

Finding the Right Fit: Exploring Local Government Cybersecurity Reporting Structures
In a previous post entitled, "Why Cybersecurity Needs to be Separated from IT in Local Governments," I discussed the importance of...


Why Cybersecurity Needs to be Separated from IT in Local Governments
"The days of the CISO being completely IT-centric and as such being in a role under the CIO is gone. Managing security effectiveness and...