SlideShare a Scribd company logo
1 of 2
Download to read offline
Post-deployment Testing, Incident Database, and Rapid Response Teams
Looking to the future with the US AI Safety Institute: The NIST AI RMF and Playbook
with the extensions of the NIST GAI-PWG are good initial steps towards a framework for
creating Trustworthy AI. However the explosive pace of Generative AI (GAI) software
production will probably overwhelm any recommended voluntary guidelines. (See
recent OpenAI announcements especially customizable GPTs and Assistants) One
problem is that multiple organizations will be often involved in delivering GAI
applications (e.g. data providers, foundation model builders,
fi
ne tuning enhancers,
plug-in creators, application deployers, output distributors). It will be necessary to
have post-deployment independent red team testing and downstream user
incident reporting across many stages of the delivery process.
For generic foundation models, red team post-deployment testing could combine
human and generative AI-based tools
fi
ne-tuned for testing . For complex domain-
speci
fi
c applications (e.g. health, law,
fi
nance, coding, engineering, manufacturing),
there should be independent red team domain experts and/or domain-speci
fi
c
generative AI tools that can test and evaluate deployed GAI applications. A regulatory
agency could manage this type of testing in coordination with domain-speci
fi
c
professional organizations.
I believe that it will be essential to create a public GAI Incident Database. This
Database should include ID of GAI software, Description of software, Incident
Description, Status of Repair, Testing Results, Risk Evaluation, and Warnings. This will
be invaluable to potential users of the GAI software. (The Database could also include
similar information about data sources).There will be a vast number of incidents
reported with the increasing use of GAI. It is essential to evaluate the potential risks
associated with the incidents and track the status of
fi
xes. There should be a mandate
to report serious incidents (de
fi
nition needed) with deployed systems. Regulatory
responses should be de
fi
ned for high risk incidents. Only a neutral organization (e.g.
U.S. Arti
fi
cial Intelligence Safety Institute Consortium) with large resources and
access to expert evaluators and red teams will be able to maintain a large
incident database, determine risks, and validate
fi
xes.
All organizations involved with the Generative AI application delivery process
should have rapid response teams for
fi
xing problems discovered in post-
deployment testing and use. As incidents are discovered in an organization’s
deployed applications, the organization’s rapid response team should be required
to report the status of
fi
xes to a regulatory agency in a timely fashion to avoid
being penalized (e.g decerti
fi
cation of application for unresolved serious incidents,
criminal penalties for deliberate illegal errors ). The time allowed for
fi
xes should be
based on the seriousness of the problem.
The diagram below is a basic illustration of Post-deployment Testing combined with an
Incident Database and Rapid Response
fi
xes under the supervision of a regulatory
organization. Click to expand.
The GAI Deliverable Producer creates deliverables (e.g. input data, foundation model,
fi
ne-tuned model, applications, or output data). Hopefully they use the AI RMF
guidelines for pre-deployment testing and then release the deliverables. Post-
deployment testing could be done by the recipient and/or an independent red team. If
the post-deployment testing or use of the deliverables detects an incident, it is sent to
the incident database and the Rapid Response team of the GAI Deliverable Producer.
A regulatory agency (e.g. USA AI Safety Institute) evaluates the risk associated with the
incident and attaches a warning. The Rapid Response Team is responsible for
producing a
fi
x for the incident problem in a timely fashion depending on the risk level.
The USA AI Safety Institute tracks the status of the
fi
x and can take action (e.g.
penalties, deliverable decerti
fi
cation) if the
fi
x is signi
fi
cantly delayed.
AI RMF on Risk over the GAI Life Cycle
Arti
fi
cial Intelligence Risk Management Framework (AI RMF 1.0)
https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf
“Risk at different stages of the AI lifecycle: Measuring risk at an earlier stage in the AI
lifecycle may yield different results than measuring risk at a later stage; some
risks may be latent at a given point in time and may increase as AI systems adapt
and evolve. Furthermore, different AI actors across the AI lifecycle can have different
risk perspectives.For example, an AI developer who makes AI software available, such
as pre-trained models, can have a different risk perspective than an AI actor who is
responsible for deploying that pre-trained model in a speci
fi
c use case. Such deployers
may not recognize that their particular uses could entail risks which differ from those
perceived by the initial developer. All involved AI actors share responsibilities for
designing, developing, and deploying a trustworthy AI system that is
fi
t for purpose”

More Related Content

Similar to GenAI Incident DB+Response Team

A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingYogeshIJTSRD
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration TestingBluechip Gulf IT Services
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Aristiun Whitepaper- Automated Threat Modelling with Aribot
Aristiun Whitepaper- Automated Threat Modelling with AribotAristiun Whitepaper- Automated Threat Modelling with Aribot
Aristiun Whitepaper- Automated Threat Modelling with AribotAristiun B.V.
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations OrchestrationMaKyOtOx
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7
 
please see below.docx
please see below.docxplease see below.docx
please see below.docxwrite31
 
please see below.docx
please see below.docxplease see below.docx
please see below.docx4934bk
 

