On this page
TL;DR for the time-pressed
The first 12 months of an enterprise AI governance program are the messiest 12 months it will ever have. A formal 1-year retrospective is the difference between continuing to react and starting to operate the program by design. This template gives the CISO 12 sections to walk through with the AI Governance Committee, each with concrete inputs, owner roles, and the artefacts the board and the auditor will expect. It is grounded in the management-review obligations from ISO/IEC 42001:2023, the Govern function from NIST AI 600-1 (July 2024), the operating discipline implied by Gartner's Market Guide for AI Trust, Risk, and Security Management, and the workforce reality captured by the SANS 2024 AI Survey. Updated 2026-05-20.
Why the 1-year mark is the right moment
By the 12-month mark, an AI governance program has produced just enough evidence to be honest with itself. Year-zero is hypothesis - a policy adopted, a steering committee chartered, a pilot or two scoped, a vendor list inherited from procurement. Months three to nine are the operational shakedown - the first incidents, the first audit findings, the first contract renegotiations, the first time a business unit pushed back hard on a control. By month 12, the program has accumulated enough signal to draw conclusions: which controls actually fired, which policies the business actually followed, which vendors actually delivered, which trainings actually changed behaviour, and which risks turned out to be theoretical rather than material.
The retrospective is also a regulatory expectation in disguise. ISO/IEC 42001 clause 9.3 requires a management review at planned intervals, with mandatory inputs spanning policy adequacy, performance against objectives, status of nonconformities, opportunities for improvement, and changes in external and internal context. NIST AI 600-1 maps GV.PO and GV.OV functions to recurring review of policies, oversight, and accountability assignments. The EU AI Act Article 9 expects post-market monitoring to feed back into the risk management system at defined intervals. A 12-month retrospective is the operationalisation of all three at once. For the back-story on how the program got built in the first place, the build an AI governance program guide is the natural prequel; the 30/60/90 CISO playbook is the natural companion for year-2 planning.
Areebi research POV. The CISOs who run a structured year-1 retrospective consistently move from "AI policy on a SharePoint" to "AI control plane producing audit-grade evidence" inside year-2. The ones who skip it are still arguing about scope at month 18.
Section 1: Policy effectiveness review
The first question is whether the AI Acceptable Use Policy adopted at month zero actually shaped behaviour, or simply lived on a wiki. Policy effectiveness has two halves: the document itself (clarity, scope, enforceability) and the operational signal (rate of policy-aligned behaviour, rate of policy violations detected, time-to-remediation).
Concrete inputs to gather for this section: count of policy versions published in the year and their change rationale; count of policy-acknowledgement completions by role; number of policy violations detected and their category breakdown; mean time from violation to remediation; number of policy exceptions granted and their justification trail. The ISO/IEC 42001 evidence pack expects a documented policy with named owner, last review date, and an audit log of changes - the Areebi AI policy engine primer covers what makes a policy machine-enforceable versus prose-only.
The honest test for this section: does the most recent policy version reflect the incidents and exceptions of the past 12 months, or is it still the document that was waved through at the AI Governance Committee kickoff? Programs that have rolled the policy at least twice on the back of real signal are typically in a healthier place than programs whose policy has not changed.
Section 2: Control coverage and gap analysis
The second section measures how completely the AI estate is covered by the control set - and where the gaps remain. Coverage is multi-dimensional: every AI workload in the inventory, every data class in scope, every user population, every vendor, every interaction surface.
Concrete inputs: AI workload inventory at month 12 versus month 1, with delta analysis; percentage of workloads with documented owner, criticality tier, and risk classification; percentage of users covered by policy-enforced runtime controls (the Areebi AI runtime policy primer explains what that means concretely); percentage of high-risk data classes covered by DLP rules at the prompt layer (see the AI DLP primer); percentage of AI vendors with completed risk assessments (the AI vendor risk score tool generates the per-vendor scorecard).
The most common 1-year finding here is that coverage looks fine on the procurement-side inventory but degrades sharply against the runtime inventory - because AI features quietly enable inside non-AI SaaS, and because power users adopt new tools faster than the inventory tracks. The shadow AI hunt playbook is the operating discipline that closes the runtime-versus-procurement gap.
Section 3: Incident review and root-cause patterns
The third section is the one most programs skip and most boards ask about. A year of AI operations almost always produces some incidents - usually a small number of meaningful ones rather than a continuous stream. The retrospective is the moment to characterise them, look for patterns, and feed lessons learned back into the policy, control, and training stack.
Concrete inputs: number of AI-related incidents by severity tier; root-cause categorisation (prompt injection, output toxicity, hallucinated content used in production, data leakage to a public model, agentic system overreach, vendor outage, policy bypass); mean time to detect, contain, and resolve per category; regulatory notifications made and timelines met; lessons-learned actions opened and closed. The AI incident response runbook is the operational playbook this section reviews against; the AI incident response primer covers the underlying discipline.
