![Navigating AI ChatBots: Establishing Guidelines and Embracing Change](https://static.wixstatic.com/media/2db2b7_e8db0e833d8046d3becb4b2d39b2c4b4~mv2.png/v1/fill/w_319,h_179,fp_0.50_0.50,q_95,enc_auto/2db2b7_e8db0e833d8046d3becb4b2d39b2c4b4~mv2.webp)
Navigating AI ChatBots: Establishing Guidelines and Embracing Change
In a recent discussion, the remarkable potential of artificial intelligence (AI) and its associated risks took center stage....
![](https://static.wixstatic.com/media/4d2ad5a6300843d1bb5952efa6729423.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4d2ad5a6300843d1bb5952efa6729423.webp)
![Ensuring Transparency and Disclosure: Navigating Cybersecurity Risks in the Municipal Bond Market](https://static.wixstatic.com/media/4d2ad5a6300843d1bb5952efa6729423.jpg/v1/fill/w_319,h_212,fp_0.50_0.50,q_90,enc_auto/4d2ad5a6300843d1bb5952efa6729423.webp)
Ensuring Transparency and Disclosure: Navigating Cybersecurity Risks in the Municipal Bond Market
I recently had the honor of being selected to participate in a panel discussion on assessing, mitigating, and disclosing cybersecurity...
![](https://static.wixstatic.com/media/ef9ce3e48be340a4b91f0c3e1644aa5b.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/ef9ce3e48be340a4b91f0c3e1644aa5b.webp)
![Cybersecurity Procedure Coverage](https://static.wixstatic.com/media/ef9ce3e48be340a4b91f0c3e1644aa5b.jpg/v1/fill/w_319,h_213,fp_0.50_0.50,q_90,enc_auto/ef9ce3e48be340a4b91f0c3e1644aa5b.webp)
Cybersecurity Procedure Coverage
In a previous post, I outlined the required topics for cybersecurity policies. In this post, I will cover the required procedures from...
![](https://static.wixstatic.com/media/a2ee6b89562618720f7c6f7fbb6afd66.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a2ee6b89562618720f7c6f7fbb6afd66.webp)
![What Should be in a Good Cybersecurity Policy](https://static.wixstatic.com/media/a2ee6b89562618720f7c6f7fbb6afd66.jpg/v1/fill/w_319,h_179,fp_0.50_0.50,q_90,enc_auto/a2ee6b89562618720f7c6f7fbb6afd66.webp)
What Should be in a Good Cybersecurity Policy
I often get called in to evaluate cybersecurity documentation, more specific policies and procedures. One of the concerns is what to...
![Policy, Procedure, or Plan](https://static.wixstatic.com/media/2db2b7_1bab2cc780c440d2b31575c3c334714d~mv2.png/v1/fill/w_319,h_179,fp_0.50_0.50,q_95,enc_auto/2db2b7_1bab2cc780c440d2b31575c3c334714d~mv2.webp)
Policy, Procedure, or Plan
Some standards like PCI and NIST require policies that cover specific topics. Sometimes you will see a requirement for a policy and...
![IT Governance & IT Management](https://static.wixstatic.com/media/2db2b7_8212f136f2f641a1b5c4dbfc633e1647~mv2.png/v1/fill/w_319,h_179,fp_0.50_0.50,q_95,enc_auto/2db2b7_8212f136f2f641a1b5c4dbfc633e1647~mv2.webp)
IT Governance & IT Management
Many practitioners use these terms governance and management synonymously. While there is some overlap in practice, there are key...
![Cybersecurity Policies Made Easy](https://static.wixstatic.com/media/2db2b7_ab1c18381a9d44a894a25c1d11c1bacf~mv2.png/v1/fill/w_319,h_386,fp_0.50_0.50,q_95,enc_auto/2db2b7_ab1c18381a9d44a894a25c1d11c1bacf~mv2.webp)
Cybersecurity Policies Made Easy
People often ask for advice regarding information security or cybersecurity policies. For the remainder of this article, I will use...
![](https://static.wixstatic.com/media/0823e90c7ab043d8b409571ffe025aaf.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/0823e90c7ab043d8b409571ffe025aaf.webp)
![Cybersecurity Policy for Local Governments](https://static.wixstatic.com/media/0823e90c7ab043d8b409571ffe025aaf.jpg/v1/fill/w_319,h_213,fp_0.50_0.50,q_90,enc_auto/0823e90c7ab043d8b409571ffe025aaf.webp)
Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...