<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Secjuice]]></title><description><![CDATA[ NON-PROFIT CYBER GOODNESS]]></description><link>https://www.secjuice.com/</link><image><url>https://www.secjuice.com/favicon.png</url><title>Secjuice</title><link>https://www.secjuice.com/</link></image><generator>Ghost 5.75</generator><lastBuildDate>Fri, 24 Apr 2026 15:04:14 GMT</lastBuildDate><atom:link href="https://www.secjuice.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Your OSINT Is Only as Good as Your Thinking]]></title><description><![CDATA[You pulled the threads, mapped the connections, built the timeline. The data looks clean and the narrative holds. Then someone asks a question you didn't consider and the whole picture shifts. The failure was not in your tooling. ]]></description><link>https://www.secjuice.com/trivium-prime-osint/</link><guid isPermaLink="false">69b8795bf61a75041501a483</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Guise Bule]]></dc:creator><pubDate>Mon, 16 Mar 2026 21:53:33 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/03/trivium-prime-brain-2.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/03/trivium-prime-brain-2.png" alt="Your OSINT Is Only as Good as Your Thinking"><p>Every OSINT analyst has been there. You pulled the threads, mapped the connections, built the timeline. The data looks clean and the narrative holds. Then someone asks a question you didn&apos;t consider and the whole picture shifts. The failure was not in your tooling or your collection. It was in your reasoning. The missing discipline in information security is not technical. It is intellectual.</p><h3 id="the-cognitive-blind-spot-in-security">The Cognitive Blind Spot in Security</h3><p>We spend enormous energy mastering technical tradecraft. We learn to pivot across data sources, chain identifiers, verify imagery and attribute infrastructure. We build workflows, automate enrichment and refine our toolkits constantly. </p><p>But when was the last time you systematically trained the thing that actually interprets all of that data? when was the last time you trained your mind?</p><p>The uncomfortable truth is that most of us are running sophisticated collection on top of undisciplined analysis. We know how to find information. We are far less practiced at thinking about it rigorously. Confirmation bias does not announce itself. Neither does anchoring, narrative fallacy or the dozen other cognitive traps that plague analytical work. These are not problems you solve with better OSINT tools. They are problems you solve with better thinking.</p><h3 id="an-ancient-framework-for-a-modern-problem">An Ancient Framework for a Modern Problem</h3><p>There is nothing new about this challenge. For over two thousand years a formal system existed for training exactly this capacity. The Trivium. Three disciplines studied in sequence. Grammar, Logic and Rhetoric. Grammar teaches you to define your terms precisely and understand the structure of what you are examining. Before you investigate, make sure you actually understand what you are looking at. How many investigations have gone sideways because an analyst confused correlation with connection or failed to define the scope of what they were actually trying to answer? Logic trains you to construct valid arguments, identify fallacies and stress test claims under scrutiny. This is the analytical core. </p><p>The discipline of asking whether your conclusion actually follows from your evidence or whether you have built a comfortable story around cherry picked data points. Rhetoric is the ability to communicate findings with clarity and force. Every OSINT professional who has written an intelligence product knows the gap between having good findings and delivering them in a way that drives action. </p><p>A brilliant investigation that produces an incomprehensible report is a wasted investigation. These are not abstract academic concepts. They map directly onto the intelligence cycle. Define the problem, analyse the information, communicate the assessment. The ancients understood something we have largely forgotten. </p><p>These are trainable skills, not innate talents.</p><h3 id="why-this-matters-now-more-than-ever">Why This Matters Now More Than Ever</h3><p>The information environment is getting worse, not better. AI generated content, synthetic media, coordinated inauthentic behaviour and the sheer volume of data available to analysts all compound the challenge. The bottleneck is no longer access to information. It is the ability to think clearly about what that information means. Every year the OSINT community gets better tools and every year the adversaries get better at poisoning the well. The asymmetry does not resolve with more automation. It resolves with sharper minds. Consider how much of modern security discourse is driven by reaction rather than reasoning. </p><p>A new threat report drops and the takes fly, often before anyone has critically examined the methodology, the sourcing or the assumptions behind the conclusions. We reward speed of opinion over quality of thought. </p><p>That is not analysis. That is performance. The professionals who consistently produce reliable intelligence are not the ones with the most tools or the fastest takes. They are the ones who have trained themselves to slow down at the critical moment. To define terms carefully, test their logic honestly and communicate their findings precisely. They practice the Trivium whether they call it that or not.