The Talent Map - Final Recording
Center for Security and Emerging Technology
The Talent Map - Final Recording
58:56
The Talent Map: How CSET’s PATHWISE Can Guide AI and Cyber Workforce Policy
Center for Security and Emerging Technology
The Talent Map: How CSET’s PATHWISE Can Guide AI and Cyber Workforce Policy
1:02:58
China's AI Leap - China's AI Ambitions
Center for Security and Emerging Technology
China's AI Leap - China's AI Ambitions
58:12
China's AI Leap - Lightning Talk - China's AI Ecosystem
Center for Security and Emerging Technology
China's AI Leap - Lightning Talk - China's AI Ecosystem
12:36
China's AI Leap - Lightning Talk - PLA's AI Industrial Base
Center for Security and Emerging Technology
China's AI Leap - Lightning Talk - PLA's AI Industrial Base
12:56
China's AI Leap - PLA Modernization in the Age of AI
Center for Security and Emerging Technology
China's AI Leap - PLA Modernization in the Age of AI
44:30
China's AI Leap - Keynote Remarks and Q&A
Center for Security and Emerging Technology
China's AI Leap - Keynote Remarks and Q&A
30:57
Rewiring the Chip Landscape
Center for Security and Emerging Technology
Rewiring the Chip Landscape
1:03:47
How the United States Wins the Global Tech Competition
Center for Security and Emerging Technology
How the United States Wins the Global Tech Competition
2:10:54
What’s Next for AI Red-Teaming?
Center for Security and Emerging Technology
What’s Next for AI Red-Teaming?
1:04:25
How the U.S. Government Hires, Uses, and Pays for AI Tools and Talent
Center for Security and Emerging Technology
How the U.S. Government Hires, Uses, and Pays for AI Tools and Talent
59:13
What's Next in AI Governance
Center for Security and Emerging Technology
What's Next in AI Governance
58:01
A Year-End Review: Recapping Global AI Governance Efforts
Center for Security and Emerging Technology
A Year-End Review: Recapping Global AI Governance Efforts
1:07:21
AI Shapes Our Time: 12 Billion Hours Spent Daily | Webinar Highlight
Center for Security and Emerging Technology
AI Shapes Our Time: 12 Billion Hours Spent Daily | Webinar Highlight
1:11
Privacy, Security, and Innovation - Friends Not Foes
Center for Security and Emerging Technology
Privacy, Security, and Innovation - Friends Not Foes
1:08:56
General Purpose Technology Diffusion Theory | Webinar Highlight
Center for Security and Emerging Technology
General Purpose Technology Diffusion Theory | Webinar Highlight
0:56
Driving Defense Innovation with Autonomy | Webinar Highlight
Center for Security and Emerging Technology
Driving Defense Innovation with Autonomy | Webinar Highlight
1:04
Book Talk: Technology and the Rise of Great Powers
Center for Security and Emerging Technology
Book Talk: Technology and the Rise of Great Powers
56:55
Building the Tech Coalition
Center for Security and Emerging Technology
Building the Tech Coalition
2:47:10
Ensuring Resilience and Preparing for System Failures | Webinar Highlight
Center for Security and Emerging Technology
Ensuring Resilience and Preparing for System Failures | Webinar Highlight
0:43
Fortifying Critical Infrastructure in a Digital World
Center for Security and Emerging Technology
Fortifying Critical Infrastructure in a Digital World
1:04:22
AI Executive Order and Biosecurity | Webinar Highlight
Center for Security and Emerging Technology
AI Executive Order and Biosecurity | Webinar Highlight
0:49
Assessing the AIxBio Policy Landscape
Center for Security and Emerging Technology
Assessing the AIxBio Policy Landscape
1:00:06
Cybersecurity Threats and AI | Event Highlight
Center for Security and Emerging Technology
Cybersecurity Threats and AI | Event Highlight
1:11
AI, Cybersecurity, and Critical Infrastructure
Center for Security and Emerging Technology
AI, Cybersecurity, and Critical Infrastructure
1:00:59
Challenges of AI and its Effect on Information Reliability | Webinar Highlight
Center for Security and Emerging Technology
Challenges of AI and its Effect on Information Reliability | Webinar Highlight
1:05
AI, Elections, and Disinformation
Center for Security and Emerging Technology
AI, Elections, and Disinformation
56:07
Digital Africa: The Next Century
Center for Security and Emerging Technology
Digital Africa: The Next Century
1:00:39
Tech Firms in Ukraine - The Role of U.S. Companies and Implications for the Future
