{"id":1344,"date":"2025-02-05T21:06:50","date_gmt":"2025-02-05T20:06:50","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?p=1344"},"modified":"2025-02-26T21:07:10","modified_gmt":"2025-02-26T20:07:10","slug":"paris-ai-action-summit-whats-next-for-ai-governance","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2025\/02\/05\/paris-ai-action-summit-whats-next-for-ai-governance\/","title":{"rendered":"Paris\u00a0AI\u00a0Action Summit: What\u2019s Next for\u00a0AI\u00a0Governance?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"510\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2025\/02\/linkedin_whats_next_for_ai_gov-1-1024x510.jpeg\" alt=\"\" class=\"wp-image-1345\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2025\/02\/linkedin_whats_next_for_ai_gov-1-1024x510.jpeg 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2025\/02\/linkedin_whats_next_for_ai_gov-1-300x149.jpeg 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2025\/02\/linkedin_whats_next_for_ai_gov-1-768x382.jpeg 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2025\/02\/linkedin_whats_next_for_ai_gov-1-1536x765.jpeg 1536w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2025\/02\/linkedin_whats_next_for_ai_gov-1.jpeg 1780w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\ud83d\udcc6 WHEN:\u00a0<strong>Wednesday 5th of\u00a0February<\/strong>\u00a0at\u00a0<strong>19:15.<\/strong><\/p>\n\n\n\n<p>Paris\u00a0AI\u00a0Action Summit: What\u2019s Next for\u00a0AI\u00a0Governance? As\u00a0AI\u00a0becomes more advanced, what governance mechanisms are most relevant to best steer it?<\/p>\n\n\n\n<p>We were happy to co-organize this Road to the\u00a0AI\u00a0Action Summit event with the <a href=\"https:\/\/gpai-policy-lab.org\/\">GPAI Policy Lab<\/a> and the <a href=\"https:\/\/www.linkedin.com\/company\/securite-ia\/\" target=\"_blank\" rel=\"noreferrer noopener\">Centre pour la S\u00e9curit\u00e9 de l&#8217;IA &#8211; CeSIA<\/a>.<\/p>\n\n\n\n<p>We explored:  <\/p>\n\n\n\n<p>The role of\u00a0AI\u00a0Evaluation and third-party evaluators with a Keynote Speech of <a href=\"https:\/\/www.linkedin.com\/in\/rumman\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dr. Rumman Chowdhury<\/a>, US Science envoy,\u00a0artificial\u00a0intelligence, CEO at Human\u00a0Intelligence <\/p>\n\n\n\n<p>The future of voluntary commitments in shaping\u00a0AI&#8217;s path with our distinguished guests :<br><a href=\"https:\/\/www.linkedin.com\/in\/ACoAAACjWqEBXzgiSGw027-g6biywC_piSt83dY\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.linkedin.com\/in\/rumman\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dr. Rumman Chowdhury<\/a>, US Science envoy,\u00a0artificial\u00a0intelligence, CEO at Human\u00a0Intelligence<br><a href=\"https:\/\/www.linkedin.com\/in\/ACoAAABC5LQB2h8P4G8XPfK8ri9hdQhaTfz3D8Y\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.linkedin.com\/in\/axeldauchez\/\" target=\"_blank\" rel=\"noreferrer noopener\">Axel Dauchez<\/a>, Founder of <a href=\"http:\/\/make.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Make.org<\/a> and <a href=\"http:\/\/make.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Make.org<\/a> foundation<br><a href=\"https:\/\/www.linkedin.com\/in\/ACoAAAMkb24BzU2W13zelUFlcSjeiCQLH6RgByk\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.linkedin.com\/in\/agnes-delaborde-b527a415\/\" target=\"_blank\" rel=\"noreferrer noopener\">Agnes Delaborde<\/a>, Head of\u00a0AI\u00a0and Cybersecurity at LNE<br><a href=\"https:\/\/www.linkedin.com\/in\/ACoAABXmN5QB2hOmmwEa5zC25wtRuWTNozNfkUE\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a>Milo Rignell, Head of Operations at Light on<br><a href=\"https:\/\/www.linkedin.com\/in\/ACoAAA6u4EUBtnXAitZboZaZbDqHik4blArYK5U\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.linkedin.com\/in\/caroline-jeanmaire-a315ba6a\/\" target=\"_blank\" rel=\"noreferrer noopener\">Caroline Jeanmaire<\/a>, Senior Associate,\u00a0AI\u00a0Governance The Future society<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udcc6 WHEN:\u00a0Wednesday 5th of\u00a0February\u00a0at\u00a019:15. Paris\u00a0AI\u00a0Action Summit: What\u2019s Next for\u00a0AI\u00a0Governance? As\u00a0AI\u00a0becomes more advanced, what governance mechanisms are most relevant to best steer it? We were happy to co-organize this Road to the\u00a0AI\u00a0Action Summit event with the GPAI Policy Lab and the Centre pour la S\u00e9curit\u00e9 de l&#8217;IA &#8211; CeSIA. We explored: The role of\u00a0AI\u00a0Evaluation and third-party [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":1345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1344"}],"version-history":[{"count":1,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1344\/revisions"}],"predecessor-version":[{"id":1346,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1344\/revisions\/1346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/1345"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=1344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=1344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}