</p><h3 id="building-the-discipline">Building the Discipline</h3><p>This is what led to the creation of <a href="https://triviumprime.com/?ref=secjuice.com" rel="noreferrer">Trivium Prime</a>, that and the low level of discourse in British OSINT circles. A structured training ground for exactly this kind of intellectual formation. Not a course you watch passively. Not a certificate you collect. A disciplined practice built around mastering the foundational skills of clear thinking, honest reasoning and authoritative communication. </p><p>The programme is built around progressive levels. Foundations in logic, rhetoric and the grammar of knowledge. Then strategic intelligence covering political systems, economic structures, decision making frameworks and historical case studies. Then leadership, institution building and applied strategy. Members advance through demonstrated mastery, not attendance. You test. You defend your reasoning. You earn your rank. It is structured as a selective membership order, not an open platform. Admission requires an application and the barrier is intentional. This kind of training only works with people who are serious about it.</p><h3 id="the-call">The Call</h3><p>If you work in OSINT, threat intelligence or any discipline where the quality of your thinking determines the quality of your output, ask yourself honestly. When did you last train that capacity with the same rigour you apply to your technical skills? Most of us never have. We learned to think by accident, picking up habits from mentors, from experience, from making mistakes in the field. Some of those habits are good. Some of them are invisible liabilities we have never examined. </p><p><a href="https://triviumprime.com/way?ref=secjuice.com" rel="noreferrer">The Trivium Way</a> offers a systematic alternative. A framework that has produced clear thinkers for millennia, now adapted for men who take their intellectual development as seriously as their professional development. Trivium Prime is accepting applications. If you are the kind of person who reads Secjuice you already care about doing this work well. The question is whether you are willing to sharpen the one tool that every other tool depends on. </p><p>Your mind is your primary sensor. <a href="https://triviumprime.com/ranks?ref=secjuice.com" rel="noreferrer">Train it</a> accordingly.</p><p>Trivium is a hobby project, come help me.</p>]]></content:encoded></item><item><title><![CDATA[The CTF Ecosystem Is Stagnant and Has Been for Twenty Years]]></title><description><![CDATA[CTFs haven't changed in decades. Better puzzles, same game. The problem isn't technical difficulty, it's that nobody has ever made you commit to anything.]]></description><link>https://www.secjuice.com/the-ctf-ecosystem-is-stagnant/</link><guid isPermaLink="false">69aaf466f61a75041501a3be</guid><category><![CDATA[CTF]]></category><dc:creator><![CDATA[Cartographus]]></dc:creator><pubDate>Fri, 06 Mar 2026 16:08:10 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/03/ctf-is-stagnant.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/03/ctf-is-stagnant.jpg" alt="The CTF Ecosystem Is Stagnant and Has Been for Twenty Years"><p>The format hasn&apos;t fundamentally evolved in decades. Jeopardy, King of the Hill, Attack/Defense, those three buckets cover essentially everything competitive CTF has produced, and the innovation inside them is almost entirely in challenge <em>content</em>, not game <em>mechanics</em>. Harder reversing. Cleverer crypto. More obscure forensics. Same skeleton, just dressed differently. Its getting boring.</p><p>The people who run serious CTFs are generally speaking, deeply sophisticated technically and <em>almost completely unsophisticated as game designers</em>. They&apos;ve never had a reason to think about commitment mechanics, economic tension, or information pricing, because nothing in their world modeled it. </p><p>That&apos;s the gap, <em>and it&apos;s larger than most people in the space have noticed</em>.</p><h3 id="the-three-ctf-problems-nobody-is-fixing">The Three CTF Problems Nobody Is Fixing</h3><p><strong>Passive play is endemic.</strong> Even the top teams sandbag, they watch the scoreboard, patiently wait for others to partially solve the thing, and then they sprint at the end. The meta rewards this. Nobody likes it. Nobody has fixed it. The reason nobody has fixed it is that the game mechanics actively invite it, there is no cost to waiting, no exposure for hesitating, no penalty for riding information produced by others. </p><p><strong>Prize pools feel arbitrary.</strong> You win because you scored the most points. Yawn. The connection between risk taken and reward earned is essentially zero. There&apos;s no moment where a player genuinely bled for the win, no public commitment, no skin in the game, no irreversible decision they had to live with. The prize is just a number attached to a leaderboard. </p><p><strong>Spectators have nothing to watch.</strong> CTF is nearly unwatchable as a competitive spectator experience because there is no declared tension, no visible commitment, no moment of exposure. Players operate entirely inside their own heads until the moment of submission. Nothing is staked publicly. Nothing happens in the open that an audience can track or feel.