Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

AI can write code, but the CIOs still owns the operating model

AI is moving into the enterprise faster than most organizations are prepared for it. What began as experimentation with chat interfaces and narrow use cases is now showing up in real workflows, productivity tools and early agentic capabilities that are becoming part of how work gets done.

That shift is creating a new challenge for CIOs.

The question is no longer whether the business wants AI. It is how the enterprise is going to govern what the business is already using.

I am seeing the same pattern repeat across organizations. Business teams are drawn to speed, convenience and immediate productivity gains. Employees are finding their own ways to summarize meetings, draft communications, analyze data, generate code and automate workflows on their own. From their perspective, AI feels like acceleration. From IT’s perspective, it can look like a more visible version of shadow IT.

That tension is real. IT can easily be cast as the function slowing everything down. In practice, CIOs are often the ones looking across the full risk picture, including cybersecurity exposure, data leakage, identity controls, auditability, workflow approvals and accountability when AI moves from suggestion to action. That is why the operating model still matters. Governance is part of it, but the bigger issue is deciding how AI enters the enterprise, how decisions get made, who owns outcomes and where accountability sits. Once AI starts influencing workflows, decisions and shared data, the conversation has to expand beyond the tool itself. It becomes a broader enterprise question about how AI is introduced, where accountability sits and how the usual concerns around security and risk are applied when the technology is more visible and moving more quickly than most other tools.

The harder challenge is bringing AI into the enterprise without losing control.

Most organizations no longer need to be convinced that AI matters. The harder problem is bringing it into the enterprise without losing control.

The shift becomes more practical once AI moves beyond individual productivity and into business processes. A tool that helps summarize a meeting is not the same as a tool that reviews a dashboard and recommends a decision. A tool that pulls approved data for reporting is not the same as one that moves files, triggers downstream tasks or approves an exception.

That is where the risk profile starts to change.

In my experience, the real challenge is deciding which use cases can move quickly and which ones require tighter control. If everything is forced through a heavyweight architecture review, the business may look for other ways to move forward outside of IT. If everything is waved through because it looks lightweight, risk accumulates quietly until it becomes an operational problem.

The excitement is real, and so is the pressure to move fast. But enterprise readiness is not determined by how quickly a tool can be turned on. It is determined by whether the organization understands what the tool touches, what it can influence and who is accountable when it fails.

Governance has to move faster without losing control.

Many governance models fail because they are too rigid for the speed of modern technology adoption. AI will expose that weakness faster than almost anything else.

That does not mean governance should be relaxed. It means governance has to become practical enough to keep up with how AI is actually being used. NIST’s AI Risk Management Framework is useful here because it treats AI risk management as an organizational discipline, not a one-time control exercise.

The first step is to evaluate AI use cases by what they can do, not just what they are called. I look at three questions. What data can the tool access? What action can it take? What is the consequence if it gets it wrong?

If an AI capability is only reading approved information and helping a user retrieve or summarize it, that is one level of criticality. If it is drafting content that a human reviews before release, that is another. If it is making recommendations tied to audits, financial controls, customer commitments or regulated activity, the bar needs to rise quickly. And if it can move files, trigger workflow changes, approve transactions or interact with production environments, it should be treated very differently.

The difference becomes even clearer in practical cases. Hosting shared dashboards in a managed cloud environment is not the same as allowing an AI agent built on a personal desktop to connect to enterprise data and take action. One is a managed environment that can be governed through identity, access, logging and platform controls. The other may begin as individual experimentation, but it quickly becomes an enterprise issue if it touches flawed or inconsistent data, workflow approvals or operational decisions, because bad data can lead to the wrong action being taken at scale.

This is where human-in-the-loop design still matters. Critical decisions, approvals and exceptions should not quietly drift into automation simply because the tool is capable of doing it. Someone still needs to be accountable for the decision, the audit trail and the outcome.

