About Topics Framework Speakers Contact Us
ISACA Conference  |  Featured Session

The AI-Driven
Development Lifecycle
& Secure Agentic
Architecture

A deep-dive into the first AI-native software engineering methodology built from first principles — exploring how autonomous AI agents transform development, security, and governance.

📅
Date
TBA — 2025
📍
Location
ISACA Chapter Event
Format
Conference Session
🎓
CPE Credits
Available
Scroll
5
Framework Layers
20h
Avg. Time-to-Exploit
AI-DLC
Methodology Focus
TEVV
Continuous Validation

What is AI-DLC?

The AI-Driven Development Lifecycle is a reimagined, AI-native software engineering methodology built from first principles. Unlike traditional Agile methods that retrofit AI into human-centric workflows, AI-DLC optimizes for AI's speed, flexibility, and iterative planning capabilities — placing humans in the role of strategic approvers rather than task executors.

AI-Native
First Principles Design

Reimagining Software
Engineering for the AI Era

Traditional development methodologies were designed for human-centric workflows. This session introduces a framework purpose-built for autonomous AI agents, where humans focus on risk, governance, and strategic validation.

  • Reverse the conversation — AI initiates and decomposes high-level business goals (Intents) into actionable sub-tasks. Humans validate.

  • Bolts over Sprints — Multi-week sprints are replaced by rapid, high-intensity "Bolt" cycles measured in hours or days.

  • 👀

    The Human as Loss Function — Humans catch errors at strategic decision points, pruning waste before it propagates into generated code.

  • Converged AI Builders — Developers transcend silos (frontend, backend, security) to focus on high-value architectural decisions.

Key Concepts Covered

This session explores the critical frameworks, risks, and governance models that organizations must understand to safely adopt AI-native development.

🛡 Risk Management

AIRM — AI Risk Management

A formal, executive-sponsored program to identify, evaluate, treat, and accept risks specific to AI systems — including third-party AI service risks and defined escalation paths.

🏛 Design

Domain-Driven Design (DDD)

AI decomposes complex systems into independent, loosely coupled bounded contexts. Core business logic is modeled and validated by humans before any infrastructure code is generated.

🧰 Agent Security

The Agent Harness

The critical infrastructure of prompts, tool definitions, retrieval pipelines, and escalation logic surrounding an AI agent — audited with the same rigor as traditional access permissions.

📊 Validation

TEVV — Continuous Evaluation

Test, Evaluation, Verification, and Validation tasks carried out continuously across the AI lifecycle — shifting risk management from a one-time checklist to an ongoing process for anticipating emergent risks.

📋 Supply Chain

SBOM — Software Bill of Materials

A real-time inventory tracking the provenance of all software components, AI models, and agentic resources (plugins, servers) to ensure supply chain transparency and rapid vulnerability management.

Threat Intelligence

Time-to-Exploit (TTE)

AI has compressed TTE from months to as low as 20 hours. Traditional patching windows are obsolete — organizations need machine-speed defenses and VulnOps functions that operate continuously.

Five-Layer Architecture

A structured framework that balances rapid AI development with machine-speed security — enabling a Mythos-ready defense posture.

1
💼

Governance & Risk Strategy

Establishes the formal AIRM program with executive sponsorship, integrating AI-specific risks into Enterprise Risk Management. Continuously maps AI activities to evolving regulatory standards including the EU AI Act and GDPR.

AIRM ERM GR-05 EU AI Act GDPR
2
🔍

Contextual Scoping & Design

Development begins with an Intent — a high-level statement of purpose — which AI breaks down into Units. Mob Elaboration condenses weeks of traditional planning into hours. DDD ensures business logic is validated before code generation begins.

Intents Units Mob Elaboration DDD Design-First
3
🔐

Secure Agentic Architecture

Systems are evaluated by behavioral traits (Control, Interaction, Perception, Tool Usage). A Broker-Mediated Pattern places a control layer between agents and APIs — enforcing schemas and closing the Request Intent vs. Syntax Validation Gap. All agents operate under Least-Privilege Machine IDs.

Trait-Based Analysis Broker Pattern Least-Privilege Machine IDs
4
🔧

Integrated Development Pipeline

Mob Construction iteratively transforms Units into Deployment Units. Every code change passes an LLM-powered security review before merge. Software Minimization reduces patching overhead, while VulnOps continuously discovers and patches zero-day vulnerabilities at machine speed.

Mob Construction AI Security Review Software Minimization VulnOps
5
📈

Continuous Measurement & Response

AI continuously analyzes production telemetry to predict SLA violations. Incident response playbooks execute at machine speed with pre-authorized containment. Deception capabilities (AI honeypots, decoy APIs, canaries) detect adversaries by their TTPs. Real-time SBOM and TEVV track drift.

Proactive Observability Machine-Speed Response Honeypots TEVV Live SBOM

Meet the Presenters

Industry practitioners from M&T Bank bringing real-world experience in AI governance, secure architecture, and enterprise risk management.

OL
Othniel Lambert
AI & Cybersecurity Leader
M&T Bank

A seasoned practitioner at the intersection of AI governance, enterprise risk, and cybersecurity. Brings deep expertise in AI-native development methodologies and secure agentic systems to forward-thinking organizations.

Connect on LinkedIn
DW
Dan Woytowich
Senior Technology Professional
M&T Bank

A technology and security professional with extensive experience building and securing enterprise-grade systems. Brings a practitioner's perspective on implementing AI-driven architectures within complex regulated environments.

Connect on LinkedIn

Ready to Learn More?

Interested in this session, follow-up discussions, or bringing this framework to your organization? Reach out to our team at Astrum Group Inc.