</p><h3 id="the-decision-ctfs-never-ask-for">The Decision CTFs Never Ask For</h3><p>Standard CTF is a game of complete commitment with zero timing risk. You either solve the challenge or you don&apos;t. There&apos;s no moment where you have to decide whether your <em>partial</em> understanding is good enough to act on. You sit with the problem until you crack it, then you submit. Thats it.</p><p>The decision is binary and entirely internal. The player is never exposed. They operate in private, they submit in private, and the only cost of being wrong is a minor point penalty or a failed attempt counter.</p><p>All of this means CTF has never asked what I think is the most interesting question in competitive gaming. <strong>When do you move on partial information?</strong></p><p>This is the question that makes poker worth watching. It&apos;s the question that makes markets worth studying. It&apos;s the question at the core of every genuinely high-stakes decision, military, financial, strategic. You hold <em>some</em> information. Not none, not enough. <em>Some.</em> And something is forcing the live question.</p><blockquote>Is what I know now worth acting on, or do I wait?</blockquote><p>Waiting isn&apos;t free. Someone else might move. The next piece of intelligence costs something. Your window narrows. Acting isn&apos;t free either. You might be wrong. And the moment you commit, you&apos;ve declared, which is itself information to everyone watching. That tension, act on partial information versus wait for more certainty, is the core cognitive and psychological experience that the competitive CTF ecosystem has never once tried to engineer. Its just not on their radar.</p><h3 id="what-a-better-format-looks-like">What a Better Format Looks Like</h3><p>The mechanics already exist. They just haven&apos;t been applied here.</p><p>Take Jeopardy-style CTF. Instead of all challenges open simultaneously, each flag is gated behind a progressive clue chain. Solving clue N costs you something, a token, a time delay, a stake, and unlocks clue N+1. First solve takes the bounty. Suddenly players aren&apos;t just racing on technical skill; they&apos;re making timed economic decisions about which challenge to commit to, and when.</p><p>Take King of the Hill. Instead of &quot;hold the server,&quot; you hold a physical object or location. Clues narrow the field progressively to a geographic zone. The player who reaches it and submits proof owns the hill. Displacing them requires someone else committing resources and moving. That&apos;s a real-world execution layer that purely digital king of the hill has <strong>never</strong> had.</p><p>Take Attack/Defence. The <em>information as currency</em> model applies directly to intelligence about opponents. Teams can purchase partial intelligence about the other team&apos;s infrastructure, intel that gets more precise as more is spent. The meta-game becomes <em>do you invest in offensive intelligence, or defend blind</em>?</p><p>In every case, the injection is the same. Commitment mechanics that punish passive play, economic skin-in-the-game beyond time investment, and the &quot;when do I move&quot; decision as a first-class part of the competition.</p><h3 id="what-this-isnt">What This Isn&apos;t</h3><p>This isn&apos;t an argument that CTF challenges should be easier, or that the technical bar should drop. The point isn&apos;t to make the puzzles more approachable. It&apos;s that the <em>game design layer</em> sitting above the technical challenges has been ignored.</p><p>The best technical competitors in the world are being run through a game that was designed in the 1990s and hasn&apos;t been seriously reconsidered since. The result is a format that rewards a specific kind of isolated, low-risk, information-complete problem-solving, <em>and we call this competition</em>?!</p><p>Real competition involves exposure. It involves irreversible decisions made under uncertainty. It involves a moment where you put something on the line and the outcome is genuinely in doubt.  CTFs as currently designed don&apos;t have that moment. And until they do, the ecosystem will keep producing technically impressive events that feel, structurally, like homework.</p><h3 id="the-format-already-exists"><strong>The Format Already Exists</strong></h3><p>Everything described in this piece, the commitment mechanics, the progressive information release, the economic skin-in-the-game, the moment where a player has to decide whether what they know is worth acting on, these aren&apos;t design proposals. They&apos;re a description of a system that has already been built.</p><p><a href="https://hashclue.com/?ref=secjuice.com" rel="noreferrer">Hashclue</a> is a physical cryptographic treasure hunt protocol. Clues are released progressively and priced. The cache is real and located in the world. Commitment is on-chain and irreversible. The moment of decision, move now on partial information, or wait and risk someone else getting there first, is not a side effect of the design. It is the design. It is, structurally, everything CTF forgot to become.</p><p>The technical challenge of finding the cache is real. The economic tension of when to move is real. The physical execution, your body, a location, proof of presence, is real. None of it happens inside someone&apos;s head in private. </p><p>All of it is exposed, staked, and irreversible.</p><p>The modern CTF ecosystem is optimising for technical difficulty, but Hashclue optimises for something harder, <em>judgment under uncertainty</em>.