BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20260308T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260309T004449Z
UID:22FED8FF-1C8B-4E19-935D-FA48B260CE0B
DTSTART;TZID=America/New_York:20260305T180000
DTEND;TZID=America/New_York:20260305T190000
DESCRIPTION:[Distributed Quantum Neural Networks on Distributed Photonic Qu
 antum Computing]\n\nSpecial Presentation by Robert Rittich (Counter Measur
 es Security\, USA)\n\nHosted by the Future Networks Artificial Intelligenc
 e &amp; Machine Learning (AI/ML) Working Group\n\nDate/Time: Thursday\, 5 Marc
 h 2026 @ 6 PM Eastern Time (3 PM Pacific Time)\n\nTopic:\n\nInfrastructure
  as an Emergent Behavior-Shaping System in Networked Physical AI\n\nAbstra
 ct:\n\nModern security thinking around AI and networking often treats infr
 astructure as neutral plumbing: systems designed to transport data\, coord
 inate services\, and optimize performance. In practice\, however\, infrast
 ructure exhibits emergent behavior. As trusted systems scale\, they shape 
 how humans and machines interact\, what is considered normal operation\, a
 nd which actions are taken without reflection—often before adversarial u
 se becomes visible.\n\nThis talk examines how implicit trust in networked 
 infrastructure creates unexamined attack surface as an emergent property o
 f technical design choices. Drawing on real-world examples — from browse
 r push notification ecosystems to industrial control systems and emerging 
 physical AI platforms — the presentation shows how infrastructure origin
 ally designed for benign environments establishes habits\, incentives\, an
 d coordination patterns that later prove difficult to unwind.\n\nAs AI sys
 tems become embodied\, mobile\, and collaborative — operating through pr
 oximity-based communication\, device swarms\, and delegated decision-makin
 g — the behavioral effects of infrastructure become more pronounced. Rat
 her than predicting specific threats or proposing controls\, this talk app
 lies a risk manager’s lens to surface recurring architectural patterns: 
 where trust migrates into systems by default\, where behavior adapts faste
 r than threat models\, and where networking decisions amplify downstream c
 onsequences once physical systems are involved.\n\nSpeaker:\n\n[]\nRobert 
 Rittich is an independent technology consultant and researcher focused on 
 the intersection of networking\, artificial intelligence\, and system-leve
 l risk. He is the founder of Counter Measures Security LLC and holds an MS
  in Cybersecurity\, along with CISSP\, CEH\, and CHPS certifications. Whil
 e his background is rooted in offensive and defensive security practice\, 
 Robert’s current work examines how emerging AI-driven systems — spanni
 ng robotics\, autonomous platforms\, wearables\, and human augmentation 
 — operate in real-world environments and at scale. His perspective is in
 formed by hands-on experience assessing how systems behave when optimized 
 for performance\, efficiency\, and low friction. Rather than approaching t
 hese challenges from a narrowly defined security role\, his work emphasize
 s architectural thinking and cross-domain awareness\, informed by how comp
 lex systems evolve once they are deployed and interconnected.\n\nBrochure 
 (PDF): [Webinar-AIML-2026-03-05-Rittich-InfraBehaviorPhysicalAI-Brochure.p
 df](https://drive.google.com/file/d/1kFImhnpsJ8Kx128OnMnwgkcgZbe1CVUP/view
 )\n\nCo-sponsored by: Future Networks Artificial Intelligence &amp; Machine Le
 arning (AIML) Working Group\n\nVirtual: https://events.vtools.ieee.org/m/5
 32025
LOCATION:Virtual: https://events.vtools.ieee.org/m/532025
ORGANIZER:baw@ieee.org
SEQUENCE:11
SUMMARY:Infrastructure as an Emergent Behavior-Shaping System in Networked 
 Physical AI
URL;VALUE=URI:https://events.vtools.ieee.org/m/532025
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-top: .25in
 \;&quot;&gt;&lt;img src=&quot;https://events.vtools.ieee.org/vtools_ui/media/display/a085a
 a3d-ca29-4c9e-877b-bdab4fd5ffc2&quot; alt=&quot;Distributed Quantum Neural Networks 
 on Distributed Photonic Quantum Computing&quot; width=&quot;750&quot; height=&quot;197&quot;&gt;&lt;/p&gt;\n
 &lt;p class=&quot;MsoNormal&quot; style=&quot;margin-top: 12.0pt\;&quot;&gt;Special Presentation by&lt;
 strong&gt; Robert Rittich (Counter Measures Security\, USA)&lt;/strong&gt;&lt;/p&gt;\n&lt;p 
 class=&quot;MsoNormal&quot; style=&quot;margin-top: 12.0pt\;&quot;&gt;Hosted by the Future Networ
 ks&lt;strong&gt; Artificial Intelligence &amp;amp\; Machine Learning (AI/ML) Working
  Group&lt;/strong&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-top: 12.0pt\;&quot;&gt;&lt;st
 rong&gt;&lt;span style=&quot;font-size: 14.0pt\; font-family: Copperplate\; mso-farea
 st-font-family: PMingLiU\; mso-fareast-theme-font: minor-fareast\; mso-bid
 i-font-family: Arial\; mso-bidi-theme-font: minor-bidi\; mso-ansi-language
 : EN-US\; mso-fareast-language: ZH-TW\; mso-bidi-language: AR-SA\;&quot;&gt;Date/T
 ime&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size: 12.0pt\; font-family: &#39;Calibri&#39;
