
The Importance of Active Involvement from Local Government Leaders for a Cyber Safe Future
In today's digital age, every local government is a digital government. With the increasing reliance on information and technology,...

The Importance of the CISO
A survey by ThreatTrack demonstrates that the role of CISO is misunderstood and underappreciated by C-Level peers. It seems business...


Cybersecurity Supporting Documentation
Cybersecurity Supporting Documentation In previous posts, I outlined the required topics for cybersecurity policies and procedures. In...


Cybersecurity Procedure Coverage
In a previous post, I outlined the required topics for cybersecurity policies. In this post, I will cover the required procedures from...


Cybersecurity Policy Coverage
What topics need to be covered in cybersecurity policies? In this post, I will cover the required cybersecurity policies from various...

Who should setup access in the ERP (Financial Application)?
As an IT auditor for local governments, one of the most often asked questions I get during audits is this: “Who should set up user access...


What Should be in a Good Cybersecurity Policy
I often get called in to evaluate cybersecurity documentation, more specific policies and procedures. One of the concerns is what to...

Policy, Procedure, or Plan
Some standards like PCI and NIST require policies that cover specific topics. Sometimes you will see a requirement for a policy and...

IT Governance & IT Management
Many practitioners use these terms governance and management synonymously. While there is some overlap in practice, there are key...

Cybersecurity Policies Made Easy
People often ask for advice regarding information security or cybersecurity policies. For the remainder of this article, I will use...