Policy, Procedure, or Plan
Some standards like PCI and NIST require policies that cover specific topics. Sometimes you will see a requirement for a policy and...
IT Governance & IT Management
Many practitioners use these terms governance and management synonymously. While there is some overlap in practice, there are key...
Cybersecurity Policies Made Easy
People often ask for advice regarding information security or cybersecurity policies. For the remainder of this article, I will use...
Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...
CIS Controls Version 7 Launch Event
CIS Controls Version 7 Launch Event | March 19th 2018 Shady DOM styles for custom-style Shady DOM styles for dom-template Shady DOM...
TU Office 365 Secure Score
In this session we cover the Office 365 Secure Score and take a tour of the security and compliance center in Office 365. These tools go...
TU Microsoft's Cloud Compliance Manager
Microsoft newest tool allows Office 365, Dynamics 365, and Azure users track compliance and see what Microsoft has done. Cybersecurity...
That's Not the Way Things Work in Government
"That's not the way things work in government." This is the catch all excuse for not doing what needs to be done in the government. The...
Maze Live 2016 Cyber-security for Local Governments
I spoke at a recent day long conference and here is the recording of that session. Session description: Is your organization doing enough...
CIS Critical Security Controls v. 6.1
The Critical Security Controls for Effective Cyber Defense has been updated to version 6.1. This new version has a new two-level...