

Exploring Dante's Divine Comedy and Its Lessons on Politics and Public Administration
“When I look back, I am so impressed again with the life-giving power of literature. If I were a young person today, trying to gain a...


New Roles in Local Government Cybersecurity: A Guide to the CISO, BISO, CPO, and CSO
The rapidly changing cybersecurity landscape has forced local governments to reevaluate their approach to cybersecurity. With the...


Finding the Right Fit: Exploring Local Government Cybersecurity Reporting Structures
In a previous post entitled, "Why Cybersecurity Needs to be Separated from IT in Local Governments," I discussed the importance of...


Why Cybersecurity Needs to be Separated from IT in Local Governments
"The days of the CISO being completely IT-centric and as such being in a role under the CIO is gone. Managing security effectiveness and...


Managing Cyber Risks in Local Government: The Need for Comprehensive Risk Management Programs
As the world continues to move towards digital government, there is a growing need to ensure that cybersecurity is adequately addressed....

The Crucial Role of CISOs in Local Governments: Ensuring Good Governance and Cybersecurity
"The single biggest threat to cybersecurity is misunderstanding." - ANSI ISA In recent years, the importance of cybersecurity has become...

The Importance of Active Involvement from Local Government Leaders for a Cyber Safe Future
In today's digital age, every local government is a digital government. With the increasing reliance on information and technology,...

The Importance of the CISO
A survey by ThreatTrack demonstrates that the role of CISO is misunderstood and underappreciated by C-Level peers. It seems business...


Cybersecurity Supporting Documentation
Cybersecurity Supporting Documentation In previous posts, I outlined the required topics for cybersecurity policies and procedures. In...


Cybersecurity Procedure Coverage
In a previous post, I outlined the required topics for cybersecurity policies. In this post, I will cover the required procedures from...