</p><p>The <a href="https://youtu.be/Dwpc078s_dU?si=8sGMyIsnt4o0wnnr&amp;ref=secjuice.com" rel="noreferrer">cache</a> is already out there. Nobody has found it yet.</p><p>Most people who read this won&apos;t play. The ones who do will understand immediately why CTF never prepared them for Hashclue.</p>]]></content:encoded></item><item><title><![CDATA[People, Policies, and Purpose: Framing Acceptable Use and Human Behavior in Information Security]]></title><description><![CDATA[<p><em>Part 2 of a series on creating information security policies</em><br><br>Many breaches don&#x2019;t start with sophisticated hackers; they start with ordinary users doing ordinary things in unsafe ways. Let&#x2019;s look at 3 ways to work toward helping people in our organizations understand better how to safeguard</p>]]></description><link>https://www.secjuice.com/people-policies-and-purpose-framing-acceptable-use-and-human-behavior-in-information-security/</link><guid isPermaLink="false">69aaf074f61a75041501a3ad</guid><dc:creator><![CDATA[Ross Moore]]></dc:creator><pubDate>Fri, 06 Mar 2026 15:40:05 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/03/People.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/03/People.png" alt="People, Policies, and Purpose: Framing Acceptable Use and Human Behavior in Information Security"><p><em>Part 2 of a series on creating information security policies</em><br><br>Many breaches don&#x2019;t start with sophisticated hackers; they start with ordinary users doing ordinary things in unsafe ways. Let&#x2019;s look at 3 ways to work toward helping people in our organizations understand better how to safeguard everyone&#x2019;s information.</p><p>Because there are as many ways to create a policy as there are organizations - compounded with the numerous requirements from regulations - I won&#x2019;t attempt to provide a one-size-fits-all policy for each of these. Part of the process of becoming a professional with policies is learning about all the options while also satisfying the requirements of your org. I&#x2019;ve provided several links in the Resources section at the end of this article so you can check out options if you need inspiration or a headstart.</p><p><strong><u>1)&#xA0;&#xA0; Acceptable Use Policy</u></strong></p><p>This policy defines how employees and contractors may use company systems, networks, and data. It sets boundaries for acceptable behavior and reduces ambiguity during investigations.</p><p><a><strong>2)&#xA0;&#xA0; Security Awareness &amp; Training Policy</strong></a></p><p>This establishes requirements for onboarding and ongoing security education. The goal isn&#x2019;t perfection, but consistent, informed, job-role appropriate activities. Often, this needs to be hand-in-hand with Human Resources to ensure proper coverage for the lifecycle of one&#x2019;s employment, from recruiting to offboarding.</p><p><a><strong>3)&#xA0;&#xA0; Remote Work Policy</strong></a></p><p>The remote work policy addresses security expectations for working outside controlled environments, including device security, network usage, and data handling. This policy should also include considerations &#x2013; even if they&#x2019;re not specifically names &#x2013; for children, pets, bystanders, visitors to the home, accidental spills, etc. It&#x2019;s not that those things are inherently bad, but they pose risks to corporate and customer information and equipment.</p><p><em>NOTE: I&#x2019;m acutely aware of the sense that those not in infosec tend to see those in IT and Security roles as experimenters and gearheads who only think of people as users, weaknesses, statistics, and other non-human aspects. Much of that is the habit of those ITSec folks to bring the language of tech (users, roles, risks, vulns, authn/authz, access control, etc.) into the realm of humanity. While policies often require generic or technical language, don&#x2019;t let that spill over into your interactions with others. They are people, not policies and procedures.</em></p><h2 id="people-as-the-primary-attack-surface"><strong>People as the Primary Attack Surface</strong></h2><p>When it comes to cybersecurity, technology often receives the spotlight - firewalls, encryption, and intrusion detection systems all play starring roles. Yet in reality, people remain the most frequently targeted component of any security environment. Attackers know this well. Phishing, social engineering, and misuse of access continue to outperform exploit kits and zero-day vulnerabilities because people can be persuaded where software cannot. (Note: this is because people care and want to be helpful, unlike software. This is NOT because people are &#x201C;the weakest link.&#x201D; Let&#x2019;s give people proper credit.)</p><p>Information security policies that address human behavior must treat employees not as weak links, but as critical defenders. The goal is not to eliminate human risk, but to manage it through clear expectations, knowledge, and culture. The <strong>Acceptable Use Policy (AUP)</strong> becomes a foundational layer in this effort. It defines what constitutes responsible system use and outlines the boundaries that protect both data and users.