David Wolf · Portfolio Use Case
A book about the stories that shape how people think, build, and govern AI security.
MYTHOS examines the dominant narratives — the myths, metaphors, and mental models — that shape how security teams, executives, and builders approach AI risk. It is both a critical framework and a practitioner's guide for rewriting dangerous stories.
Client
aisecurity.llc
Engagement Type
product
Period
2026
Role
Author, narrative architect, editor
Focus Areas
AI security narrative, Myth-breaking frameworks, Governance evidence
The Context
MYTHOS is the executive handbook for the post-Mythos operating model. It translates public capability signals into a practical product-security narrative.
The Challenge
Leaders need a way to explain accelerated weaponization and governance pressure without overclaiming or turning public signals into breach claims.
What I Did
The Outcome
The result is a book-length artifact that gives the portfolio a clear point of view on AI product security while keeping the public claim boundary explicit and conservative.
Around
The post-Mythos product-security operating model
As
A companion to the Handbook and Field Guide
Key Deliverables
Client
aisecurity.llc
Engagement Type
product
Period
2026
Role
Author, narrative architect, editor
Focus Areas
AI security narrative, Myth-breaking frameworks, Governance evidence
The Context
MYTHOS is the executive handbook for the post-Mythos operating model. It translates public capability signals into a practical product-security narrative.
The Challenge
Leaders need a way to explain accelerated weaponization and governance pressure without overclaiming or turning public signals into breach claims.
What I Did
The Outcome
The result is a book-length artifact that gives the portfolio a clear point of view on AI product security while keeping the public claim boundary explicit and conservative.
Around
The post-Mythos product-security operating model
As
A companion to the Handbook and Field Guide
Key Deliverables
At a Glance
Focus Areas
Tools & Technologies
Evidence & Artifacts
Public-Safe Caveat
Based on analyzed public signals and original research. Not proof of any individual's or company's internal state.
David Wolf
AI Security · Product Security · Security Leadership
Based on analyzed public signals, not proof of any individual's or company's internal state.