Center for Security and Emerging Technology
Tech Firms in Ukraine - The Role of U.S. Companies and Implications for the Future
54:29
AI Executive Order Report Card
Center for Security and Emerging Technology
AI Executive Order Report Card
59:07
Fireside Chat with Under Secretary of Commerce Alan Estevez
Center for Security and Emerging Technology
Fireside Chat with Under Secretary of Commerce Alan Estevez
1:26:44
DoD Replicator   Small, Smart, Cheap and Many
Center for Security and Emerging Technology
DoD Replicator Small, Smart, Cheap and Many
59:08
Running Faster: Boosting U S  AI Innovation and Competitiveness
Center for Security and Emerging Technology
Running Faster: Boosting U S AI Innovation and Competitiveness
54:41
Uplifting Cyber Defense
Center for Security and Emerging Technology
Uplifting Cyber Defense
1:02:42
How Important is Compute to the Future of AI
Center for Security and Emerging Technology
How Important is Compute to the Future of AI
54:29
One Size Does Not Fit All
Center for Security and Emerging Technology
One Size Does Not Fit All
1:01:28
Betting the House
Center for Security and Emerging Technology
Betting the House
58:55
Turn Off the Tap?
Center for Security and Emerging Technology
Turn Off the Tap?
1:04:02
The Multinational Artificial Intelligence Landscape
Center for Security and Emerging Technology
The Multinational Artificial Intelligence Landscape
1:04:37
Introducing the Emerging Technology Observatory
Center for Security and Emerging Technology
Introducing the Emerging Technology Observatory
1:00:19
Large Language Models and the Future of Disinformation
Center for Security and Emerging Technology
Large Language Models and the Future of Disinformation
58:58
China's AI Workforce
Center for Security and Emerging Technology
China's AI Workforce
51:30
Decoupling in Strategic Tech Sectors
Center for Security and Emerging Technology
Decoupling in Strategic Tech Sectors
1:03:12
The Biotechnology Landscape
Center for Security and Emerging Technology
The Biotechnology Landscape
53:38
CSET Research Fellow Hiring Info Session
Center for Security and Emerging Technology
CSET Research Fellow Hiring Info Session
55:54
Creating an Innovation Workforce for Uncertain Times
Center for Security and Emerging Technology
Creating an Innovation Workforce for Uncertain Times
55:15
Connecting the Quad
Center for Security and Emerging Technology
Connecting the Quad
1:09:22
A New Export Control Regime for the 21st Century
Center for Security and Emerging Technology
A New Export Control Regime for the 21st Century
1:12:32
Securing Tomorrow's AI Workforce
Center for Security and Emerging Technology
Securing Tomorrow's AI Workforce
1:09:13
Bringing the Chipmakers Home
Center for Security and Emerging Technology
Bringing the Chipmakers Home
1:02:17
More than Deepfakes
Center for Security and Emerging Technology
More than Deepfakes
1:15:24
CSET Hiring Info Session
Center for Security and Emerging Technology
CSET Hiring Info Session
58:23
Strengthening the Technical Foundations of U.S. Security
Center for Security and Emerging Technology
Strengthening the Technical Foundations of U.S. Security
57:48
Deconstructing China’s Vision for the Future of Warfare
Center for Security and Emerging Technology
Deconstructing China’s Vision for the Future of Warfare
1:11:36
Forecasting the Future of the DOD-Silicon Valley Relationship
Center for Security and Emerging Technology
Forecasting the Future of the DOD-Silicon Valley Relationship
57:14
Collaborative S&T Development: Creating a NATO Decision Advantage in AI
Center for Security and Emerging Technology
Collaborative S&T Development: Creating a NATO Decision Advantage in AI
58:06
How to Use the Map of Science User Interface
Center for Security and Emerging Technology
How to Use the Map of Science User Interface
6:12
Map of Science - This Is How We Built It
Center for Security and Emerging Technology
Map of Science - This Is How We Built It
15:33
New Research Clusters
Center for Security and Emerging Technology
New Research Clusters
17:46
How to Use the Map of Science User Interface   Full Explanation
Center for Security and Emerging Technology
How to Use the Map of Science User Interface Full Explanation
29:31
Can AI Write Disinformation?