</p><p>At its core, the AUP states that organizational systems and data are for <em>authorized business use only</em>. Employees are custodians of the company&#x2019;s digital - and even physical - environment, expected to handle information and technology in alignment with established policies. That means things like refraining from downloading unauthorized software, connecting to the network with unauthorized gear, exfiltrating data, and attempting to bypass security controls. These aren&#x2019;t arbitrary restrictions - they&#x2019;re practical safeguards against both internal mistakes and external threats.</p><p>Because businesses are in the business of protecting customer data, using a corporate computer is not like being on a home computer for personal use.</p><h2 id="setting-expectations-without-over-policing"><strong>Setting Expectations Without Over-Policing</strong></h2><p>A well-crafted AUP shouldn&#x2019;t read like a list of punishments; it should set clear expectations while permitting people to make smart decisions. (although, ironically enough, the list is primarily &quot;here&apos;s what is UNACCEPTABLE&quot; instead of what&apos;s acceptable). Overly rigid language can create fear or confusion, leading to either apathy or deliberate workarounds. An employee who disables a security control because a system blocks legitimate work isn&#x2019;t being malicious (well, not always &#x2013; beware) - they&#x2019;re trying to be productive, perceiving that their need for productivity is more important than the friction caused by controls. That tells us policy enforcement should blend accountability with compassion.</p><p>Leaders can foster this balance by emphasizing <em>why</em> the policy exists. When staff understand that each safeguard protects customer trust, intellectual property, and even their own reputations, compliance becomes an act of shared responsibility. This cultural framing turns &#x201C;rules to follow&#x201D; into &#x201C;safeguards we all benefit from.&#x201D;</p><p>In practical terms, managers should reinforce that acceptable use extends beyond the brick-and-mortar office. The modern workplace is fluid - remote work, mobile devices, and cloud collaboration all expand the security perimeter. Employees working off-site must &#x2013; as appropriate to their org&#x2019;s resources:</p><ul><li>Use only approved, managed devices</li><li>Connect through secure networks (VPNs or trusted Wi-Fi)</li><li>Ensure business data isn&#x2019;t accessible to unauthorized individuals.</li></ul><p>No company is the same, and not all companies can provide the best protection available in the world. The main infosec approach is to do the absolute best you can to make device and data security feasible &#x2013; and much of that &#x201C;best&#x201D; is people doing their best, both in creating the controls and creating the proper environment for people to understand the purpose of the controls.</p><p>Simple lapses - e.g., allowing strangers to shoulder surf, discussing sensitive information in shared spaces - can have the same impact as major breaches. Clear expectations, reinforced through relatable examples, reduce the likelihood of such incidents without creating undue friction.</p><h2 id="training-as-a-control-instead-of-a-checkbox"><strong>Training as a Control instead of a Checkbox</strong></h2><p>Security awareness training often suffers from poor framing. Too many organizations treat it as a compliance requirement - a box to tick during onboarding or annual reviews. That approach misses the real purpose: to equip staff with actionable insight they can actually use.</p><p>Training should be viewed as a <em>control measure</em> just like multi-factor authentication or an access log. It directly reduces human error and strengthens resilience against common attacks. Effective programs share several traits:</p><p><strong>Timely delivery:</strong> Training must occur at key moments &#x2014; during onboarding, before role transitions, and annually for reinforcement.</p><p><strong>Interactive learning:</strong> Scenario-based modules and phishing simulations help people apply theory to practice.</p><p><strong>Real feedback:</strong> Employees benefit when simulations provide clear explanations of what went wrong, not just pass/fail scores.</p><p><strong>Leadership participation:</strong> When executives take part, it signals that security isn&#x2019;t just an IT function; it&#x2019;s a business priority.</p><p>Phishing simulations deserve special mention. They are not designed to catch employees off guard or shame mistakes but to raise situational awareness in safe conditions. Just as fire drills teach evacuation procedures, simulated phishing tests teach response habits: pausing before clicking, checking sender authenticity, and reporting suspicious messages.</p><p>Critically, organizations must frame these exercises as learning opportunities, not traps. Employees should feel empowered to ask questions and report close encounters without fear of reprisal. Always provide an easily accessible channel for communicating. Building this trust transforms training from an obligation into an ongoing dialogue.</p><h2 id="bringing-it-all-together"><strong>Bringing It All Together</strong></h2><p>The convergence of human behavior, policy, and culture defines an organization&#x2019;s security posture far more than any individual control. The Acceptable Use Policy and security training requirements provide structure, but it&#x2019;s the united mindset that determines effectiveness.</p><p>By acknowledging human risk as the central attack surface, policymakers can shift from reactive enforcement to practical engagement. Policies become meaningful when employees understand their &#x201C;why.