Bringing Adaptive Leadership Into IT
April 12, 2023—Explore how to build an agile team that is confident in responding to security threats and other crises when speed is critical...
Built around one or a series of workshops, ALT for Developing Effective AI Governance jump starts a client’s program to organize and control AI use by engaging senior executives in cybersecurity and IT, and also HR, Legal, Risk, and Corporate Communications. Supported and guided by AI experts, executives realize the requirements and goals of AI governance and lay the groundwork for an ongoing, sustainable program.
Employing tactical decision games centered on business-relevant scenarios in which small teams of participants quickly make and explain decisions, Nemertes leads workshop participants through the process of articulating and internalizing their organization’s specific requirements for effective AI governance, translating abstract notions of “AI governance” into plans with clear impact on and benefits for each stakeholder. The “after action review” of all teams’ decisions captures key findings and points to appropriate next steps. Weekly AI updates from Nemertes keep participants current on technological and legal AI landscapes, and quarterly check-ins ensure follow-through.
Clients receive:
About Donald Vandergriff
About Jerald Murphy
About Johna Till Johnson
About John Burke
About Salomé Krell
About Lydia Serrano
Nemertes is uniquely capable of assisting clients in developing their AI governance programs. In addition to our experience coaching senior-level IT and cybersecurity executives across a range of industries, Nemertes Fellows and experts include leading-edge AI and policy researchers at world-class institutions, such as Rensselaer Polytechnic Institute and the State University of New York system (SUNY).
April 12, 2023—Explore how to build an agile team that is confident in responding to security threats and other crises when speed is critical...
March 22, 2023—Tabletop exercises are often treated as a “nice to have” in cybersecurity operations. They aren’t. They’re essential to conduct early and often...