A clean retrospective will name at least one incident the program would have classified differently with the benefit of hindsight - and explain why the classification logic has been updated.
Section 4: Training and awareness metrics
Training is the section where most programs have the loosest numbers, despite training being one of the cheapest controls available. The SANS 2024 AI Survey found that organisations consistently overestimate workforce AI fluency, and underestimate the gap between policy publication and policy comprehension.
Concrete inputs: training completion rate by role (developers, data scientists, business users, executives, board); pre-and-post training comprehension scores; time-since-training for each cohort; correlation between training cohort and incident rate; qualitative feedback from training delivery teams; specific scenario-based assessments (a phishing-style prompt injection drill, an exposed-data spot-check). The Areebi AI governance primer is a useful starting point for the executive cohort.
A defensible 1-year position: every employee population that interacts with AI has completed role-specific training in the last 12 months, with refresher cadence defined, and at least one scenario-based assessment has been run on the highest-risk populations.
Section 5: Vendor performance and concentration risk
The vendor section is where the program meets the supply chain reality of AI in 2026. A year of usage data tells the truth about which vendors delivered, which slipped, which had outages, which had security or compliance events, which had pricing surprises, and where the concentration risk has crept up.
Concrete inputs: top-N vendor list by spend, by usage volume, by data class touched, by criticality; vendor-level uptime and incident counts; outstanding compliance gaps per vendor (the AI vendor risk primer covers the scoring dimensions); concentration risk metrics (percentage of AI spend through the top 3 vendors, percentage of high-criticality workloads on a single foundation model provider); contract renewal calendar for the next 12 months and the negotiation positions that have emerged. The CFO AI vendor list is a useful adjacency for the cost-and-renewal view.
The most common 1-year vendor surprise is concentration risk on a single foundation model provider, often because a workload-by-workload procurement pattern accidentally accumulated into a strategic dependency that procurement never priced as such. The open source versus proprietary LLM analysis is the natural response - what would a credible fallback look like.
Section 6: Audit findings status
Section six aggregates every audit finding that touched the AI estate in the year - internal audit, SOC 2 Type II observations, ISO 27001 or 42001 surveillance reviews, regulator letters, customer audits. Each finding has a status, an owner, a due date, and a closure artefact, but the retrospective is when the pattern across findings becomes visible.
Concrete inputs: total findings opened, closed, and outstanding; findings by source and severity; mean and median time to remediation; recurring categories (the same control failing in different forms); findings that required policy or framework changes versus tactical fixes; findings that linked to vendor performance versus internal process. The SOC 2 + AI workloads guide explains how Trust Services Criteria observations on AI typically land; the ISO 42001 certification roadmap covers the surveillance-audit cadence.
Two patterns commonly emerge by month 12: a long tail of low-severity logging or evidence-quality findings (usually fixed by switching to a continuous audit log rather than reconstructing from disparate sources), and a smaller number of higher-severity findings clustering on vendor contract terms (usually fixed only by the next contract cycle).
Get your free AI Risk Score
Take our 2-minute assessment and get a personalised AI governance readiness report with specific recommendations for your organisation.
Start Free AssessmentSection 7: Regulatory drift
Regulation moved a lot in the 12 months covered by the retrospective. The EU AI Act obligations layered in across 2025-2027; DORA applied from January 2025; the Colorado AI Act takes effect from February 2026; multiple US states added laws; sectoral regulators in financial services, healthcare, education, and the public sector issued AI-specific guidance.
Concrete inputs: list of regulations that newly applied to the entity in the year; list of regulations whose interpretation changed materially; mapping from each regulation to the program's control set; gaps identified and remediation status; horizon scan for the next 12 months. The AI compliance landscape 2026 cross-jurisdiction view and the Areebi compliance hub are useful inputs; the DORA + AI and EU AI Act guides are the deep dives on two of the heaviest 2025-2026 regulations.
A defensible 1-year position is a single regulatory tracker that maps every applicable regulation to controls, training, vendor clauses, and reporting obligations - with named owners, last-reviewed dates, and a horizon scan that the AI Governance Committee discusses each quarter.
Section 8: Technology stack lessons
The eighth section is where the CISO and the platform owner debrief the technology choices honestly. Year-zero stack choices were made under heavy uncertainty; year-one is the first chance to evaluate them against operational evidence.
Concrete inputs: each major stack component (control plane, policy engine, audit log, DLP, vendor inventory, identity layer) reviewed against the criteria used at selection time; cost-versus-value analysis; integration debt accumulated; technical debt to address in year-2; build-versus-buy decisions that worked and that did not. The build vs buy analysis is the natural reference; the AI Control Plane versus AI Gateway piece is useful when the program inherited a gateway-led architecture and is now reconsidering. The AI Control Plane RFP template is the artefact to refresh ahead of any year-2 procurement.