&#x201D; Training becomes meaningful when it changes real-world decisions. Together, these efforts anchor a culture of responsible technology use rather than mere rule compliance.</p><p>The goal isn&#x2019;t to regulate every keystroke, but to ensure that everyone recognizes their role in safeguarding the organization&#x2019;s digital assets. A culture that prizes awareness and accountability, and builds trust, will always outperform one that relies solely on controls.</p><p>In an environment where every click matters, encouraging people to act securely is the most effective defense of all.</p><p>Stay vigilant and safe!</p><h2 id="resources"><strong>Resources</strong></h2><p>Therefore, here are several places where you can find numerous policy templates to learn, get ideas, investigate, and modify relevant ones as needed. Happy hunting!</p><p><a href="https://heightscg.com/2025/11/14/information-security-policy-templates/?ref=secjuice.com">https://heightscg.com/2025/11/14/information-security-policy-templates/</a></p><p><a href="https://heimdalsecurity.com/blog/nist-cybersecurity-framework-policy-template-guide/?ref=secjuice.com">https://heimdalsecurity.com/blog/nist-cybersecurity-framework-policy-template-guide/</a></p><p><a href="https://www.cisecurity.org/controls/policy-templates?ref=secjuice.com">https://www.cisecurity.org/controls/policy-templates</a></p><p><a href="https://github.com/HailBytes/security-policy-templates?ref=secjuice.com">https://github.com/HailBytes/security-policy-templates</a></p><p>(NOTE: This downloads the PDF right away) <a href="https://www.azed.gov/sites/default/files/2023/03/04.%20Template%20Security-Awareness-and-Training.pdf?ref=secjuice.com">https://www.azed.gov/sites/default/files/2023/03/04.%20Template%20Security-Awareness-and-Training.pdf</a></p><p>(NOTE: This downloads the Microsoft Word file right away) <a href="https://community.trustcloud.ai/kbuPFACeFReXReB/uploads/2023/03/ISO-27001_2022-Information-Security-Management-System-ISMS-Policy-Template.docx?ref=secjuice.com">https://community.trustcloud.ai/kbuPFACeFReXReB/uploads/2023/03/ISO-27001_2022-Information-Security-Management-System-ISMS-Policy-Template.docx</a></p><p><a href="https://policy.arizona.edu/information-technology/information-security-awareness-training-policy?ref=secjuice.com">https://policy.arizona.edu/information-technology/information-security-awareness-training-policy</a></p><p><a href="https://blueteamalpha.com/resources/security-awareness-training-policy-template/?ref=secjuice.com">https://blueteamalpha.com/resources/security-awareness-training-policy-template/</a> &#xA0;</p><p><a href="https://claude-plugins.dev/skills/@diegocconsolini/ClaudeSkillCollection/cybersecurity-policy-generator?ref=secjuice.com">https://claude-plugins.dev/skills/@diegocconsolini/ClaudeSkillCollection/cybersecurity-policy-generator</a></p><p><a href="https://www.sans.org/information-security-policy?ref=secjuice.com">https://www.sans.org/information-security-policy</a></p><p><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1300.pdf?ref=secjuice.com">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1300.pdf</a></p><p><a href="https://github.com/PehanIn/ISO-27001-2022-Toolkit?ref=secjuice.com">https://github.com/PehanIn/ISO-27001-2022-Toolkit</a></p><p><a href="https://github.com/simplerisk/templates?ref=secjuice.com">https://github.com/simplerisk/templates</a></p><p><a href="https://github.com/JupiterOne/security-policy-templates?ref=secjuice.com">https://github.com/JupiterOne/security-policy-templates</a></p>]]></content:encoded></item><item><title><![CDATA[CTFs aren't Designed to Train Investigators. Hashclue is.]]></title><description><![CDATA[Real investigations start with noise, a fragment, a pattern, something that doesn't fit. Almost nothing in the standard training stack teaches you to work that problem. Hashclue is an attempt to build something that does.]]></description><link>https://www.secjuice.com/hashclue/</link><guid isPermaLink="false">69a9b3cdf61a75041501a32f</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Cartographus]]></dc:creator><pubDate>Thu, 05 Mar 2026 17:09:26 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/03/hashclue-pattern.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/03/hashclue-pattern.png" alt="CTFs aren&apos;t Designed to Train Investigators. Hashclue is."><p>Most paths into cybersecurity run through the same checkpoints. Certifications. Lab environments. CTF competitions. These things have real value, they build vocabulary, they build technique, they get people hired. But there&apos;s a ceiling on what they can teach, and that ceiling shows up quite quickly when someone sits down to ponder an actual real world investigative scenario.</p><p>Real investigations don&apos;t start with a clean scope document and a pre-configured VM. They start with noise. A username fragment. A timestamp that doesn&apos;t quite fit. A piece of infrastructure that routes somewhere it shouldn&apos;t. The work is to build a picture from partial information, to pull threads until something coherent emerges. That&apos;s analytical reasoning under uncertainty, and almost nothing in the standard certification and CTF pipeline specifically builds that muscle.