45 terms · 15 view

Aetos

organization

Aetos assists in configuring compliance software to translate technical requirements into competitive sales advantages.

AI Governance

concept

The framework and processes for overseeing the use of artificial intelligence, ensuring compliance with regulations and ethical standards.

Also known as:Artificial Intelligence Governance
Related articles

Algorithmic Disgorgement

concept

A regulatory penalty that requires a company to delete AI models and related algorithms trained on unlawfully collected or improperly used data, preventing companies from profiting from privacy violations.

Related articles

Algorithmic Transparency

concept

The practice of making the operations and decision-making processes of algorithms clear and understandable, important for compliance and governance in AI.

Related articles

Chief Trust Officer

person

An executive role responsible for overseeing an organization's trust strategies, including data privacy and AI governance.

Related articles

Compliance Debt

concept

The accumulation of postponed regulatory, operational, and business requirements that startups defer during rapid growth, which incurs future costs and risks, hindering business expansion.

Related articles

Control Deficiencies

concept

The lack of implementation or maintenance of necessary security controls, access management, or operational safeguards, which are part of compliance debt.

Related articles

Cyber Insurance Application

process

A document or process where a company provides information about its security controls and practices to an insurer, forming the basis for the insurance agreement.

Related articles

Data Lifecycle

concept

The stages through which data passes, from initial collection to eventual deletion or archival.

Related articles

Data Privacy

concept

The practice of managing and protecting personal information throughout its lifecycle, from collection to use.

Related articles

Data Provenance

process

The process of tracking and documenting the origin and history of data, crucial for ensuring compliance and mitigating risks of algorithmic disgorgement.

Related articles

Data Security Posture Management (DSPM)

concept

A strategy for assessing and improving the security measures in place to protect data within an organization.

Related articles

Data Sourcing Decisions

process

Choices made regarding the provenance, minimization, consent, and privacy by design of data before collection or model training begins.

Related articles

Data Subject Access Request (DSAR)

process

A request made by an individual to an organization to access their personal data that the organization holds.

Also known as:DSAR
Related articles

Deferred Audits

concept

The postponement of internal audits, third-party security assessments, or reviews of vendor compliance, contributing to compliance debt.

Related articles

Dependent Vendor Outage

concept

A situation where a business interruption occurs due to a failure or outage in a third-party vendor's systems, often requiring additional policy endorsements for coverage.

Related articles

Documentation Gaps

concept

The failure to document internal processes, security controls, or data handling procedures, contributing to compliance debt.

Related articles

Evolving Standards

concept

The failure to keep pace with new industry standards, best practices, or changes in customer requirements, which can contribute to compliance debt.

Related articles

External Scanning

process

The use of tools by insurers to assess a company's public-facing security controls and verify the accuracy of information provided in the insurance application.

Related articles

Federal Trade Commission (FTC)

organization

A U.S. regulatory body that enforces laws against deceptive or unfair business practices, including those related to data privacy and algorithmic disgorgement.

Related articles

Fractional Chief Trust Officer (fCTO)

person

An operational leader who designs trust architecture, manages vendor risk, and handles complex security questionnaires, complementing automated software.

Related articles

Fruit of the Poisonous Tree

concept

A legal principle dictating that evidence derived from an illegal source is inadmissible, used in the context of AI to mean that algorithms trained on unlawfully obtained data must be destroyed.

Related articles

Google Dataplex

product

Google Dataplex is a cloud-native governance platform providing convenient data governance within Google cloud environments.

Related articles

Governance By Design

concept

A philosophy where AI governance is made intrinsic to product development from inception, ensuring ethical considerations and regulatory compliance are embedded from the start.

Related articles

Investor Confidence

concept

The trust and assurance investors have in a startup's ability to manage risks and comply with regulations, often enhanced by robust AI governance practices.

Related articles

Investor Due Diligence

process

The comprehensive appraisal of a business by a prospective buyer or investor, particularly to establish its assets and liabilities and evaluate its commercial potential.

Related articles

Model Drift

concept

The phenomenon where a machine learning model's performance degrades over time due to changes in the underlying data or environment.

Related articles

Operational Inefficiencies

concept

The increased time and resources spent on addressing issues arising from non-compliance, rather than focusing on strategic initiatives.

Related articles

Operational Narrative

concept

The strategic context explaining why a security control exists, who manages it, and how it aligns with the company’s broader risk appetite.

Related articles

Policy Exclusions

concept

Specific conditions or circumstances listed in an insurance policy that are not covered by the insurance, such as breaches originating from vendors.

Related articles

Policy Intelligence Packs

tool

Pre-configured sets of compliance guidelines and controls designed to automate adherence to specific regulatory frameworks.

Related articles

Product Velocity

metric

The speed at which a company can develop and release new products or features, which can be slowed by compliance debt.

Related articles

Reputational Damage

concept

The harm to a company's reputation due to public incidents stemming from compliance failures.

Related articles

Reputational Harm

concept

Damage to a company's reputation, which can occur from failing to implement adequate AI governance, leading to ethical breaches or regulatory penalties.

Also known as:Reputational Damage
Related articles

Sales Cycle

process

The series of predictable phases required to sell a product or service to a customer.

Related articles

Sales-Aligned Trust

concept

Positioning security as a competitive advantage that accelerates sales by aligning security programs with legal and sales goals.

Related articles

Security Patching Delays

concept

Delaying updates and patches for software and infrastructure, leaving systems vulnerable and contributing to compliance debt.

Related articles

Security Theater

concept

A state where a company has compliance badges but lacks the internal culture or expertise to defend their security posture during a live interrogation.

Related articles

Technical Evidence

concept

Raw data such as logs, screenshots, and system configurations that prove a security control is technically active.

Related articles

Trust Intelligence

concept

A comprehensive approach to integrating privacy and security workflows to build trust in data handling processes.

Related articles

Vendor Breach

concept

A cyber incident that originates from a third-party vendor or service provider but affects the insured company's data or operations.

Also known as:Third-Party Breach
Related articles