Skip to content
The FedNinjas

The Fedninjas

FedNinjas: Your Guide to Federal Cloud, Cybersecurity, and FedRAMP Success.

Primary Menu
  • Home
  • Blog
  • Podcast
Listen to us on Spotify!

AI Governance in Cybersecurity: Navigating the New Executive Orders

FedNinjas Team May 6, 2025 5 minutes read

Artificial Intelligence (AI) is transforming the cybersecurity landscape. Accordingly, the need for effective AI governance in cybersecurity has become paramount. As AI-powered tools and systems become more prevalent, the potential attack surface for cyber threats has expanded significantly. In response, the US government has issued a series of executive orders aimed at addressing the risks and challenges associated with AI in cybersecurity. In this article, we will delve into the implications of these executive orders. We will explore the key considerations for AI governance in cybersecurity.

The first executive order, issued in February 2020, directed federal agencies to develop AI governance policies and guidelines for the development, acquisition, and deployment of AI systems. This order was followed by a series of subsequent orders. These include the May 2020 executive order on “Securing the United States Bulk-Power System” and the August 2020 executive order on “Strengthening the Cybersecurity of Federal Agencies.”

The Imperative for AI Governance in Cybersecurity

The increasing reliance on AI-powered systems in cybersecurity has introduced new risks and challenges. Among these is the potential for AI systems to unintentionally create or amplify cyber threats. For instance, AI-powered systems may inadvertently generate malicious code or amplify the impact of a cyber attack. Moreover, the lack of transparency and explainability in AI decision-making processes can make it difficult to detect. Responding to cyber threats in a timely and effective manner becomes challenging.

Effective AI governance in cybersecurity is critical to mitigating these risks. It ensures the secure development, deployment, and operation of AI-powered systems. This requires a comprehensive approach that addresses the entire lifecycle of AI systems. It spans from development to deployment and operation.

Key Considerations for AI Governance in Cybersecurity

Implementing effective AI governance in cybersecurity requires careful consideration of several key factors. These include:

Transparency and Explainability

A critical component of AI governance in cybersecurity is ensuring transparency and explainability in AI decision-making processes. This involves developing AI systems that provide clear and understandable explanations for their decisions and actions. This is essential for detecting and responding to cyber threats in a timely and effective manner.

According to a report by the National Institute of Standards and Technology (NIST), explainability is a critical factor in building trust in AI systems. The report notes that explainability can help identify biases and errors in AI decision-making processes. This improves the overall effectiveness of AI-powered cybersecurity systems.

Human-AI Collaboration

Human-AI collaboration is another critical factor in AI governance in cybersecurity. This involves developing AI systems that can effectively collaborate with human cybersecurity professionals to detect and respond to cyber threats. This requires the development of AI systems that can integrate with human decision-making processes and provide timely and effective support.

A report by the Cybersecurity and Infrastructure Security Agency (CISA) notes that human-AI collaboration is essential for effective cybersecurity. The report emphasizes the need for AI systems that can augment human decision-making processes, rather than replace them.

Risk Management and Compliance

Risk management and compliance are also critical components of AI governance in cybersecurity. This involves developing AI systems that can identify and manage cybersecurity risks. They must comply with relevant laws and regulations too. Developing AI systems that integrate with existing risk management frameworks is necessary. They must comply with relevant standards and guidelines.

A report by the National Security Agency (NSA) notes that risk management and compliance are essential for effective AI governance in cybersecurity. The report emphasizes the need for AI systems that can identify and manage cybersecurity risks in real-time. Also, they should comply with relevant laws and regulations.

The Role of Executive Orders in AI Governance in Cybersecurity

The recent executive orders issued by the US government have significant implications for AI governance in cybersecurity. These orders direct federal agencies to develop AI governance policies and guidelines. Specifically, the development, acquisition, and deployment of AI systems are covered. This includes the development of guidelines for the secure development and operation of AI-powered cybersecurity systems.

