I help small and very small businesses identify and protect client and business data using pre-built, standards-based governance organized around people, process, proof, and partners to create an affordable, easier to manage information security program that builds Digital Trust, meets regulatory and insurance expectations, and improves readiness, recovery, and resilience.

What’s in your security program …

Good governance is secret sauce for a successful information security program.

Introducing x, a practical, affordable way to start or strengthening a program to protect your business.

See why the super-practical governance outlined below improves performance.


The value of practical governance

The costs of cyber security failure are enormous. Breaches can end your business. An effective program to protect your business and recover from an incident is complex.

Good governance enables:

  • Awareness of the strengths and gaps of the program and protection
  • Improved execution
  • Prioritizing program investment
  • Measurement and compliance

The challenge of identifying, organizing, and sustaining a cyber security program tailored to protect your business interests and information assets is met with X, an information security governance framework (the step-by-step processes and related material) described on this site.

This framework uses two primary components:

  • A model of the program and the documentation to build and run it.
  • A road map to sustain it and react to new threats.

What changes when you use this guidance:

  • Transform complexity into clarity, structure, and action.
  • Your entire security program is more visible.
  • Move from confusion to confidence with a foundation measurable improvement.

Control, compliance, and confidence. The right focus. The right next steps. The right effort.


Step by step instruction to create or update your information security program.

How I can help with your information security program.