Visible on website? | Status | Session Type | Session Name | Time | Presenters | Track | Room | Session Description | Special Requirements? | Privacy Preferences | Timeslot (Hidden) | GMT+3 Timeslot | Notes |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
All details locked | Other | Registration & Breakfast | 9:00am - 10:00am | General | Ballroom Foyer | August 7, 2025 9:00 AM (GMT+3) → August 7, 2025 10:00 AM (GMT+3) | |||||||
Session confirmed | Other | Opening Plenary | 10:00am - 12:00pm | General | Grand Ballroom 4-6 | August 7, 2025 10:00 AM (GMT+3) → August 7, 2025 12:00 PM (GMT+3) | |||||||
Session confirmed | 5-min Lightning Talk | Opening Remarks | 10:00am - 10:15am | General | Grand Ballroom 4-6 | August 7, 2025 10:00 AM (GMT+3) → August 7, 2025 10:15 AM (GMT+3) | |||||||
Speaker Confirmed | 20-min Keynote | Keynote 1 - title TBC | 10:15am - 10:35am | General | Grand Ballroom 4-6 | August 7, 2025 10:15 AM (GMT+3) → August 7, 2025 10:35 AM (GMT+3) | |||||||
Session confirmed | 20-min Keynote | The Path to ASL-3 at Anthropic | 10:40am - 11:00am | General | Grand Ballroom 4-6 | A retroactive look at the Anthropic ASL-3 attainment and challenges. | Don't shareDon't recordChatham House Rules | August 7, 2025 10:40 AM (GMT+3) → August 7, 2025 11:00 AM (GMT+3) | |||||
Session confirmed | 20-min Keynote | How to Securely Deploy Agents that Make Sensitive Decisions in Untrusted Environments | 11:05am - 11:25am | General | Grand Ballroom 4-6 | To fully harness the potential of AI automation and maximize innovation in novel AI application areas, we need AI colleagues and personal assistants capable of making sensitive decisions in untrusted environments that may contain adversarial data. In my talk I’ll argue that while there is no universal, risk-free technical solution to this challenge, achieving agent security is not fundamentally different from previous technical security challenges, which similarly lacked risk-free solutions and required a multi-disciplinary and evolving set of strategies to achieve an acceptable—if not perfect—balance between security and utility. To flesh this out, I’ll draw parallels to how the security community has historically managed issues such as malware, software security, and ransomware protection. For years, the industry sought universal solutions for such problems, but success came from a continuous, multi-disciplinary, dialectical, "all of the above" approach that reduced risk to an acceptable, though not perfect, steady state. | August 7, 2025 11:05 AM (GMT+3) → August 7, 2025 11:25 AM (GMT+3) | ||||||
Session confirmed | 20-min Keynote | Patching Critical Infrastructure: Lessons from DARPA’s AI Cyber Challenge | 11:30am - 10:50am | General | Grand Ballroom 4-6 | DARPA and ARPA-H are on a mission to advance AI-driven cybersecurity and usher in a future where we can patch vulnerabilities before they can be exploited. AI Cyber Challenge Program Manager Andrew Carney will deliver the latest news about the competition and discuss how the program is driving the innovation of responsible AI systems designed to address some of our most important digital issues today: the security of critical infrastructure and software supply chains. | None | Don't shareDon't record | August 7, 2025 11:30 AM (GMT+3) → August 7, 2025 11:50 AM (GMT+3) | ||||
All details locked | Break/Meal | Lunch | 12:00pm - 1:30pm | General | Grand Ballroom 1-3 | August 7, 2025 12:00 PM (GMT+3) → August 7, 2025 1:30 PM (GMT+3) | |||||||
Session confirmed | 60-min Workshop | Workshop: Open Problems in AI Verification and Technical Transparency | 1:30pm - 2:30pm | Hardware Enabled Governance | Harper A-B | Verifying a compute cluster's workloads and results could advance multiple goals, including: preventing model exfiltration, detecting rogue deployments, and verifying international agreements on AI. This session will give a technical overview of the state of the field and open challenges, based on recent research (https://www.arxiv.org/abs/2507.15916), followed by Q&A and brainstorming concrete options for getting involved. | Set up for Workshop | Checking with employer | August 7, 2025 1:30 PM (GMT+3) → August 7, 2025 2:30 PM (GMT+3) | It'd be helpful to hear a little about forum attendees' backgrounds/expertise | |||
Session confirmed | 60-min Workshop | Workshop: UK AISI | 1:30pm - 2:30pm | Harper C-D | August 7, 2025 1:30 PM (GMT+3) → August 7, 2025 2:30 PM (GMT+3) | ||||||||
