The Cyber Foundation + Amanda Worsfold

Clear-Headed AI Transformation for Family Offices

A practical framework for adopting AI with security, clarity, and intention. Built by practitioners who understand both the power and the risk.

Presented by Amanda Worsfold, Kasey Batterman, Ynez Arce, and Jenny Phan

This Is Not Like Going from On-Prem to the Cloud.

"The last time we had a technology that everyone thought was going to kill them was electricity."

AI is a general-purpose technology that touches every facet of how we work and live. It is not a single tool to deploy. It is a shift in how organizations think, operate, and protect themselves.

The adoption curves for large language models are breaking every rule of what we thought engagement could be on a technology product. This is happening at the pace of a global arms race. Standing still is not a neutral position.

THE REALITY RIGHT NOW

  • 50%+ of professionals are already using AI tools at work, many without organizational knowledge or policy
  • Every application on your computer is about to integrate AI capabilities, whether you planned for it or not
  • Skeptics who try AI once or twice are converted. There has never been an adoption pattern like this before
Why Family Offices Are Uniquely Positioned for AI

Natural Advantages

  • Small, agile teams (10-20 people) that can align quickly in a room
  • Budget availability to invest in the right tools and training
  • Immense data processing needs: brokerage statements, deal flow, quarterly reviews, multi-entity reporting
  • ROI is immediate and measurable: days of work compressed to minutes
  • Not about cutting headcount. There is always more to do. AI is about leverage.

Unique Risks to Manage

  • High sensitivity of family data: financial, personal, security details
  • Broad vendor ecosystems: accountants, builders, attorneys all touch sensitive data
  • Complex principal dynamics: privacy-focused individuals with varying risk appetites
  • Shadow AI use is already happening among staff and external partners
  • The smaller the circle of trust, the larger the impact of a single breach.
Where are you today?

Do you know which AI tools your team members are already using on their own?

Does your organization have an AI use policy in place today?

Have you mapped which vendors and external partners are using AI with your data?

Is there a mandate from your principals, or is this driven by operations?

Your Team Is Already at the Party

Shadow AI use is prevalent. Over half the workforce is using AI tools without organizational knowledge, direction, or discretion. If you are not providing AI tools, your people are finding their own.

The Risk

  • Free-tier tools train on your data
  • No visibility into what is being shared
  • No standardization across the team
  • Consumer tools lack enterprise protections

The Analogy

  • Your teenager is going to go out
  • The answer is not to lock the door
  • Share your location. Call if you need a ride.
  • Know what you are walking into

The Imperative

  • Provide sanctioned, enterprise-grade tools
  • Establish acceptable use policies now
  • Create a safe environment to explore
  • Move from shadow use to informed use
Five Phases of Clear-Headed AI Transformation
PHASE 1
ASSESS
Understand where you are
PHASE 2
SECURE
Build your foundation
PHASE 3
ACTIVATE
Empower your people
PHASE 4
OPTIMIZE
Build intelligent workflows
PHASE 5
EVOLVE
Stay ahead of the curve

Each phase builds on the last. Skip steps at your own risk. But move deliberately, not slowly.

PHASE 1

ASSESS: Understand Where You Are

Discovery Audit

  • What tools does every team member currently use?
  • Where is shadow AI already present?
  • What are your critical data flows and who has access?

Emotional Readiness

  • Who are your early adopters and champions?
  • Who are the skeptics and what are their concerns?
  • Is there a mandate from principals or is this staff-driven?
  • What does each stakeholder need to feel safe?

Team Dynamics & Vendor Review

  • Understand the unique decision-making hierarchy
  • Assess varying risk appetites across family and staff
  • Map all external partners handling sensitive data
  • This is the canary in the coal mine.
PHASE 2

SECURE: Build Your Foundation

If you do not have a good cyber foundation, you should not be layering on an AI transformation project.

AI Use Policy

  • No PII in any AI tool, period
  • No consumer-grade free tools for work
  • Require enterprise-grade licenses for all AI tools
  • Have every team member sign the policy
  • Review and update quarterly

Tool Selection & Security

  • Microsoft shop: activate Copilot (included)
  • Google shop: activate Gemini (included)
  • Supplement with Claude for advanced use cases
  • Enterprise licenses = no model training on your data
  • Do not buy random AI products

Data Foundation

  • Map all data flows across systems
  • Document permission structures
  • Establish which data can and cannot enter AI tools
  • AI transformation forces the security reckoning many offices have deferred
PHASE 3

ACTIVATE: Empower Your People

Your ability to empower people to make their own decisions is critical to success.

Baseline Training

  • What is an LLM? What is prompting?
  • Why we care and how it helps your role
  • This is not here to replace you. It gives you leverage.
  • Address fears directly with the electricity analogy

Find Your Champions

  • Identify early adopters who experiment naturally
  • Create lunch-and-learn peer sharing sessions
  • Champions convert skeptics through demonstration
  • The amazing use cases will surface organically

Guided Exploration

  • Let people use AI as a thought partner in daily work
  • Assistants: calendaring, email summaries
  • Analysts: document synthesis, data distillation
  • Meet people where they are. One thing at a time.
PHASE 4

OPTIMIZE: Build Intelligent Workflows

Data Layer Security

  • Permission structures for AI agent access
  • Role-based access controls for AI tools
  • Audit trails for all AI-processed data

Workflow Automation

  • Deal flow analysis and summarization
  • Quarterly report synthesis across holdings
  • Brokerage statement standardization
  • Executive briefing preparation

Agent Systems (2026+)

  • AI agents that act autonomously in your environment
  • Critical: how to cordon access for autonomous agents
  • Build a trust architecture for intelligent systems
PHASE 5

EVOLVE: Stay Ahead of the Curve

The floor is shifting underneath us. SOC 2 alone cannot keep pace. The rules are changing faster than compliance frameworks can adapt.

