Explore 1.5M+ audiobooks & ebooks free for days

From £10.99/month after trial. Cancel anytime.

The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade
The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade
The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade
Ebook168 pages1 hour

The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade

Rating: 0 out of 5 stars

()

Read preview

About this ebook

THE SELF-BUILDING AI METROPOLIS: A STRATEGIC WAKE-UP CALL FOR TECHNOLOGY EXECUTIVES

"We've built a city where no one person knows how the buildings stand, yet millions will live in them."

As AI systems increasingly generate, validate, and deploy code with minimal human intervention, ent

LanguageEnglish
PublisherBeldene Publishing
Release dateMar 17, 2025
ISBN9781997521082
The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade
Author

Haroon Mansoori

AI & Security Transformation Pioneer

Read more from Haroon Mansoori

Related to The CISO & CTO Guide to The Self-Building AI Metropolis

Related ebooks

Intelligence (AI) & Semantics For You

View More

Reviews for The CISO & CTO Guide to The Self-Building AI Metropolis

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    The CISO & CTO Guide to The Self-Building AI Metropolis - Haroon Mansoori

    The CISO & CTO Guide to The Self-Building AI Metropolis

    The CISO & CTO Guide to The Self-Building AI Metropolis

    Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade

    Executive Decision Brief

    Haroon Mansoori

    Beldene Publishing

    The CISO & CTO Guide to The Self-Building AI Metropolis

    Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade

    Copyright © 2025 by Haroon Mansoori

    Published by Beldene Publishing, Toronto, ON, Canada

    All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law.

    ISBN 13: 978-1-997521-10-5 (Hardcover) | ISBN 13: 978-1-997521-09-9 (Paperback) | ISBN 13: 978-1-997521-08-2 (Electronic)

    Disclaimer: This publication contains the opinions and ideas of its author and is designed to provide useful information regarding the subject matter covered. It is sold with the understanding that the author and publisher are not engaged in rendering legal, accounting, cybersecurity, information technology, or other professional services or advice. If legal, technical, or other expert assistance is required, the services of a competent professional should be sought.

    The strategies, frameworks, and methodologies outlined in this book represent the author's professional observations and recommendations based on experience and research. They are not guarantees of security or compliance with any specific regulatory requirements. Every organization faces unique challenges, and readers should evaluate the applicability of the content to their specific circumstances.

    The author and Beldene Publishing have made every effort to ensure the accuracy and completeness of information contained in this book. However, they assume no responsibility for errors, inaccuracies, omissions, or inconsistencies herein. The author and publisher specifically disclaim any liability resulting from the use or application of the contents of this book.

    References to specific products, organizations, or authorities in this book do not constitute or imply endorsements by the author or publisher.

    The case studies and examples discussed may have been modified to protect privacy and confidentiality. Any resemblance to actual organizations, systems, or security incidents may be coincidental or used in a composite manner for illustrative purposes only.

    Information technology, cybersecurity, and artificial intelligence fields evolve rapidly. The information presented is current as of the publication date, but recommendations and best practices may change over time.

    With Profound Appreciation

    The journey of creating this work has been immeasurably enriched by the collective wisdom, unwavering support, and transformative experiences shared with remarkable individuals and organizations.

    I am deeply grateful to Comcast for providing me with an extraordinary professional home for 8½ years beginning in June 2016. Working within the CTO organization under the visionary leadership of Rick Rioboli and Paul Roach, with the exceptional guidance of Scott Adams, Junaid Butt and Srinivas Shanigaram, allowed me to witness and contribute to technological transformation at enterprise scale.

    This journey was made even more meaningful through our close partnership with Comcast's CISO organization, led by Noopur Davis and Sandra Cavazos, alongside remarkable leaders including Marco Parillo, Tony Reinert and Keith Pifko. Together, we drove the DevSecOps and Secure Development Lifecycle programs within Rick and Paul's Global Technology Organization, one of the largest software and technology engineering units within Comcast, that demonstrated the principles advocated throughout this work.

    The countless conversations, challenges, and triumphs shared with colleagues across this remarkable Fortune 100 organization have indelibly shaped my perspective on enterprise security transformation. Together, we navigated the continuously evolving landscape of security and privacy, progressively enhancing maturity postures in ways that demonstrated the practical application of the governance principles outlined in these pages.

    My profound thanks extend to the many security and technology leaders across industries who generously shared their experiences, challenges, and insights. Your candid perspectives on the emerging AI governance challenges facing your organizations have been instrumental in developing the frameworks presented here.

    Special appreciation goes to my family for their patience during countless evenings and weekends dedicated to research and writing, and to the dedicated professionals who contributed to bringing this work to its final form.

    This exploration of AI governance in enterprise development stands on the foundation of experiences, insights, and collaborative problem-solving shared with each of you. While words cannot fully capture my gratitude for this remarkable journey, I hope this work honors the collective wisdom you have so generously shared.

    - Haroon Mansoori,

    March 2025

    Our Recommendation

    For maximum value from this Executive Decision Brief, consider acquiring the premium hardcover edition alongside this digital version. The physical book features dedicated spaces for executive assessments, commitment statements, and governance frameworks that can be completed in ink—turning insights into actionable security strategies for your organization's AI transformation journey.

    Executive Briefing Synopsis

    Navigating The Dual Edge of Autonomy and Complexity in Development

    Synopsis

    This Executive Decision Brief examines the profound transformation of enterprise software development through AI agents and Agentic AI. Unlike theoretical treatments, this is a hands-on transformation handbook designed specifically for technology executives navigating these unprecedented challenges. We explore how automated artificial intelligence (AI) pipelines are creating increasingly autonomous development ecosystems while generating unprecedented complexity in code, dependencies, and security governance. The briefing highlights how traditional oversight mechanisms, threat modeling approaches, and security frameworks are becoming obsolete in the face of these technological shifts, culminating in a call for global collaboration to develop new governance paradigms suitable for the age of AI-driven development.

    Through practical assessment tools, executive decision exercises, and a comprehensive implementation framework, this brief guides CISOs and CTOs through the process of evaluating

    Enjoying the preview?
    Page 1 of 1