Session confirmed | 25-min Fireside Chat | Threat Modeling in the Age of Autonomous Systems: Rethinking Risk When the System Evolves (Fireside Chat) | 1:30pm - 2:00pm | AI for defensive security | Grand Ballroom 4-6 | From prompt exploits to agentic behaviour, how defenders must reshape assumptions, frameworks, and collaboration to meet AI-native threats head-on. | Set up for 2 people | None | August 7, 2025 1:30 PM (GMT+3) → August 7, 2025 2:00 PM (GMT+3) | Wants session at 1:30pm. Fireside Convo with Rob Duhart, we will each ask questions of each other. | |||
Session confirmed | 25-min Talk | AI’s Acceleration Of Cyber & Electronic Warfare | 1:30pm - 2:00pm | Offensive Security / Evals | Madison A-C | A primer on targeting model registries and MLOps in cyber/EW warfare, the growing importance of AI in findings and weaponizing vulnerabilities, and the use of AI in offensive cyber operations. | None | None | August 7, 2025 1:30 PM (GMT+3) → August 7, 2025 2:00 PM (GMT+3) | Wants session 11-3pm | |||
Session confirmed | 25-min Talk | Offensive AI: Welcome to the Party | 2:00pm - 2:30pm | Offensive Security / Evals | Grand Ballroom 4-6 | Initially called out in the Biden Executive Order, the capabilities of models to execute offensive security tasks has been hotly debated. It is now 2025, and several examples of models not just performing these tasks, but excelling at them have been shown. This talk will discuss our findings across reversing, multi-step network attacks, bug bounty, threat intel, and more. This technology is multi-use at its core, and offers uplift to all sides. | None | None | August 7, 2025 2:00 PM (GMT+3) → August 7, 2025 2:30 PM (GMT+3) | Schedule before a break | |||
Session confirmed | 25-min Talk | Securing AI Infrastructure against Hardware Supply Chain Attacks | 2:00pm - 2:30pm | Securing AI Infrastructure | Madison A-C | Can supply chains be trusted? This talk highlights how integrity can quietly fail from design to decommission, and why that matters for AI security, compliance, and export controls. Learn what you can implement today and what you can work on to advance the state of the art. | None | None | August 7, 2025 2:00 PM (GMT+3) → August 7, 2025 2:30 PM (GMT+3) | "Let me know if you have a preference that I talk about "physical attacks" instead of "supply chain attacks". I beliefe supply chain attacks is more urgent and more tractable right now, therefore I slightly lean to focus on that topic instead.” | |||
All details locked | Break/Meal | Break | 2:30pm - 3:00pm | General | Ballroom Foyer | August 7, 2025 2:30 PM (GMT+3) → August 7, 2025 3:00 PM (GMT+3) | |||||||
Speaker Confirmed | 60-min Workshop | Workshop: Dreadnode | 3:00pm - 4:00pm | Offensive Security / Evals | Harper A-B | Set up for Workshop | August 7, 2025 3:00 PM (GMT+3) → August 7, 2025 4:00 PM (GMT+3) | ||||||
Session confirmed | 60-min Workshop | TTX: Security & AI | 3:00pm - 4:00pm | Securing AI Infrastructure | Harper C-D | The impact of superhuman AI over the next decade may be enormous, exceeding that of the Industrial Revolution. In this Tabletop exercise, we will explore how Security measures may be critical for AI progress. We'll simulate decisions and developments for labs, governments and state actors and get a glimpse of how impactful they might be. | Set up for Workshop | Don't recordDon't share | August 7, 2025 3:00 PM (GMT+3) → August 7, 2025 4:00 PM (GMT+3) | ||||
Interested / Session TBC | 60-min Panel | Panel: Founders and Funders | 3:00pm - 4:00pm | General | Kennedy A-C | August 7, 2025 3:00 PM (GMT+3) → August 7, 2025 4:00 PM (GMT+3) | |||||||
Session confirmed | 25-min Talk | Using Zero-Knowledge Proofs for Weight Protection | 3:00pm - 3:30pm | AI for defensive security | Grand Ballroom 4-6 | Recent breakthroughs in zero-knowledge proof systems pave the way for a new security paradigm, where the computation is cryptographically verified. AI workloads possess certain properties that make them ideal candidates for this new technology. This talk shortly unpacks why AI is such a good candidate for verifiable compute and what the possible applications for it are in AI security, including preventing sabotage and theft of model weights. | None | Don't share | August 7, 2025 3:00 PM (GMT+3) → August 7, 2025 3:30 PM (GMT+3) | “I marked not to share the recording online, I might allow it after the talk depending on how it goes :)” | |||
Session confirmed | 25-min Talk | UK AISI Talk - Title TBC | 3:00pm - 3:30pm | Madison A-C | August 7, 2025 3:00 PM (GMT+3) → August 7, 2025 3:30 PM (GMT+3) | ||||||||
Session confirmed | 25-min Talk | Securing History's Greatest Infrastructure Buildout | 3:30pm - 4:00pm | Securing AI Infrastructure | Grand Ballroom 4-6 | None | Don't record | August 7, 2025 3:30 PM (GMT+3) → August 7, 2025 4:00 PM (GMT+3) | |||||
