{"id":1213,"date":"2024-01-28T01:15:32","date_gmt":"2024-01-28T00:15:32","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?p=1213"},"modified":"2024-02-05T01:16:15","modified_gmt":"2024-02-05T00:16:15","slug":"30-01-01-02-2024-the-age-of-military-ai-navigating-security-and-policy-implications","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2024\/01\/28\/30-01-01-02-2024-the-age-of-military-ai-navigating-security-and-policy-implications\/","title":{"rendered":"30\/01-01\/02\/2024: The Age of Military AI: Navigating Security and Policy Implications"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/WhatsApp-Image-2024-01-30-at-14.37.09-1024x606.jpeg\" alt=\"\" class=\"wp-image-1214\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/WhatsApp-Image-2024-01-30-at-14.37.09-1024x606.jpeg 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/WhatsApp-Image-2024-01-30-at-14.37.09-300x178.jpeg 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/WhatsApp-Image-2024-01-30-at-14.37.09-768x454.jpeg 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/WhatsApp-Image-2024-01-30-at-14.37.09.jpeg 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\ud83d\udcc6 <strong>WHEN<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security panel: Tuesday 30 January &#8211; 7:30 pm to 9 pm CET<\/li>\n\n\n\n<li>Policy panel: Thursday 1 February &#8211; 7:30 pm to 9 pm CET<\/li>\n<\/ul>\n\n\n\n<p>Participation to both is encouraged, as Tuesday&#8217;s security experts will lay the ground for Thursday&#8217;s policy discussions<\/p>\n\n\n\n<p><br>\ud83d\udccd <strong>WHERE<\/strong>: Zoom\u2028<\/p>\n\n\n\n<p>\ud83d\udde3 <strong>LANGUAGE<\/strong>: English<\/p>\n\n\n\n<p>Artificial Intelligence is transforming war. The growing role of AI in the military domain promises to radically change conflict dynamics, redefine international security paradigms, and require sustained policy attention.<\/p>\n\n\n\n<p>What will the future warfare environment look like?<br>How are modern militaries gearing up for next generation\u2019s algorithmic warfare?<br>Which governance instruments are best suited to address emerging risks and challenges?<\/p>\n\n\n\n<p>\ud83c\udf99\ufe0f <strong>Meet Our Expert Speakers<\/strong>:<\/p>\n\n\n\n<p>Security panel:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dr. <strong>Jean-Marc Rickli<\/strong>, Head of Global and Emerging Risks at the Geneva Centre for Security Policy (GCSP)<\/li>\n\n\n\n<li><strong>Sarah Grand-Cl\u00e9ment<\/strong>, Researcher at United Nations Institute for Disarmament Research (UNIDIR)<\/li>\n\n\n\n<li><strong>James Black<\/strong>, Assistant Director for Defence and Security at RAND Europe<br><\/li>\n<\/ul>\n\n\n\n<p>Policy panel:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Dr. Mariarosaria Taddeo<\/strong>, Associate Professor and Senior Research Fellow at the Oxford Internet Institute &amp; Fellow at the Alan Turing Institute<\/li>\n\n\n\n<li><strong>Anna Hehir<\/strong>, Program Manager for Autonomous Weapons Systems at the Future of Life Institute<br><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>30\/01-01\/02\/2024: The Age of Military AI: Navigating Security and Policy Implications<\/p>\n","protected":false},"author":7,"featured_media":1214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1213"}],"version-history":[{"count":1,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1213\/revisions"}],"predecessor-version":[{"id":1215,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1213\/revisions\/1215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/1214"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=1213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=1213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}