meta_pixel
Tapesearch Logo
CyberWire Daily

Navigating AI Safety and Security Challenges with Yonatan Zunger [The BlueHat Podcast]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.6 • 1K Ratings

🗓️ 30 December 2024

⏱️ 52 minutes

🧾️ Download transcript

Summary

While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025! Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses.      In This Episode You Will Learn:       How predictive AI anticipates outcomes based on historical data  The difficulties and strategies involved in making AI systems safe and secure from misuse  How role-playing exercises help developers understand the behavior of AI systems    Some Questions We Ask:        What distinguishes predictive AI from generative AI?  Can generative AI be used to improve decision-making processes?  What is the role of unit testing and test cases in policy and AI system development?    Resources:   View Yonatan Zunger on LinkedIn      View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn    Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts   Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

Since 2005, Blue Hat has been where the security research community and Microsoft come together as peers.

0:07.5

To debate and discuss, share and challenge, celebrate and learn.

0:11.5

On the Blue Hat podcast, join me, Nick Fillingham.

0:14.0

And me, Wendy Zanoni, for conversations with researchers, responders and industry leaders,

0:19.4

both inside and outside of Microsoft.

0:21.4

Working to secure the planet's technology and create a safer world for all.

0:25.1

And now, on with the Blue Hat Podcast.

0:30.1

Welcome to the Blue Hat podcast.

0:32.7

Today we have Yonatan Zunger, and we are thrilled to have you here.

0:37.4

Yonatan, would you introduce yourself? Tell us who you are. What do you do?

0:40.3

Well, hi, thank you so much for having me on the show.

0:43.3

So my name is Yonan Sanger. I'm currently CVP of go wrong involving AI and figure out how we're going to try to prevent them from happening.

0:58.0

I think that's sort of the short version of it.

1:00.0

You know, I came to this from a career originally as a theoretical physicist, went over, moved over into CS sort of full-time back in the early zeros where I started out building heavy infra.

1:15.4

I built a lot of the core part of search at Google, a lot of planet scale storage, things like that.

1:16.4

And then in 2011, I became CTO of Social.

1:19.9

This was just at the time that Google Plus was about to launch.

1:22.7

This was also the time the GDPR was being drafted.

1:25.8

And within three weeks of taking that job, it suddenly became very clear that the hard part

1:30.1

of this job wasn't going to be software infrastructure.

1:32.7

It was going to be people's safety.

1:34.6

It was security, privacy, abuse, harassment, policy, all of these things.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.