Where is your “Zone”?

Being a CISO (Chief Information Security Officer), like any position, has its ups and downs. I was in a security briefing last week when I was discussing how we uncovered a new vulnerability and the […]
Being a CISO (Chief Information Security Officer), like any position, has its ups and downs. I was in a security briefing last week when I was discussing how we uncovered a new vulnerability and the […]
In a previous blog, IT’s All About Trust, I talked about the importance of building and maintaining trust because it is the cornerstone of any relationship. As we build trust and think about how our […]
We’re too small, we don’t have anything a hacker would be interested in, our IT department says we’re secure, we store everything in the cloud, hackers are only interested in the big cities, counties, states… […]
It takes a confident IT department to admit they don’t know what they don’t know. There is immeasurable pressure on IT departments and specifically the folks responsible for security to assure their board and management […]
Well, not exactly. As I mentioned in an earlier blog, Creating an Effective Enterprise Architecture Practice for Government, Enterprise Architecture can mean many things to many people; however the goals of Enterprise Architecture remain the […]
If you worked in government long enough, you have probably lived through government building fires, floods, power outages, chemical spills, etc. During these difficult times you realize: “How do we run our government and IT […]
Last year we had 45 ‘Major Disaster Declarations’ in the U.S. according to FEMA. Sure the number fluctuations each year, but the reality is you can’t predict when or where an emergency is going to […]