Governing the Future: Federal Cybersecurity in the Age of Edge and AI
Intel's CTO on Navigating Cybersecurity, AI, and the Edge
Governing the Future: Federal Cybersecurity in the Age of Edge and AI
In this episode of the "Trusted Tech for Critical Missions" podcast, host Ben Arent interviews Steve Orrin, Chief Technology Officer at Intel Federal, about the evolving landscape of federal cybersecurity in the age of edge computing and artificial intelligence.
Key Takeaways
- Establishing a hardware-based Root of Trust is crucial for securing edge devices that may be physically accessible outside traditional network perimeters.
- Protecting AI models requires governance throughout the entire lifecycle, from ensuring diverse training data to continuously monitoring models post-deployment.
- Confidential computing, which uses hardware isolation and memory encryption, enables secure data sharing and analytics.
- Engaging security, legal, and compliance stakeholders early is essential when developing and deploying AI solutions in the public sector.
- Organizations should maintain an accurate inventory of all assets (including data) and leverage built-in platform security features.
Topics Covered Challenges of securing edge devices outside traditional network perimeters Importance of hardware-based Root of Trust for edge devices Protecting AI/ML models throughout their lifecycle Enabling privacy-preserving federated learning Transitioning from edge sensing to edge computing for real-time decision making Applying Zero Trust principles and confidential computing to protect data in use Engaging stakeholders early when developing AI solutions Tips for maintaining asset inventory and leveraging platform security features
Resources
Intel Federal Public Sector Solutions
About the Guest
Steve Orrin is the Chief Technology Officer and Senior Principal Engineer at Intel Federal. He leads technology strategy, architecture, and customer engagements for government and regulated industries. With over 20 years of experience in cybersecurity, AI, edge computing, and supply chain security, Steve brings deep expertise to help organizations navigate the evolving threat landscape.