The executive orders also emphasize the need for transparency and explainability in AI decision-making processes. This includes the development of AI systems that can provide clear and understandable explanations for their decisions and actions.

Furthermore, the executive orders highlight the importance of human-AI collaboration in cybersecurity. This includes the development of AI systems that can effectively collaborate with human cybersecurity professionals. They detect and respond to cyber threats accordingly.

Conclusion

The rapidly evolving landscape of AI is transforming the cybersecurity landscape. Accordingly, the need for effective AI governance in cybersecurity has become paramount. The recent executive orders issued by the US government have significant implications for AI governance in cybersecurity. It is critical that cybersecurity professionals understand the key considerations for implementing effective AI governance in cybersecurity.

By addressing the imperative for AI governance in cybersecurity and considering key factors such as transparency and explainability, professionals can ensure secure development. Human-AI collaboration and risk management and compliance must be considered too. Understanding the role of executive orders in AI governance in cybersecurity is also key. Cybersecurity professionals can ensure the secure development, deployment, and operation of AI-powered cybersecurity systems.

As the use of AI-powered systems in cybersecurity continues to grow. It is essential that cybersecurity professionals stay informed about the latest developments and best practices in AI governance in cybersecurity.

References Cited:

1. National Institute of Standards and Technology. (2020). Four Principles of Explainable Artificial Intelligence.
2. Cybersecurity and Infrastructure Security Agency. (2020). AI Cybersecurity Collaboration Playbook
3. National Security Agency. (2020). Risk Management and Compliance for AI-Cyber Systems.
4. The White House. (2020). Executive Order on Securing the United States Bulk-Power System.
5. The White House. (2020). Executive Order on Strengthening the Cybersecurity of Federal Agencies.

About The Author

FedNinjas Team

See author's posts

Post navigation

Previous: Frequent Audit Findings and Remediation Best Practices
Next: Cybersecurity in the Construction Industry: Securing the Jobsite and the Back Office

Related Stories

Claude Mythos and Glasswing Butterfly

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity

Eric Adams April 21, 2026
Agentic AI attack surfaces

Agentic AI is the Attack Surface

Eric Adams February 3, 2026
AI-orchestrated-cyber-espionage-campaign

The Rise of AI Espionage: How Autonomous Agents Are Redefining Cyber Threats

Eric Adams November 17, 2025

Trending News

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity Claude Mythos and Glasswing Butterfly 1

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity

April 21, 2026
The Stryker Cyber Attack: A Mass Remote Wipe of its Managed Devices Stryker affected countries 2

The Stryker Cyber Attack: A Mass Remote Wipe of its Managed Devices

March 19, 2026
Agentic AI is the Attack Surface Agentic AI attack surfaces 3

Agentic AI is the Attack Surface

February 3, 2026
The Rise of Humanoid Robots in Modern Society Humanoid robots getting hackied 4

The Rise of Humanoid Robots in Modern Society

December 29, 2025
The Rise of AI Espionage: How Autonomous Agents Are Redefining Cyber Threats AI-orchestrated-cyber-espionage-campaign 5

