The Hacking Policy Council (HPC) submits the following comments in response to the Request for Information (RFI) related to National Institute of Standards and Technology (NIST)’s responsibilities under Sections 4.1, 4.5, and 11 of the recent Artificial Intelligence (AI) Executive Order (EO) 14110. We thank NIST for the opportunity to provide input towards this important proposal.

The HPC is a group of industry experts dedicated to creating a more favorable legal, policy, and business environment for vulnerability management and disclosure, good faith security research, penetration testing, bug bounty programs, and independent repair for security. Many of our members are deeply involved in AI system deployment, testing, and red teaming.

HPC’s comments focus on AI testing and red teaming. As AI systems become increasingly common in a variety of environments, including critical and public applications, ensuring the security, safety, and trustworthiness of AI is a major priority. Testing AI for alignment with evaluation metrics is a key safeguard against poor security, discrimination, bias, inaccuracy, and other harmful or undesirable outputs. However, we also emphasize that testing should be only one component of a security and trustworthiness program that includes risk assessment, vulnerability management, incident response plans, and other safeguards.

Read Next

FedRAMP Unveils Next Phase of Modernization

ADI and FedRAMP hosted an event unveiling FedRAMP 20x Phase II, which discussed accelerating and automating cloud service authorization for federal use and cutting down time, effort, and paperwork in favor of efficiency, trust, and cybersecurity.

Yet Another Blog About “Cyber Defense”

We’re stuck in a loop: large scale attacks happen, experts lament, voices call to unleash the private sector, debate ensues, nothing changes. But will it be different this time?

CyberNext DC 2025 Preview

On October 8, the Cybersecurity Coalition and Cyber Threat Alliance will host the annual day-long CyberNext DC to examine this evolving cybersecurity policy landscape.