Similar to GenAI Incident DB+Response Team (20)

A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Aristiun Whitepaper- Automated Threat Modelling with Aribot
Aristiun Whitepaper- Automated Threat Modelling with AribotAristiun Whitepaper- Automated Threat Modelling with Aribot
Aristiun Whitepaper- Automated Threat Modelling with Aribot
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations Orchestration
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
please see below.docx
please see below.docxplease see below.docx
please see below.docx
 
please see below.docx
please see below.docxplease see below.docx
please see below.docx
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

GenAI Incident DB+Response Team

  • 1. Post-deployment Testing, Incident Database, and Rapid Response Teams Looking to the future with the US AI Safety Institute: The NIST AI RMF and Playbook with the extensions of the NIST GAI-PWG are good initial steps towards a framework for creating Trustworthy AI. However the explosive pace of Generative AI (GAI) software production will probably overwhelm any recommended voluntary guidelines. (See recent OpenAI announcements especially customizable GPTs and Assistants) One problem is that multiple organizations will be often involved in delivering GAI applications (e.g. data providers, foundation model builders, fi ne tuning enhancers, plug-in creators, application deployers, output distributors). It will be necessary to have post-deployment independent red team testing and downstream user incident reporting across many stages of the delivery process. For generic foundation models, red team post-deployment testing could combine human and generative AI-based tools fi ne-tuned for testing . For complex domain- speci fi c applications (e.g. health, law, fi nance, coding, engineering, manufacturing), there should be independent red team domain experts and/or domain-speci fi c generative AI tools that can test and evaluate deployed GAI applications. A regulatory agency could manage this type of testing in coordination with domain-speci fi c professional organizations. I believe that it will be essential to create a public GAI Incident Database. This Database should include ID of GAI software, Description of software, Incident Description, Status of Repair, Testing Results, Risk Evaluation, and Warnings. This will be invaluable to potential users of the GAI software. (The Database could also include similar information about data sources).There will be a vast number of incidents reported with the increasing use of GAI. It is essential to evaluate the potential risks associated with the incidents and track the status of fi xes. There should be a mandate to report serious incidents (de fi nition needed) with deployed systems. Regulatory responses should be de fi ned for high risk incidents. Only a neutral organization (e.g. U.S. Arti fi cial Intelligence Safety Institute Consortium) with large resources and access to expert evaluators and red teams will be able to maintain a large incident database, determine risks, and validate fi xes. All organizations involved with the Generative AI application delivery process should have rapid response teams for fi xing problems discovered in post- deployment testing and use. As incidents are discovered in an organization’s deployed applications, the organization’s rapid response team should be required to report the status of fi xes to a regulatory agency in a timely fashion to avoid being penalized (e.g decerti fi cation of application for unresolved serious incidents, criminal penalties for deliberate illegal errors ). The time allowed for fi xes should be based on the seriousness of the problem. The diagram below is a basic illustration of Post-deployment Testing combined with an Incident Database and Rapid Response fi xes under the supervision of a regulatory organization. Click to expand.
  • 2. The GAI Deliverable Producer creates deliverables (e.g. input data, foundation model, fi ne-tuned model, applications, or output data). Hopefully they use the AI RMF guidelines for pre-deployment testing and then release the deliverables. Post- deployment testing could be done by the recipient and/or an independent red team. If the post-deployment testing or use of the deliverables detects an incident, it is sent to the incident database and the Rapid Response team of the GAI Deliverable Producer. A regulatory agency (e.g. USA AI Safety Institute) evaluates the risk associated with the incident and attaches a warning. The Rapid Response Team is responsible for producing a fi x for the incident problem in a timely fashion depending on the risk level. The USA AI Safety Institute tracks the status of the fi x and can take action (e.g. penalties, deliverable decerti fi cation) if the fi x is signi fi cantly delayed. AI RMF on Risk over the GAI Life Cycle Arti fi cial Intelligence Risk Management Framework (AI RMF 1.0) https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf “Risk at different stages of the AI lifecycle: Measuring risk at an earlier stage in the AI lifecycle may yield different results than measuring risk at a later stage; some risks may be latent at a given point in time and may increase as AI systems adapt and evolve. Furthermore, different AI actors across the AI lifecycle can have different risk perspectives.For example, an AI developer who makes AI software available, such as pre-trained models, can have a different risk perspective than an AI actor who is responsible for deploying that pre-trained model in a speci fi c use case. Such deployers may not recognize that their particular uses could entail risks which differ from those perceived by the initial developer. All involved AI actors share responsibilities for designing, developing, and deploying a trustworthy AI system that is fi t for purpose”