The Coming Wave

  • Every app will embed AI: Zoom, Grammarly, your accounting software
  • These tools will expand their access to bring you more value, creating new risk surfaces
  • A tool like Zoom may soon access your files, email, and calendar in real time
  • You will not always know what these tools are prompting their own AI models to do

Your Ongoing Practice

  • Regular vendor AI capability reviews
  • Quarterly reassessment of tools and policies
  • Monitor industry developments and compliance shifts
  • Evaluate external partner AI practices
  • Build internal knowledge continuously
  • Stay connected to trusted advisors in this space
What is your next move?

Which phase of this framework does your office need to focus on first?

What would it take to get your entire team in a room for a one-hour AI orientation?

Can you identify one workflow that would benefit from AI this quarter?

Who do you need buy-in from to move forward with confidence?

Three Tiers of AI Risk in Your Environment
TIER 1

Your Home Base AI

The tools you deliberately choose and deploy. Claude, Copilot, Gemini. You control the license, access, and policy.

  • Enterprise licenses with data privacy guarantees
  • Signed acceptable use policies
  • Known, auditable data flows
TIER 2

Third-Party AI Integrations

Tools you use that are adding AI on their own. Transcription apps, accounting software, browser plugins.

  • Expanding access without explicit consent
  • Data processing you did not plan for
  • Vendor vetting becomes continuous
TIER 3

Autonomous AI Agents

Systems with latitude to act in your environment. Making decisions, accessing files, running processes.

  • Agents making decisions you did not authorize
  • Trust boundaries that did not exist before
  • The threshold we will cross this year
The Four-Question Vendor Test

Before any new AI tool enters your environment, ask these four questions.

1

Do they have SOC 2 compliance?

The minimum bar. If a vendor cannot show SOC 2, the conversation is over.

2

Do they have a Data Processing Agreement?

A DPA tells you how they handle your data, where it goes, and what rights you retain.

3

Will they train their models on your data?

Enterprise tiers guarantee they will not. Free tiers make no such promise.

4

What access does this tool actually need?

A grammar tool does not need your financial documents. Question every permission.

TOOL RECOMMENDATIONS

  • Microsoft environment: Activate Copilot (included with license)
  • Google Workspace: Activate Gemini (included with workspace)
  • For advanced analysis: Claude Enterprise (Anthropic) — designed for business, principled AI safety
  • Avoid: Free consumer tools, unvetted third-party AI, Grok (no guardrails, ethical concerns)
Clear-Headed Does Not Mean Slow
FROM
TO
"Just use it and figure it out"
-->
Deliberate adoption with a framework
"We will wait until it settles down"
-->
We will prepare now while the ground is shifting
"Our IT team will handle this"
-->
This requires organizational leadership and expert guidance
"SOC 2 is enough"
-->
Compliance alone cannot keep pace with this technology
"AI is going to replace people"
-->
AI gives your existing team unprecedented leverage
"We will buy whatever tool looks good"
-->
We will vet every tool against clear principles
What You Can Do Starting Now

This Week

  • Audit which AI tools are already in use across your team
  • Confirm your workspace AI features are activated
  • Begin drafting an AI acceptable use policy

This Month

  • Hold an all-hands AI orientation session
  • Deploy enterprise AI licenses to every team member
  • Identify your first two AI champions
  • Start mapping your critical data flows

This Quarter

  • Complete vendor ecosystem AI review
  • Pilot one high-value AI workflow
  • Establish regular review cadence for tools and policies
  • Evaluate external partner AI practices
AI Transformation Strengthens Your Security Posture

The process of preparing for AI forces you to do the foundational security work that most family offices have deferred. These efforts feed each other.

AI interest drives audit

Mapping tools and data flows for AI readiness is itself a security practice

Audit reveals shadow use

You discover what is already happening and where the gaps are

Gaps drive policy creation

AI use policies establish guardrails that protect the entire organization

Policy enables safe adoption

With clear rules, teams adopt with confidence instead of fear

Adoption generates insights

Power users surface new use cases and new risks simultaneously

Insights strengthen controls

Each iteration makes your security posture and AI capability more mature

Before you leave this page

What is the single most important thing you learned today?

What is one action you can take tomorrow morning?

Who on your team needs to see this framework?

Who Built This Framework

Amanda Worsfold

AI Strategy & Implementation

20 years in digital transformation. Former Chief Product Officer. Stanford Human-Centered AI program. Speaks three languages: business, AI, and engineering. Building AI transformation practices purpose-built for family offices.

Kasey Batterman

Cybersecurity & Critical Thinking

20+ years in cybersecurity for ultra-high-net-worth individuals and family offices. Founder of a cybersecurity startup. Brings the critical lens to every new technology and the practical wisdom of navigating family office dynamics.

Ynez Arce

The Cyber Foundation

Family office operations executive turned cybersecurity advocate. Founder of The Cyber Foundation. Driven by a single standard: 100% confidence in every decision, with the best information available today.

Jenny Phan

Operations & Implementation

Hands-on family office technology implementation. Currently piloting AI rollouts across family office teams. Brings the practical lens of diverse user needs, from technical staff to domestic operations.

The answer is not to avoid AI.
The answer is to approach it with clarity.

There is a right way to do this. It is deliberate. It is structural. You would not build a house without a blueprint. Do not transform your organization without a framework.