<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Control Engineering</provider_name><provider_url>https://www.controleng.com</provider_url><author_name>Control Engineering</author_name><author_url>https://www.controleng.com/author/sweta/</author_url><title>Ep. 44: Lesley Carhart on the regulations of AI in cybersecurity - Control Engineering</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="zpmx22WAwl"&gt;&lt;a href="https://www.controleng.com/podcast/ep-44-lesley-carhart-on-the-the-regulations-of-ai-in-cybersecurity/"&gt;Ep. 44: Lesley Carhart on the regulations of AI in cybersecurity&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.controleng.com/podcast/ep-44-lesley-carhart-on-the-the-regulations-of-ai-in-cybersecurity/embed/#?secret=zpmx22WAwl" width="600" height="338" title="&#x201C;Ep. 44: Lesley Carhart on the regulations of AI in cybersecurity&#x201D; &#x2014; Control Engineering" data-secret="zpmx22WAwl" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>There have been a lot of questions surrounding artificial intelligence and how it will be regulated moving forward. In this edition of the ICS Pulse podcast, we talk to Lesley Carhart of Dragos about these implications, as well as exclusive research on AI in cybersecurity.</description><thumbnail_url>https://www.controleng.com/wp-content/uploads/2024/12/ce_logo_1200x675.png</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>675</thumbnail_height></oembed>