The most common 1-year finding: components that were sourced as standalone tools have integration costs the original business case did not price, and the trajectory of the program is now towards consolidation onto a control plane that owns policy, DLP, audit, and vendor inventory in one place.
Section 9: Workforce capability and team shape
The ninth section reviews whether the team running the program has the right shape, the right skills, and the right authority. Year-zero programs are typically run as a side-of-desk activity by the CISO, a security architect, and a procurement lead. By month 12, most programs have grown into a dedicated AI Governance Lead role with clear interfaces into legal, privacy, security, data, and the business.
Concrete inputs: team org chart and headcount versus year-zero baseline; named owner for each AI use case and each AI vendor; capacity analysis (hours per week each owner spends on AI governance); skill gap analysis against the SANS 2024 AI Survey's named gap areas (LLM-specific security, prompt-injection defence, AI red teaming, AI risk assessment); succession planning for key roles. The AI red team you don't have piece is a useful reference for the most commonly under-resourced capability.
A defensible 1-year position is a documented operating model with named accountabilities, capacity sized to the workload, at least one named alternate for each critical role, and a development plan for the named gap areas.
Section 10: Board and executive confidence
The tenth section is the part most CISOs find hardest to write candidly: where does the board's confidence in the program actually sit. Confidence is a function of evidence quality, not narrative quality. A year of structured board updates produces a track record the program can stress-test against the next-quarter audit, regulator letter, or incident.
Concrete inputs: board updates delivered over the year, with cadence and average length; board decisions tied to AI risk (risk appetite statements, budget approvals, programme authorisations); director questions that recurred (what the board keeps asking); board-level risks added or removed from the corporate risk register; external assurances obtained (SOC 2 Type II, ISO 27001 surveillance, ISO 42001 certification, third-party assessments). The quarterly AI governance board reporting template is the natural artefact to align the next 12 months around; the AI governance ROI business case reframes the program in board-facing economic terms.
A defensible position: a single board paper at the 12-month mark explicitly answers "what has the program delivered, where are the residual risks, and what does year-2 need."
Section 11: Year-2 priorities
Section eleven turns the retrospective forward. Year-2 priorities should be derived directly from the prior ten sections, not freshly invented. A defensible plan has three to five strategic priorities, each with measurable outcomes, a named owner, and a target quarter.
Common year-2 themes in 2026: consolidating the technology stack from point tools onto an AI control plane; closing the runtime-versus-procurement inventory gap; completing the ISO/IEC 42001 certification cycle; building out an in-house or partnered AI red team capability; deepening incident response with AI-specific scenarios; reconciling the regulatory horizon scan with concrete control changes; institutionalising the agentic AI control surface as agentic workloads grow. The AI agent monitoring and observability guide is a useful input for the last theme; the agent governance primer covers the underlying capability.
The retrospective is the artefact that justifies the year-2 budget conversation. CISOs who do this well rarely have to argue the case from scratch; they walk in with a documented operating record and a defensible plan.
Section 12: What we would do differently
The final section is the one to write personally, not corporately. Every year-1 program has a small set of decisions that, in hindsight, would have been made differently. Capturing them explicitly - and turning them into transferable lessons for peer CISOs - is the discipline that separates a program that learns from one that just persists.
Common candidates from CISOs who have run the year-1 retrospective in 2025-2026 include: choosing a control plane earlier rather than letting point tools accumulate; insisting on per-interaction audit logs from day zero rather than retrofitting; treating shadow AI as a continuous discovery problem rather than a one-off sweep; investing in role-specific training and scenario assessments rather than blanket awareness; making the management body sponsor the program visibly from the outset; documenting the management-review cadence in the policy itself so the first review is not a one-off. The Areebi AI audit primer and the audit log overview describe what a per-interaction audit log looks like in practice.
This section is also where the retrospective doubles as an external artefact - a write-up the CISO can share with peers in the sector ISAC or with the board's external advisors. Year-1 retrospectives that are shared anonymously across a sector typically advance the entire sector's posture faster than the same lessons learned in isolation.
How to actually run the retrospective workshop
The template above is the agenda for a structured two-day workshop, not a desk exercise. The discipline that makes a retrospective useful is the same as the discipline that makes any post-mortem useful: a fixed agenda, named owners for each section, evidence-on-the-table rather than narratives, and a single written output approved by the AI Governance Committee.
A typical agenda: half a day pre-read circulated a week before; day one walks sections 1-6 with the operational owners present; day two walks sections 7-12 with the strategic owners and the executive sponsor; a draft retrospective document circulates within five working days; the AI Governance Committee approves the document within fifteen working days; the board paper version is presented at the next board meeting. The Areebi AI Governance Assessment includes a maturity scoring rubric that maps onto these twelve sections, which several customers have used as the pre-read framing for their own workshop.