</p><p>CTFs come closest, but the format has a structural problem, most of them are puzzle boxes. You&apos;re handed a file, a service, or a network segment, and the flag is hidden inside it. The challenge is technical extraction. What&apos;s usually missing is the investigative layer, the part where you don&apos;t know what you&apos;re looking for yet, where the relevant data isn&apos;t labeled, and where the path forward requires judgment, not just tooling.</p><p>This isn&apos;t a criticism of CTF organizers. </p><p>It&apos;s a constraint of the format. Building a challenge that genuinely simulates how analysts work, with messy, ambiguous, multi-source data, is hard. </p><p>Most platforms aren&apos;t built for it. <a href="https://hashclue.com/?ref=secjuice.com" rel="noreferrer">Hashclue</a> is my attempt to build for it.</p><h3 id="an-intelligence-game-built-around-investigative-tradecraft">An Intelligence Game Built Around Investigative Tradecraft</h3><p>The concept behind Hashclue is simple on its face, cryptographic treasure hunts with cybersecurity DNA. But the design philosophy underneath it is more specific than that. The goal is to simulate investigative thinking, not just test technical knowledge. A Hashclue challenge is an environment, not a puzzle box. </p><p>Players enter a narrative context, encounter a set of information artifacts (documents, metadata, identifiers, patterns, noise), and have to reason their way toward a hidden answer. The answer is committed on-chain via SHA-256 hash before the challenge goes live. Nobody can retroactively move the goalposts.</p><p>The techniques required are the ones that show up in real analyst workflows, OSINT, digital forensics, pattern recognition, cross-source correlation, geolocation, metadata analysis. Not as isolated modules, but woven together in the way an actual investigation requires. You might find a partial username in one place and need to connect it to infrastructure data somewhere else. The challenge isn&apos;t &quot;find the thing in the file.&quot; It&apos;s &quot;figure out what you&apos;re even looking for.&quot;</p><p>The tradecraft framing matters because it changes what success looks like. In a standard CTF, you either get the flag or you don&apos;t. In an investigation style challenge, the process is the point. How you reasoned through it, what you prioritized, where you got stuck, those are the reps that make analysts better.</p><h3 id="what-is-hashclue">What Is Hashclue?</h3><p>Hashclue is a protocol and a game engine for building verifiable investigative challenges. The architecture is designed so that challenge answers are cryptographically committed before the challenge launches, players can independently verify that the answer hasn&apos;t changed and that solving it is possible. </p><p>This isn&apos;t just housekeeping. It&apos;s the foundation of trust that makes competitive play fair and makes Hashclue usable for serious training contexts.</p><p>The first Hashclue treasure is live. A physical cache is hidden. The path to finding it runs through a chain of digital clues, OSINT based, forensics adjacent, requiring both analytical reasoning and real world spatial thinking. The canonical secret string that unlocks the location is locked in publicly verifiable hash commitments. </p><p>Nobody can change where the treasure is. Nobody can fake solving it.</p><p>The challenge is designed to be hard. Not artificially hard, legitimately hard, in the way that real intelligence problems are hard. The answer requires synthesizing information from multiple sources and making judgment calls under uncertainty.</p><h3 id="what-the-first-game-looks-like">What the First Game Looks Like</h3><p>The MVP challenge is a multi-stage investigation. Each stage produces an output that feeds the next. Players start with publicly accessible information and use a combination of OSINT techniques, metadata analysis, and forensic reasoning to progress through the chain. The terminal stage has a physical dimension, the final clue resolves to a real location where a physical object is hidden. </p><p>The location anchor is encoded in the canonical secret string, enough specificity to be unambiguous when you&apos;re standing in the right place, enough ambiguity that you can&apos;t brute force it from a map.</p><p>The challenge is open to anyone. </p><p>There&apos;s no registration wall, no entry fee, no time limit. If you can solve it, you solve it. The cryptographic commitment means verification is instant and trustless, either you have the canonical string or you don&apos;t.</p><p>This format is deliberately minimal for the first release. The design goal was to prove the model works before layering on complexity. Future iterations will support team play, multi-track difficulty, and integration with training programs.</p><h3 id="an-invitation-to-the-cybersecurity-community">An Invitation to the Cybersecurity Community</h3><p>Hashclue is being built in public and the community can shape what it becomes. If you&apos;re an analyst, researcher, or practitioner, play the challenge. Not necessarily to win it, to pressure test the format. Does it feel like real investigative work? Where does it hold up and where does it fall short? That feedback matters to us early on.</p><p>If you build training programs, run a CTF, or work in security education the underlying protocol is designed to be extensible. The same cryptographic commitment structure that powers the first challenge can anchor corporate red team exercises, structured analyst training, or competitive events with real stakes. </p><p>If you want to explore what that looks like, get in touch.