Center for Security and Emerging Technology
Can AI Write Disinformation?
1:13:05
China's Long-Term Investments in AI Growth
Center for Security and Emerging Technology
China's Long-Term Investments in AI Growth
1:01:55
AI Research Planning
Center for Security and Emerging Technology
AI Research Planning
18:57
Where Does India Stand in the Global AI Race?
Center for Security and Emerging Technology
Where Does India Stand in the Global AI Race?
59:07
AI, Autonomous Systems and Espionage
Center for Security and Emerging Technology
AI, Autonomous Systems and Espionage
1:09:30
Blueprints for Action on AI
Center for Security and Emerging Technology
Blueprints for Action on AI
1:17:46
Legal, Illegal and Extralegal: China's Pursuit of Its Tech Future
Center for Security and Emerging Technology
Legal, Illegal and Extralegal: China's Pursuit of Its Tech Future
58:50
Modeling a Secure Future
Center for Security and Emerging Technology
Modeling a Secure Future
59:43
The Way Forward: Tech Policy Recommendations for the Biden Administration
Center for Security and Emerging Technology
The Way Forward: Tech Policy Recommendations for the Biden Administration
1:02:34
Forecasting U.S.-China [De]Coupling in the Semiconductor Industry
Center for Security and Emerging Technology
Forecasting U.S.-China [De]Coupling in the Semiconductor Industry
56:29
CSET's Data Science Efforts and Open Source Analysis on China's Emerging Technologies
Center for Security and Emerging Technology
CSET's Data Science Efforts and Open Source Analysis on China's Emerging Technologies
30:21
Global Parlamentary Network 2020 12 02
Center for Security and Emerging Technology
Global Parlamentary Network 2020 12 02
12:53
Following the Money
Center for Security and Emerging Technology
Following the Money
1:12:40
Data Petting Zoo: Defining AI
Center for Security and Emerging Technology
Data Petting Zoo: Defining AI
43:28
Understanding U.S.  Military Investments in AI
Center for Security and Emerging Technology
Understanding U.S. Military Investments in AI
1:20:17
Using Crowd Forecasts to Inform Policy, with Jason Matheny
Center for Security and Emerging Technology
Using Crowd Forecasts to Inform Policy, with Jason Matheny
59:17
CSET   Building Trust Through Testing   Final Recording
Center for Security and Emerging Technology
CSET Building Trust Through Testing Final Recording
1:16:17
Power on the Precipice Book Talk
Center for Security and Emerging Technology
Power on the Precipice Book Talk
57:03
U.S. Tech Leadership in an Era of Competition
Center for Security and Emerging Technology
U.S. Tech Leadership in an Era of Competition
34:06
Identifying the Development and Application of AI in Scientific Text
Center for Security and Emerging Technology
Identifying the Development and Application of AI in Scientific Text
1:53
Estimation of Research Communities in the Multilingual Academic Data
Center for Security and Emerging Technology
Estimation of Research Communities in the Multilingual Academic Data
1:52