For programs that prefer to consume the assessment as a sequenced engagement, the Areebi platform and the Areebi trust centre are the substrate that makes the evidence collection routine rather than one-off - the per-interaction audit log, the policy version history, the vendor inventory, and the DLP exposure metrics all populate the retrospective sections automatically.
What to read next
From retrospective to year-2 operating plan, this cluster is the natural path.
- Quarterly AI governance board reporting template - the artefact that operationalises section 10 every quarter.
- CISO AI governance playbook 30/60/90 - the year-2 sequencing if the program is consolidating.
- How to build an AI governance program - the year-zero blueprint to reread with year-1 eyes.
- State of AI governance, May 2026 - the cross-program benchmarking view.
- ISO/IEC 42001 12-month certification roadmap - the certification track for programs ready to pursue formal external assurance.
Frequently Asked Questions
Who should run the 1-year AI governance retrospective?
The CISO or AI Governance Lead owns the agenda and drafts the document, but the workshop must include the legal, privacy, data, procurement, and business representatives who have sat on the AI Governance Committee through the year. The executive sponsor (typically the CIO, CTO, or CEO depending on company shape) approves the final document, and the board reviews the summary version. ISO/IEC 42001 clause 9.3 frames this as a management review, which is precisely the right escalation profile.
How long does a 1-year retrospective workshop take?
A structured workshop runs across two working days for the full agenda, plus roughly five working days of pre-read preparation and another ten to fifteen working days to finalise the document and the board paper. Programs that try to compress it to a single day routinely skip sections 6 (audit findings) and 11 (year-2 priorities), which are exactly the sections the board pays attention to.
Is the retrospective the same as an ISO/IEC 42001 management review?
It satisfies most of the same inputs and outputs, and several programs use this template as the management-review record for their AI management system. ISO/IEC 42001 clause 9.3 mandates specific inputs (status of previous actions, changes in external and internal context, performance of the AI management system, audit results, fulfilment of objectives, status of nonconformities, and opportunities for improvement). Sections 1, 2, 6, 7, and 11 of this template map directly; sections 3, 5, 8, 9, 10, and 12 add operational depth that the clause does not require but most management bodies appreciate.
What does a defensible board paper look like at the 12-month mark?
A defensible board paper is four to six pages, follows the structure: a one-paragraph executive summary, a results-versus-objectives table, a risk heatmap, a forward calendar of regulatory and audit milestones, a year-2 priorities slide, and an asks-and-decisions section. The board paper version of the retrospective should not require the directors to read the underlying 30-page document. The Areebi quarterly board reporting template is designed to mesh with this retrospective at the annual cadence.
What if the program is younger than a year - say 6 months in?
Run a half-day mid-year retrospective using sections 1, 2, 3, and 11 only, treating the output as a milestone check rather than a formal management review. The full 12-section template depends on having enough operational evidence (incidents, audits, vendor renewals, training cycles) to draw conclusions; younger programs do not yet have that body of evidence and should not pretend to.
Does this template work for programs that have not yet been certified to ISO/IEC 42001?
Yes. The template is grounded in the management-review discipline that ISO/IEC 42001 codifies, but the underlying retrospective is useful regardless of certification status. Programs that intend to pursue 42001 certification in year-2 should run the template once in advance and then use the certification audit as the external validation of the management-review record.
How does the retrospective connect to the next year's budget cycle?
Section 11 (year-2 priorities) is explicitly the input to the next budget cycle. CISOs who have run this retrospective consistently report that the year-2 budget conversation moves from defensive justification to plan execution, because the retrospective has documented the operating record and the residual risk profile that the priorities are addressing. Pair the retrospective with the Areebi AI governance ROI business case for the economic framing.
Related Resources
- Build an AI Governance Program
- CISO AI Governance Playbook 30/60/90
- Quarterly Board Reporting Template
- AI Incident Response Runbook
- AI Policy Engine Primer
- AI Runtime Policy Primer
- AI DLP Primer
- AI Vendor Risk Primer
- AI Audit Primer
- AI Incident Response Primer
- AI Vendor Risk Score Tool
- Areebi Platform
- Audit Log Overview
- Areebi Trust Centre
- Compliance Hub
- AI Governance Assessment
Stay ahead of AI governance
Weekly insights on enterprise AI security, compliance updates, and governance best practices.
Stay ahead of AI governance
Weekly insights on enterprise AI security, compliance updates, and best practices.
About the Author
Areebi Research
The Areebi research team combines hands-on enterprise security work with deep AI governance research. Our analysis is informed by primary sources (NIST, ISO, OECD, federal registers, IAPP) and the operational realities of CISOs running AI programs in regulated industries today.
Ready to govern your AI?
See how Areebi can help your organization adopt AI securely and compliantly.