What are your preferred tactics for building effective collaboration on cross-functional teams involved in AI governance and risk management (e.g., joint steering committees, shared KPIs, etc.)? Which roles are currently involved?

634 viewscircle icon1 Upvotecircle icon6 Comments
Sort by:
Director of Information Security3 hours ago

We put in place a multi disciplinary commitee to ensure that all actors are well aligned. There is a profesional commitee and an executive one to ensure to take the decision at the right level.

Director Global Infrastructure Architecture and Network Ops in Healthcare and Biotecha month ago

I focus on a mix of structured and collaborative approaches. Regular joint steering meetings with IT, cybersecurity, compliance, legal, data science, and business leaders help align priorities and risk tolerance. Shared KPIs keep everyone accountable, while smaller working groups tackle specific areas like data quality or model validation. Open communication and transparency are key, so issues are surfaced early and teams stay coordinated.

Director Information Security & Trusta month ago

At Salona, collaboration typically occurs one to two levels below the C-suite. These individuals are responsible for conducting risk assessments and determining the appropriate course of action for the company. C-level executives are brought in when risk acceptance decisions need to be made or when a risk is deemed too high for the business to accept.

Collaboration across teams is essential for effective AI governance and risk management. Our risk team works with every department; our governance and compliance team collaborates with all groups that have control responsibilities, and our application security team partners closely with developers. If any team operates in a silo without collaborating with others, it raises important questions about their role and integration within the organization.

Chief Information Security Officera month ago

As CISO, building cross-functional relationships is a primary responsibility. At Hoag Health System, we have a governance group specific to risk, called ITRC. This group is multi-purpose and can pivot to address AI technology, standardized architecture, and other topics as needed. The composition of the group varies depending on the business unit or program, as risk thresholds are not uniform across the organization.

Compliance-driven processes are straightforward, as we follow regulatory requirements and assess whether we are secure or simply compliant. Our cross-functional teams include roles such as the Chief Digital Officer, whom I meet with regularly. We employ a shift-left methodology, involving my team at the project initiation stage to assess risk and review contractual agreements. This early engagement ensures that risk management is embedded from the start.

Director of Engineeringa month ago

We have established a council that brings together executives from various areas, including the CIO, CEO, legal counsel, and other relevant entities. This council evolved from our data governance board, and some members participated in both groups. The framework has proven effective, so we spun it off to ensure we have the right stakeholders involved in AI governance.

Our approach is not about prohibiting innovation, but rather about understanding and supporting it. The council helps clarify the controls we are implementing and the reasons behind them. Much of our early work focused on education, especially in defining technical terms for non-technical participants. Over time, the process has become more aligned with business objectives and goals, moving away from ad hoc requests to a more structured and strategic approach. Collaboration has strengthened, and the need for strategic relationships with C-level executives has increased as AI becomes more integrated into our daily operations and strategy.

Content you might like

Yes

No – I need to spend more time on cyber strategy

No – I’m currently spending too much time on cyber strategy 100%

Unsure

View Results

Weak passwords8%

Lack of consistent update or patch processes37%

Unsecured network services37%

Outdated or unsecured IoT app components8%

Unsecured data storage and transfer5%

Something else (comment below)3%

View Results