Transcript
A (0:00)
Foreign welcome back to the AI Policy Podcast. I'm Gregory Allen and today we've got a pretty incredible conversation on the intersection of cybersecurity and AI, and we've got two really good people to talk about this topic. So first we've got Miles Brundage, who is an independent AI policy researcher currently launching a related nonprofit, but he also serves as a non resident Senior Fellow at the Institute for Progress and a Strategy advisor for EPIC AI, among other advisory roles. He spent six years at OpenAI from 2018 to 2024, progressing from research scientist to Head of Policy Research and finally Senior Advisor for AGI Readiness before departing to pursue independent work. I think I've known Miles now for not quite 10 years and he's been an incredible conversationalist and source of wisdom through that whole time. So welcome Miles. Our second guest is Chris Rolfe, who is a cybersecurity expert with more than 22 years of experience at the intersection of cybersecurity, AI and US national security. He is currently a security Engineer at Meta and also serves as a non resident Research Fellow at Georgetown center for Security and Emerging Technology CSET focusing on cybersecurity and AI policy. Chris previously spent nearly a decade on the Black Hat Content Review Board, which if you know anything about the cybersecurity community, is a big deal. And one caveat I should say on behalf of Chris is that he's speaking entirely in a personal capacity, not representing Meta or any of his prior affiliations. So, Miles, Chris, thank you so much for coming on the AI Policy podcast.
B (1:50)
Thanks for having me.
C (1:51)
Yeah, thanks for the invite.
A (1:53)
So I just gave a little bit of background of your careers, but I want to ask a little bit specifically in the case of you, Chris, because 22 years is officially long enough that you were working on the intersection of AI and cyber before it was cool. And so I want to ask, how has your career evolved as AI has changed so much as cybersecurity has changed so much and, and sort of where did you start and where did you end up now?
B (2:20)
Yeah, it's a great question. So where I started was in vulnerability research and exploit development. This was back in around 2002, 2003, and a lot of the work then was pretty much 100% manual. You sat there, you looked through code line by line, tried to determine what the program was doing, where the developer got it wrong, and then slowly and painstakingly writing an exploit by hand.
A (2:45)
What happened is over time you're writing an exploit. Who's paying you to do Well, I.