The Rise of AI Espionage: How Autonomous Agents Are Redefining Cyber Threats

November 17, 2025
  • 3PAO assessments
  • Access Control
  • Advanced Threat Protection
  • Adversarial Modeling
  • Agentic AI
  • AI
  • AI and Quantum Computing
  • AI in Healthcare
  • AI-Powered SOCs
  • AI-Powered Tools
  • Anomaly Detection
  • API Security
  • Application Security
  • Artificial Intelligence
  • Artificial Intelligence
  • Artificial Intelligence in Cybersecurity
  • Attack Surface Management
  • Attack Surface Reduction
  • Audit and Compliance
  • Autonomous Systems
  • Blockchain
  • Breach Severity
  • Business
  • Career
  • CISA Advisory
  • CISO
  • CISO Strategies
  • Cloud
  • Cloud Computing
  • Cloud Security
  • Cloud Security
  • Cloud Service Providers
  • Compliance
  • Compliance And Governance
  • Compliance and Regulatory Affairs
  • Compliance And Regulatory Requirements
  • Continuous Monitoring
  • Continuous Monitoring
  • Corporate Security
  • Critical Infrastructure
  • Cross-Agency Collaboration
  • Cryptocurrency
  • Cyber Attack
  • Cyber Attacks
  • Cyber Deterrence
  • Cyber Resilience
  • Cyber Threats
  • Cyber-Physical Systems
  • Cyberattacks.
  • Cybercrime
  • Cybersecurity
  • Cybersecurity And Sustainability
  • Cybersecurity Breaches
  • Cybersecurity in Federal Programs
  • Cybersecurity Measures
  • Cybersecurity Strategy
  • Cybersecurity Threats
  • Data Breach
  • Data Breaches
  • Data Privacy
  • Data Protection
  • Data Security
  • Deepfake Detection
  • Deepfakes
  • Defense Readiness
  • Defense Strategies
  • Digital Twins
  • Disaster Recovery
  • Dwell Time
  • Encryption
  • Encryption Technologies
  • Federal Agencies
  • Federal Cloud
  • Federal Cybersecurity
  • Federal Cybersecurity Regulations
  • Federal Government
  • FedRamp
  • FedRAMP Compliance
  • Game Theory
  • GDPR
  • Global Security Strategies
  • Government
  • Government Compliance.
  • Government Cybersecurity
  • Healthcare
  • Healthcare Cybersecurity
  • Healthcare Technology
  • HIPAA Compliance
  • humanoid
  • Humans
  • Incident Response
  • Industrial Control Systems (ICS)
  • Information Security
  • Insider Threats
  • Internet of Things
  • Intrusion Detection
  • IoT
  • IoT Security
  • IT Governance
  • IT Security
  • Least Privilege
  • LLM Poisoning
  • Modern Cyber Defense
  • Nation-State Hackers
  • National Cybersecurity Strategy
  • National Security
  • Network Security
  • NHI
  • NIST Cybersecurity Framework
  • Operational Environments
  • Phishing
  • Privacy
  • Public Safety
  • Quantum Computing
  • Ransomware
  • Real-World Readiness
  • Red Teaming
  • Regulatory Compliance
  • Risk Assessment
  • Risk Management
  • Risk Management
  • Risk-Based Decision Making
  • robotics
  • Secure Coding Practices
  • Security Awareness
  • Security Operations Center
  • Security Operations Center (SOC)
  • Security Threats
  • Security Training
  • SIEM Tools
  • Social Engineering
  • Supply Chain Cybersecurity
  • Supply Chain Risk Management
  • Supply Chain Security
  • Sustainability
  • Tech
  • Technology
  • Third Party Security
  • Third-Party Risk Management
  • Third-Party Vendor Management
  • Threat Analysis
  • Threat Containment
  • Threat Defense
  • Threat Detection
  • Threat Intelligence
  • Threat Landscape
  • Training
  • Uncategorized
  • vCISO
  • Voice Phishing
  • Vulnerability Disclosure
  • Vulnerability Management
  • Workforce
  • Zero Trust Architecture
  • Zero Trust Authentication
  • Zero-Day Exploits
  • Zero-Day Vulnerabilities
  • Zero-Trust Architecture

You may have missed

Claude Mythos and Glasswing Butterfly

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity

Eric Adams April 21, 2026
Stryker affected countries

The Stryker Cyber Attack: A Mass Remote Wipe of its Managed Devices

Eric Adams March 19, 2026
Agentic AI attack surfaces

Agentic AI is the Attack Surface

Eric Adams February 3, 2026
Humanoid robots getting hackied

The Rise of Humanoid Robots in Modern Society

Eric Adams December 29, 2025
Copyright © All rights reserved.