the U.S.Department of Homeland Security,and the Cybersecurity and Infrastructure Security Agency,or any other institution,organization,or entity with which the authors may be affiliated.Center for Security and Emerging Technology|2 Executive Summary As
5、 artificial intelligence capabilities continue to improve,critical infrastructure(CI)operators and providers seek to integrate new AI systems across their enterprises;however,these capabilities come with attendant risks and benefits.AI adoption may lead to more capable systems,improvements in busine
6、ss operations,and better tools to detect and respond to cyber threats.At the same time,AI systems will also introduce new cyber threats that CI providers must contend with.Last years AI executive order directed the various Sector Risk Management Agencies(SRMAs)to“evaluate and provide an assessment o