Rethinking Enterprise Architecture In The Age of AI - Part IV Enterprise Risk & Innovation Governance

Rethinking Enterprise Architecture In The Age of AI - Part IV Enterprise Risk & Innovation Governance

Updated May 18, 2024

This is the fourth and final article in the series. This one addresses rapidly and continually addressing enterprise architecture from an enterprise risk and innovation perspective against a massive rate of tech change.

Other Articles In The Series:

Logarithmic Rate Of Tech Change We Can Now No Longer Cognitively Keep Up With

Look at this curve. It shows a logarithmic rate of tech change we can now no longer cognitively keep up with. Note the slowest rate of change is politics i.e., government. Given this, how are you going to ensure your enterprise is always secure? As the Part III article noted, new attack vectors are coming at you from all directions.

Then There's Innovation

The tech change curve also means that almost each day, new tech is emerging which may or may not be leveraged by your enterprise to do things faster, cheaper and better. Given the fast rate of change, how are you and your enterprise going to keep up with it, quickly identifying new tech with which you can innovate with?

You're Entering A Major Paradigm Shift

Where your old ways won't work well anymore. Thus, it requires out of the box thinking for the out of the box times your enterprise finds itself in.

My Premise?

The tech change curve means new innovation and risk will hit your enterprise from all directions, within all departments. Thus, you need to get risk and innovation out of the silo-ized departments within which it lives today within your enterprise.

Enter The New Enterprise Risk & Innovation Committee

It has members from all your enterprise departments and meets daily. The department members should be your best and brightest. It also has a board member sitting in on the meetings at least once every two weeks.

What Does it Do?

it leverages AI systems to constantly search the web for new tech developments. The committee has your best and brightest minds. They then continually review the new tech, analyzing it from:

  • What can the tech do allowing us to do things faster, cheaper and better?
  • What are the risks associated with this?

Which Is Where Your Red Security Team Comes Into Play

It's job is to think outside the box creating new attack vectors against your governance, business processes, tech infrastructure and your users (be they human, AI systems or bots)(or customers, employees, contractors, suppliers, business partners or third parties). It will likely use:

  • AI software to create attacks against your enterprise
  • Actors to play various roles within your enterprise, leveraging new tech, to attack your enterprise (just like Malicious Molly)

It's much better to be successfully attacked by your Red Team than the Evil Inc.s.

Note: I suggest readers skim these two articles by Bruno W Agra about a paper "Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training". In Part 2 he discusses red-teaming to detect these types of agents:

The New Committee Will Likely Have Some Permanent Staff

Their job is to:

  • Keep on top of the evaluations
  • Oversee testing, rapid POC (Proof of Concepts), pilots and roll-outs
  • Etc.

Yet The New Committee Could Easily Become A Boondoggle

If it becomes entrenched within your enterprise, with it's own bureaucracy, it might be not liked by other departments. Hypothetically, it could wield a very powerful approval sword, negatively affecting other departments.

Which Is Why Leadership Is Critical

The leader of this new committee should be someone who's well respected by all the enterprise departments. They must be able to work collaboratively within the team and across the enterprise.

The New Committee And AI Software It Uses Become Prime Attack Targets

The Evil inc.s will leverage tech, Malicious Molly types, etc. to see if they can successfully get inside the committee, it's business and technical processes. Which is why your red security team must constantly be on top of their game to thwart such attempts.

The Committee Must Educate your Workforce and Customers on AI Agent Benefits & Risks

As AI agent hype unfolds, your workforce and customers will leap to using this. They'll see it as being able to do things faster, cheaper and better. What they will mostly be oblivious about is the risks that come with this. Thus, it makes sense to prepare a continuous education and notification system within your enterprise about AI agents benefits and risks.

Summary - I Wrote These Articles Aiming At What I Call The "Keeners"

Most enterprises won't see the effects of the tech change curve, until it's upon them creating havoc with their bottom lines, market share, security, etc. Thus, I'm on the hunt for keen thinkers and do-ers within enterprises, who can see the very strong winds of change blowing . You are the "keeners".

It's your job to get on top of the winds of change, leveraging it, within your enterprise, to create new ways of doing things faster, cheaper and better. That's what these series of articles lays out at the 100,000 foot level. Contact me if you'd like to chat.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT



要查看或添加评论,请登录

社区洞察

其他会员也浏览了