The Agentic Transformation: Re-Architecting the IT Operating Model for the Autonomous Era
Franklin Donahoe Franklin Donahoe

The Agentic Transformation: Re-Architecting the IT Operating Model for the Autonomous Era

This article argues that the transition is not only feasible but also represents the logical evolution of the Product-Centric IT Operating Model. By moving from a "Human-in-the-Loop" to a "Human-on-the-Loop" architecture, organizations can decouple operational capacity from human headcount. The emerging model, termed here the Agentic-Enabled Product-Centric Model, leverages a "Superagency" framework in which a small human team directs a vast fleet of specialized AI agents to execute end-to-end value streams.

Read More
Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

The Strategic and Technical Analysis of Model Context Protocols

This article provides a strategic and technical analysis of the Model Context Protocol (MCP), an open standard introduced by Anthropic in November 2024. It explains how MCP enables AI systems, particularly large language models (LLMs), to securely and reliably communicate with external data, applications, and services, transforming them from static knowledge bases into dynamic, agentic "doers." The document details MCP's foundational architecture, its client-server-host model, and the use of "primitives" like tools, resources, and prompts. It also discusses the business value proposition of MCP, including mitigating hallucinations, increasing utility, fostering a plug-and-play AI ecosystem, and key enterprise use cases. Finally, the article assesses the risks and limitations of MCP, such as prompt injection and architectural challenges, and outlines the competitive landscape, highlighting its rapid adoption by major players like OpenAI, Google, and Microsoft as a de-facto standard for the agentic AI era.

Read More
Franklin Donahoe Franklin Donahoe

The Evolving Chief Information Security Officer

This article details the transformation of the CISO role since 1995. It highlights the shift from a reactive, technical position to a strategic leadership role, driven by technological advancements, increasing cyber threats, and regulatory pressures. It emphasizes the modern CISO's need for business acumen, communication skills, and cross-functional collaboration to quantify cyber risks, influence decision-making, and foster a security-conscious culture, ultimately positioning the CISO as a vital enabler of business growth and resilience.

Read More
Franklin Donahoe Franklin Donahoe

Charting the Course for Next-Generation AI-Enabled Cybersecurity GRC

This article outlines persistent challenges in the GRC domain, such as risk quantification, auditor collaboration, and engaging management. The document then proposes a transformative, AI-enabled GRC program delivered as a service, detailing how AI can revolutionize governance, risk management, and compliance through capabilities like predictive analytics, automated monitoring, and intelligent policy management. Finally, it explores the rationale for GRC-as-a-Service, its components, advantages, and the requirements for successful implementation, emphasizing the need for strong data foundations, scalable AI infrastructure, workforce readiness, and ethical AI governance.

Read More
Franklin Donahoe Franklin Donahoe

A Strategic Imperative for Enterprise Post-Quantum Cryptography Readiness

This article discusses the urgent need for enterprises to adopt Post-Quantum Cryptography (PQC) due to the impending threat of cryptographically relevant quantum computers and the "harvest now, decrypt later" attack model. It outlines a comprehensive PQC readiness approach, including cryptographic agility, a phased migration framework, robust governance, and third-party risk management. The article details PQC algorithms and the NIST standardization process, provides a phased migration framework with data prioritization tiers, highlights the role of Hardware Security Modules (HSMs), and addresses the impact of PQC on applications, browsers, transmissions, and storage. Finally, it covers global compliance frameworks and regulatory landscapes, and acknowledges the challenges in PQC adoption, such as resource overhead, interoperability, expertise gaps, and cost implications.

Read More