Information Security Solutions

I help business owners identify and safeguard their information, and their security program investments, using practical governance to create or sustain a thorough information security program tailored to their business. This governance, called TrustHarbor, provides clarity, control, and confidence, builds digital trust, meets regulatory and insurance expectations, and improves recovery and resilience. Beyond governance, I guide and validate security effort so every action strengthens the program and supports the business.


Introducing the TrustHarbor Information Security Model

A super practical, pre-built, standards-based governance framework organized around people, process, proof, and partners.

Every business sits somewhere on the journey to information security and digital trust. The TrustHarbor Maturity Matrix helps you see where you are and prioritize improvements.

  • Exposed – Limited protection. Security depends on luck
  • Reactive – Responding to problems as they appear
  • Structured – Some controls and documentation in place
  • Trusted – Governance connects people, process, proof, and partners
  • Resilient – Security and trust are part of how the business runs

TrustHarbor

  • provides structure and clarity so owners can manage information risk confidently
  • aligns understanding of what the business does, what risks it has, what its risks need, and what success looks like
  • guides protecting both the business and its information security investment

TrustHarbor turns information security into a manageable business system composed of three areas:

  • Visual structure: The Information Security Model Canvas (ISMC) defines all parts of your security program together
  • Core: The Information Security Governance Framework (ISGF) documents how the parts work together, how to maintain them, and how to maintain and show proof of care to your people, customers, insurers, and regulators
  • Execution: The Information Security Playbook and Road Map are the work to do and the prioritized improvement plans

What’s in your security program …

Good governance is secret sauce for a successful information security program.

Introducing TrustHarbor, a practical, affordable way to start or strengthening a program to protect your business.

See why the super-practical governance outlined below improves performance.


The value of practical governance

The costs of cyber security failure are enormous. Breaches can end your business. An effective program to protect your business and recover from an incident is complex. Practical governance makes managing complexity easier.

Good governance enables:

  • Awareness of the strengths and gaps of the program and protection
  • Improved execution
  • Prioritizing program investment
  • Measurement and compliance

The challenge of identifying, organizing, and sustaining a cyber security program tailored to protect your business interests and information assets is met with TrustHarbor, the step-by-step processes and related material described on this site.

What changes when you use TrustHarbor guidance:

  • Transform complexity into clarity, structure, and action.
  • Your entire security program is more visible.
  • Move from confusion to confidence with measurable improvement.

Control, compliance, and confidence. The right focus. The right next steps. The right effort.


Step by step instruction to create or update your information security program.

How I can help with your information security program.