The same is true for core controls, where identity and access controls, logging, endpoint protection and data retention still matter. AI does not replace those disciplines. It makes them more important. That matters even more as AI starts to move beyond prompts and into action. OWASP’s guidance on agentic AI highlights emerging threats tied to autonomous workflows and multi-step actions, which is one reason governance cannot stop at the prompt layer.

Security teams are right to ask hard questions. Verizon’s 2025 Data Breach Investigations Report analyzed 12,195 confirmed breaches, the highest number the report has analyzed in a single year. That does not mean every AI tool creates breach conditions on its own. It does mean the enterprise environment is already high risk, and the same acceleration that makes these tools useful to enterprises also makes them easier for attackers to exploit, which is why organizations have to be more intentional in how they apply security and risk controls as these tools become more widely used.

The right response is not to say no, but to move with the right level of control.

Low-criticality use cases should move through a lightweight path with basic security, privacy and architecture review. Higher-risk use cases should require deeper review, tighter controls and explicit ownership. The goal is not bureaucracy, but to create enough structure to prevent avoidable risk, reduce the need for mitigation later and keep AI decisions from becoming ad hoc.

AI demand needs structure, not just policy.

Most AI governance discussions stall because they stay theoretical. Policy alone will not solve this. Organizations need a practical way to evaluate AI demand before it scales.

In my experience, putting a cross-functional steering structure in place early is one of the most effective ways to govern AI demand because it creates shared accountability around decisions that go well beyond technology. Those mechanisms do not define the operating model on their own, but they are what make it actionable. They help distinguish low-risk productivity gains from higher-risk use cases that touch sensitive data, workflows or approvals.

That structure matters because not every AI request deserves the same treatment. A team asking to use AI to draft internal notes does not need the same level of review as a team asking for an agent to review contracts, approve exceptions or move documents across shared environments. The first can often move quickly with guardrails. The second requires tighter review, clearer ownership and stronger controls before it gets anywhere near production.

The intake process also needs to do more than register business demand. It needs to classify requests early. Is this a personal productivity use case, a workflow support use case or an agentic use case that can initiate or influence action? What systems or data does it touch? Is the output advisory, operational or decision-shaping? Who owns it after launch? How will it be monitored? Those questions create discipline before scale creates problems.

Just as important, the process should not end at approval. Every production use case should have a named owner, clear boundaries, logging, periodic review and a defined path for escalation when behavior drifts or risk changes. Models evolve, users adapt and business reliance grows over time. A use case that starts as low-risk can become high-impact faster than many organizations expect.

That is one reason this cannot be treated as a technology experiment alone. It has to be governed as part of the enterprise operating model.

The organizations that get this right will not stand out for moving first. They will stand out for bringing AI into the enterprise with control, clarity and accountability. That is why I believe the operating model is still the real differentiator. CIOs still decide whether AI enters the enterprise with discipline or drifts in without control.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?


Read More from This Article: AI can write code, but the CIOs still owns the operating model
Source: News

Category: NewsMay 20, 2026
Tags: art

Post navigation

PreviousPrevious post:Google talks ‘singularity’ while scaling up agentic AI for enterprisesNextNext post:The zero-trust paradox: Why systems built to eliminate trust may be destroying it

Related posts

Google talks ‘singularity’ while scaling up agentic AI for enterprises
May 20, 2026
The zero-trust paradox: Why systems built to eliminate trust may be destroying it
May 20, 2026
The SaaS reckoning: Why AI is about to reprice enterprise software
May 20, 2026
6 ways CIOs should diversify leadership skills
May 20, 2026
“사람 줄여도 ROI 안 오른다” AI 도입 기업의 착각
May 20, 2026
AI 도입 97% 시대…“데이터 준비된 기업은 5%뿐”
May 20, 2026
Recent Posts
  • Google talks ‘singularity’ while scaling up agentic AI for enterprises
  • AI can write code, but the CIOs still owns the operating model
  • The zero-trust paradox: Why systems built to eliminate trust may be destroying it
  • 6 ways CIOs should diversify leadership skills
  • The SaaS reckoning: Why AI is about to reprice enterprise software
Recent Comments
    Archives
    • May 2026
    • April 2026
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.