Working Group
AI Safety
“This coalition, and the guidelines emerging from it, will set standards that help ensure AI systems are built to be secure.” - Matt Knight, Head of Security at OpenAI
View Current ProjectsSecure Agentic System Design: A Trait-Based Approach
- Director Jen Easterly of the Cybersecurity and Infrastructure Security Agency
About the AI Safety Initiative
Cloud Security Alliance is embarking upon a new mission to build a portfolio of best practices for the most consequential technology ever introduced. The CSA AI Safety Initiative builds upon our 15 years of earned credibility as the leader of the trusted cloud ecosystem and leverages a unique structure for rapid innovation and collaboration with governments, industry and NGOs. CSA shall:
- Create trusted best practices for AI and make them freely available, with an initial focus on Generative AI
- Give customers of all sizes confidence to accelerate responsible adoption due to the presence of guidelines for usage that mitigate risks
- Complement AI assurance programs within governments with a healthy degree of industry self-regulation
- Provide forward thinking program to address critical ethical issues and impact to society resulting from significant advances in AI over the next several years
Upcoming AI Events
Mark your calendar for Monday, May 6th to attend the CSA AI Summit at RSAC in San Francisco. Focusing on the intersection of AI and Cloud, CSA’s AI Summit will deliver critical tools and best practices necessary to meet the rapidly evolving demands of the most consequential technology ever introduced: Artificial Intelligence. Governments, organizations and even the hackers are questioning their strategies, tactics and investments to understand if they will withstand and leverage the AI revolution. Over 1,300 attendees are expected to participate in this revolutionary CSA AI Summit, which features industry innovators and experts who will discuss critical AI and Cloud topics such as shared responsibility between AI solution provider and AI consumer, pragmatic AI usage guidelines tied to existing security and governance frameworks, how cybersecurity makes AI safe and how AI makes cybersecurity better, ethical issues and societal impact from advances in AI, and many more issues facing created by the rapid emergence of AI.
Learn more →
Stay at the forefront of AI with our curated selection of insightful blogs and webinars. These resources offer expert perspectives, research, and real-world applications of artificial intelligence. Stay informed and broaden your knowledge of AI:
Past Events
- Virtual AI Summit January 2024
- SECtember 2023 - The Intersection of AI, Cloud, and Cybersecurity
- SECtember 2023 - Breaking Down Silos with SASE: How C-Suite Leaders are Driving Digital Transformation
- Virtual AI Summit 2023
- “Hi ChatGPT, please help Cybersecurity”
- Why the Cloud Security Alliance Needs to Help Secure AI (And You Do, Too)
- How ChatGPT Can Be Used in Cybersecurity
- Perspectives on AI: A Conversation with Torq’s CTO
- AI Security and Risk Management
- Exploring the Intersection of IAM and Generative AI in the Cloud
- News of Note: Facing Days of Opportunity, Massive Change... and AI
- Charting the Future of AI in Cybersecurity
- Top 5 Cybersecurity Trends in the Era of Generative AI
- Mitigating Security Risks in Retrieval Augmented Generation (RAG) LLM Applications
- My Reflections on OpenAI DevDay 2023: Security of New Features
- Generative AI: Proposed Shared Responsibility Model
- Zero Trust and AI: Better Together
- Applying the AIS Domain of the CCM to Generative AI
- Explore all AI blogs →
- Generate This: Bringing AI to Cloud Security
- How SOC Teams Use Next-Generation AI to Improve Cloud Detection and Response
- Artificial Intelligence in Cloud Security: Harnessing for Good
- ChatGPT Security Implications
Working Group Leadership

Josh Buker
Research Analyst, CSA

Ryan Gifford
Senior Research Analyst, CSA
Working Group Co-Chairs

Ken Huang
CEO & Chief AI Officer, DistributedApps.ai
Ken Huang is an acclaimed author of 8 books on AI and Web3. He is the Co-Chair of the AI Organizational Responsibility Working Group and AI Control Framework at the Cloud Security Alliance. Additionally, Huang serves as Chief AI Officer of DistributedApps.ai, which provides training and consulting services for Generative AI Security.
In addition, Huang contributed extensively to key initiatives in the space. He is a core contribut...

Roupe Sahans
DevSecOps Leader
Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.
Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.
Most recently Roupe ha...

Abdul Sattar

Dr. Chantal Spleiss
Balancing Innovation & Regulation in Life Sciences, Technical Sciences, and Industry
Dr. Chantal Spleiss is an AI expert and Senior Consultant in Pharma/MedTech with an emphasis on cybersecurity.
Chantal's vast experience in different fields helps her connect the dots and explore terrains beyond the beaten track. She is a practical person with a determined focus on getting things done, done right, and in a timely manner. She lov...

Chris Kirschke
Cloud Portfolio Information Security Officer at Albertsons Companies
Security Leader with over 20+ years of experience across Financial Services, Streaming, Retail and IT Services with a heavy focus on Cloud, DevSecOps and Threat Modeling. Advises multiple security startups on Product Strategy, Alliances and Integrations. Sits on multiple Customer Advisory Boards helping to drive security product roadmaps, integrations and feature developments. Avid hockey player, backpacker and wine collector in his spare t...

Dan Tisher
Publications in Review | Open Until |
---|---|
Cloud Threat Modeling 2025 | Sep 19, 2025 |
Key Management in Cloud Services 2025 Update | Sep 26, 2025 |
Applying Zero Trust Principles with Network-Infrastructure Hiding Protocol - Stealth Mode Software Defined Perimeter for Network Infrastructure | Oct 16, 2025 |
Enabling Zero Trust for Cellular Networks - Guidance for Securing Mobile Networks | Oct 16, 2025 |
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Virtual Meetings
Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.
Premier AI Safety Ambassadors
Premier AI Safety Ambassadors play a leading role in promoting AI safety within their organization, advocating for responsible AI practices and promoting pragmatic solutions to manage AI risks. Contact [email protected] to learn how your organization could participate and take a seat at the forefront of AI safety best practices.