BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//LHB9BW
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-UXXZMU@program.why2025.org
DTSTART;TZID=CET:20250810T120000
DTEND;TZID=CET:20250810T125000
DESCRIPTION:AI is everywhere and where it isn't today\, it most likely will
  be tomorrow. But jumping on the hype train and adding AI often does not s
 ufficiently consider security. This talk walks you through cases of AI fai
 lures\, how they've come about\, and how they could have been avoided. We'
 re also going over some projections of spectacular AI failures we're likel
 y to see going forward.
DTSTAMP:20250731T184804Z
LOCATION:Andromeda
SUMMARY:Securing AI requires life cycle thinking and reducing unintended co
 nsequences - Satu Korhonen
URL:https://program.why2025.org/why2025/talk/UXXZMU/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-UUJFDQ@program.why2025.org
DTSTART;TZID=CET:20250811T140000
DTEND;TZID=CET:20250811T160000
DESCRIPTION:AI is ubiquitous. Where it isn't now\, it will probably be soon
 \, in software and operating systems. More often the usage guidelines are 
 also unilaterally changed to companies utilising our data to train their m
 odels. While I've previously focused on building safer AI\, now I also tea
 ch people how to hack them and build playgrounds for people to experiment.
  In this workshop I bring my hackable AI apps for people to play around wi
 th and hack so we may all learn new and necessary skills. Come play!
DTSTAMP:20250731T184804Z
LOCATION:Workshop Euclid
SUMMARY:Let's break some AI - Satu Korhonen
URL:https://program.why2025.org/why2025/talk/UUJFDQ/
END:VEVENT
END:VCALENDAR