Interested / Session TBC | 25-min Talk | Jason Gross TBD | Madison A-C | August 7, 2025 3:30 PM (GMT+3) → August 7, 2025 4:00 PM (GMT+3) | |||||||||
All details locked | Break/Meal | Break | 4:00pm - 4:30pm | General | Ballroom Foyer | August 7, 2025 4:00 PM (GMT+3) → August 7, 2025 4:30 PM (GMT+3) | |||||||
Speaker Confirmed | 60-min Workshop | Workshop: Nora Amman | 4:30pm - 5:30pm | Hardware Enabled Governance | Harper A-B | Set up for Workshop | August 7, 2025 4:30 PM (GMT+3) → August 7, 2025 5:30 PM (GMT+3) | ||||||
Session confirmed | 60-min Workshop | Workshop: Deep Dive on Threats from Using AI Agents for AI R&D | 4:30pm - 5:30pm | AI for defensive security | Harper C-D | Using AI agents for AI R&D poses a number of unique threats compared to other applications. Most importantly, these AIs have access to many affordances that developers are very wary about granting to unvetted human employees: access to algorithmic secrets, sensitive model weights, and massive quantities of compute. In this session, we'll discuss the dynamics here, including a detailed discussion of which threat models seem particularly hard to mitigate using traditional computer security techniques. | None | None | August 7, 2025 4:30 PM (GMT+3) → August 7, 2025 5:30 PM (GMT+3) | ||||
Interested / Session TBC | 25-min Talk | Dan L - title TBD | 4:30pm - 5:30pm | Offensive Security / Evals | Madison A-C | August 7, 2025 4:30 PM (GMT+3) → August 7, 2025 5:00 PM (GMT+3) | |||||||
Session confirmed | 25-min Talk | Mitigating Insider Threat from AI: A Novel Computer Security Challenge | 4:30pm - 5:00pm | AI for defensive security | Grand Ballroom 4-6 | AI developers will need to handle the possibility that their AI agents are conspiring against them. This problem has some fundamental structural differences from the most important security problems today, and will require creative and novel solutions. In this talk I'll explain how I think this problem compares to other security settings, and describe our prospects for solving it. | None | None | August 7, 2025 4:30 PM (GMT+3) → August 7, 2025 5:00 PM (GMT+3) | ||||
Session confirmed | 25-min Talk | Frontier Models for Cybersecurity | 5:00pm - 5:30pm | AI for defensive security | Grand Ballroom 4-6 | In this talk we will give an overview of the latest developments in AI for cybersecurity. Over the past decade, there has been a transformation in the world of cybersecurity due to scale of data. In this coming decade, cybersecurity will be transformed through adoption of AI. In this talk we will discuss some of the challenges the industry is facing in adopting AI and argue for open innovation in AI for cybersecurity. | None | None | August 7, 2025 5:00 PM (GMT+3) → August 7, 2025 5:30 PM (GMT+3) | ||||
Interested / Session TBC | 25-min Talk | Brendan XBOW | 5:00pm - 5:30pm | Offensive Security / Evals | Madison A-C | August 7, 2025 5:00 PM (GMT+3) → August 7, 2025 5:30 PM (GMT+3) | |||||||
Speaker Confirmed | Break/Meal | Break | 5:30pm - 6:00pm | General | Ballroom Foyer | August 7, 2025 5:30 PM (GMT+3) → August 7, 2025 6:00 PM (GMT+3) | |||||||
Speaker Confirmed | 25-min Fireside Chat | Fireside Chat: RAND Report on Securing Model Weights | 6:00pm - 6:30pm | Securing AI Infrastructure | Grand Ballroom 4-6 | Set up for 3 people | August 7, 2025 6:00 PM (GMT+3) → August 7, 2025 6:30 PM (GMT+3) | Schedule before a break | |||||
Session confirmed | 25-min Talk | Why AI is a critically important tool for AGI security | 6:00pm - 6:30pm | AI for defensive security | Madison A-C | AI could be a critically important tool for securing AGI model weights and algorithmic secrets, yet very few projects are using AI to tackle the most important AGI security challenges. This talk will argue that building defensive AI is one of the most valuable approaches to AGI security. It will explore neglected approaches, like differential AI development, and discuss how to build for a world with abundant intelligence. | None | None | August 7, 2025 6:00 PM (GMT+3) → August 7, 2025 6:30 PM (GMT+3) | ||||
Interested / Session TBC | 25-min Talk | Gabriel TBD | 6:00pm - 6:30pm | Kennedy A-C | August 7, 2025 6:00 PM (GMT+3) → August 7, 2025 6:30 PM (GMT+3) | ||||||||
Session confirmed | Other | Closing Plenary | 6:30pm - 7:15pm | General | Grand Ballroom 4-6 | August 7, 2025 6:30 PM (GMT+3) → August 7, 2025 7:15 PM (GMT+3) | |||||||
All details locked | Break/Meal | Buffet Dinner, Drinks, and Networking | 7:15pm - 10:00pm | General | Grand Ballroom 1-3 | August 7, 2025 7:15 PM (GMT+3) → August 7, 2025 8:45 PM (GMT+3) | |||||||
Ideas | AIxCC | ||||||||||||
Ideas | Tim Fist | ||||||||||||
Interested / Session TBC | Noa Weiss | ||||||||||||
Ideas | Illia Shumailov? | ||||||||||||
Ballroom Foyer |