
The Local Government Officials Guide to Cybersecurity
Ron, Cesar, and I (Don) are currently collaborating on a new professional guide for executives in local government on the topic of...


The SEC Proposes Cybersecurity Expertise: Why Cyber Literacy is Critical for Council Members
"The SEC is proposing to force boards to do what they haven't done themselves, govern cyber risk." - Forbes The Securities and Exchange...


What's in Your Software? The Importance of Supply Chain Transparency and SBOMs
In commercials, you have heard Samuel L Jackson say, "What's in your wallet?" Can you imagine him saying, "What's in your software?" I...


Cracking the Code: Unveiling the Secrets of the Knights Templar's Authentication Methods
Encryption and Codes: A Historical Look at Authentication Methods Do you think the security measures of the past were effective enough to...


New Roles in Local Government Cybersecurity: A Guide to the CISO, BISO, CPO, and CSO
The rapidly changing cybersecurity landscape has forced local governments to reevaluate their approach to cybersecurity. With the...


Finding the Right Fit: Exploring Local Government Cybersecurity Reporting Structures
In a previous post entitled, "Why Cybersecurity Needs to be Separated from IT in Local Governments," I discussed the importance of...


Why Cybersecurity Needs to be Separated from IT in Local Governments
"The days of the CISO being completely IT-centric and as such being in a role under the CIO is gone. Managing security effectiveness and...

Three Cybersecurity Bad Practices You Should Avoid to Protect Your Organization
What Not To Do: The CISA's Bad Practices In today's digital age, cybersecurity is critical to the smooth functioning of organizations,...

The Importance of the CISO
A survey by ThreatTrack demonstrates that the role of CISO is misunderstood and underappreciated by C-Level peers. It seems business...

Prepare for Ransomware
Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack. This guide was a joint effort of...