Application Discovery it risk assessment ai policy ai writing generators cobit block confidential data network security tool data loss prevention. Shadow IT software inventory managing ai bias sora us federal compliance ai acceptable use endpoint dlp 24/7. Shadow AI Threats it operations monitoring ai model inventory sora lgpd block confidential https://johsocial.com/story11160989/detecting-genai-and-its-impact-for-it-leaders-a-ciso-s-guide-2025-guide