 \,sans-serif\; mso-ascii-theme-font: minor-latin\; mso-fareast-font-family
 : PMingLiU\; mso-fareast-theme-font: minor-fareast\; mso-hansi-theme-font:
  minor-latin\; mso-bidi-font-family: Arial\; mso-bidi-theme-font: minor-bi
 di\; mso-ansi-language: EN-US\; mso-fareast-language: ZH-TW\; mso-bidi-lan
 guage: AR-SA\;&quot;&gt;: &lt;strong&gt;Thursday\, 5 March 2026&lt;/strong&gt;&lt;strong&gt;&amp;nbsp\;@
  6 PM Eastern Time (3 PM Pacific Time)&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoN
 ormal&quot; style=&quot;margin-top: .25in\;&quot;&gt;&lt;strong&gt;&lt;u&gt;&lt;span style=&quot;font-size: 16.0
 pt\; font-family: Copperplate\;&quot;&gt;Topic&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span st
 yle=&quot;font-size: 16.0pt\; font-family: Copperplate\;&quot;&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
 \n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 16pt\;&quot;&gt;Infrastruct
 ure as an Emergent Behavior-Shaping System in Networked Physical AI&lt;/span&gt;
 &lt;/strong&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-top: .25in\;&quot;&gt;&lt;strong&gt;&lt;u
 &gt;&lt;span style=&quot;font-size: 16.0pt\; font-family: Copperplate\;&quot;&gt;Abstract&lt;/sp
 an&gt;&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 16.0pt\; font-family: Copp
 erplate\;&quot;&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;Modern security thinking around AI an
 d networking often treats infrastructure as neutral plumbing: systems desi
 gned to transport data\, coordinate services\, and optimize performance. I
 n practice\, however\, infrastructure exhibits emergent behavior. As trust
 ed systems scale\, they shape how humans and machines interact\, what is c
 onsidered normal operation\, and which actions are taken without reflectio
 n&amp;mdash\;often before adversarial use becomes visible.&lt;/p&gt;\n&lt;p&gt;This talk e
 xamines how implicit trust in networked infrastructure creates unexamined 
 attack surface as an emergent property of technical design choices. Drawin
 g on real-world examples &amp;mdash\; from browser push notification ecosystem
 s to industrial control systems and emerging physical AI platforms &amp;mdash\
 ; the presentation shows how infrastructure originally designed for benign
  environments establishes habits\, incentives\, and coordination patterns 
 that later prove difficult to unwind.&lt;/p&gt;\n&lt;p&gt;As AI systems become embodie
 d\, mobile\, and collaborative &amp;mdash\; operating through proximity-based 
 communication\, device swarms\, and delegated decision-making &amp;mdash\; the
  behavioral effects of infrastructure become more pronounced. Rather than 
 predicting specific threats or proposing controls\, this talk applies a ri
 sk manager&amp;rsquo\;s lens to surface recurring architectural patterns: wher
 e trust migrates into systems by default\, where behavior adapts faster th
 an threat models\, and where networking decisions amplify downstream conse
 quences once physical systems are involved.&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;f
 ont-size: 16.0pt\; font-family: Copperplate\;&quot;&gt;&lt;u&gt;Speaker&lt;/u&gt;:&lt;/span&gt;&lt;/str
 ong&gt;&lt;/p&gt;\n&lt;table style=&quot;border-collapse: collapse\; width: 100%\;&quot; border=
 &quot;1&quot;&gt;&lt;colgroup&gt;&lt;col style=&quot;width: 17.466411%\;&quot;&gt;&lt;col style=&quot;width: 82.43762
 %\;&quot;&gt;&lt;/colgroup&gt;\n&lt;tbody&gt;\n&lt;tr&gt;\n&lt;td&gt;&lt;img src=&quot;https://events.vtools.ieee.
 org/vtools_ui/media/display/2dc0b6a2-d537-43ea-b005-f0271b2f09f3&quot; alt=&quot;&quot; w
 idth=&quot;164&quot; height=&quot;200&quot;&gt;&lt;/td&gt;\n&lt;td&gt;\n&lt;p&gt;&lt;strong&gt;Robert Rittich&lt;/strong&gt; is
  an independent technology consultant and researcher focused on the inters
 ection of networking\, artificial intelligence\, and system-level risk. He
  is the founder of Counter Measures Security LLC and holds an MS in Cybers
 ecurity\, along with CISSP\, CEH\, and CHPS certifications. While his back
 ground is rooted in offensive and defensive security practice\, Robert&amp;rsq
 uo\;s current work examines how emerging AI-driven systems &amp;mdash\; spanni
 ng robotics\, autonomous platforms\, wearables\, and human augmentation &amp;m
 dash\; operate in real-world environments and at scale. His perspective is
  informed by hands-on experience assessing how systems behave when optimiz
 ed for performance\, efficiency\, and low friction. Rather than approachin
 g these challenges from a narrowly defined security role\, his work emphas
 izes architectural thinking and cross-domain awareness\, informed by how c
 omplex systems evolve once they are deployed and interconnected.&lt;/p&gt;\n&lt;/td
 &gt;\n&lt;/tr&gt;\n&lt;/tbody&gt;\n&lt;/table&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Brochure (PDF)&lt;/s
 trong&gt;: &lt;a href=&quot;https://drive.google.com/file/d/1kFImhnpsJ8Kx128OnMnwgkcg
 Zbe1CVUP/view&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Webinar-AIML-2026-03-05-Ritt
 ich-InfraBehaviorPhysicalAI-Brochure.pdf&lt;/a&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