</p><p>If you work in threat intelligence, OSINT, or digital forensics the design process for Hashclue challenges is a research exercise in and of itself. Building a problem that&apos;s solvable but nontrivial requires thinking carefully about what real investigative paths look like. Collaborators who want to contribute challenge design, particularly people who work with these techniques professionally, are the most valuable thing the Hashclue Labs project can attract right now.</p><p>The cybersecurity community has always been better at building things collaboratively than any individual or company could build alone. Hashclue is a small idea that could become a useful part of the training ecosystem if the right people engage with it seriously. The first step is the challenge itself.</p><p><em>Hashclue is a cryptographic investigative game protocol. The first public challenge is live. Learn more at </em><a href="https://hashclue.com/?ref=secjuice.com" rel="noreferrer"><em>Hashclue.com</em></a><em>.</em></p>]]></content:encoded></item><item><title><![CDATA[Security Governance & Leadership]]></title><description><![CDATA[<p><em>Part 1 of a series on creating information security policies</em><br><br><strong>Contents</strong></p><ul><li>Security Starts at the Top (or, Governance Makes or Breaks Your Security Program)</li><li>Disclaimer</li><li>Why Governance Comes First</li><li>The Information Security Policy: Setting the Tone</li><li>Risk Management: Replace Guesswork with Discipline</li><li>Roles and Responsibilities: Eliminating the Accountability Gap</li><li>What</li></ul>]]></description><link>https://www.secjuice.com/security-governance-leadership/</link><guid isPermaLink="false">69852775f61a75041501a23a</guid><dc:creator><![CDATA[Ross Moore]]></dc:creator><pubDate>Fri, 06 Feb 2026 20:14:42 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/02/imagine_a_digital_fortress.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/02/imagine_a_digital_fortress.png" alt="Security Governance &amp; Leadership"><p><em>Part 1 of a series on creating information security policies</em><br><br><strong>Contents</strong></p><ul><li>Security Starts at the Top (or, Governance Makes or Breaks Your Security Program)</li><li>Disclaimer</li><li>Why Governance Comes First</li><li>The Information Security Policy: Setting the Tone</li><li>Risk Management: Replace Guesswork with Discipline</li><li>Roles and Responsibilities: Eliminating the Accountability Gap</li><li>What Auditors Look For</li><li>Common Pitfalls to Avoid</li><li>Governance as a Force Multiplier</li><li>Afterword about Infosec Policy and Infosec Policies</li><li>Resources</li></ul><h2 id="security-starts-at-the-top-or-governance-makes-or-breaks-your-security-program">Security Starts at the Top (or, Governance Makes or Breaks Your Security Program)</h2><p>Security programs shouldn&#x2019;t be tied to a specific tool or control. They need someone to own the risk. Firewalls expire, policies gather dust, controls erode, not because of maliciousness or incompetence, but because governance was either not firmly established, or because it lost accountability.</p><p>ISO 27001 and SOC 2 both recognize this reality. They differ in structure and emphasis, but both begin with the same foundational assumption: <strong>information security is a management responsibility before it is a technical one</strong>. Governance sets direction, establishes accountability, and ensures that security decisions are made deliberately rather than reactively.</p><p>This first month focuses on the policies that anchor the entire security program: information security governance, risk management, and clearly defined roles and responsibilities. Without these, every other policy becomes harder to justify, harder to enforce, harder to defend.</p><h2 id="disclaimer"><strong>Disclaimer</strong></h2><p><em>Hear ye, hear ye!&#xA0;Be it known unto all who peruseth this lowly scrivening that this author, though steeped in the arts of information security, is neither auditor, attorney, barrister, counselor, nor any other sworn keeper of royal law. These words are penned in good faith and offered for enlightenment and mirth, not as binding decree nor legal writ.</em></p><p><em>Shouldst thou require counsel of a lawful, legal, legitimate, licit, sanctioned or otherwise authoritative nature, get thee hence with all due speed to a licensed solicitor or other learned scribe of relevant and pertinent statutes. For, verily, the author claimeth none liability shouldst thine compliance dragons awaken or thine auditors grow discontent.</em></p><h2 id="why-governance-comes-first">Why Governance Comes First</h2><p>Governance answers three questions every auditor and executive will eventually ask:</p><ol><li><em>Who is responsible for information security?</em></li><li><em>How does the organization decide what risks are acceptable?</em></li><li><em>How do security decisions support business objectives?</em></li></ol><p>Organizations that can&#x2019;t answer these questions will drift into one of two paths toward failure.</p><p>Path 1: Overly restrictive, deploying controls that frustrate users without meaningfully reducing risk (this is moving beyond friction to inefficiency).</p><p>Path 2: Permissive to the point of negligence, accepting risks simply because no one took ownership to decide otherwise.</p><p>A governance-driven security program avoids both extreme roads by making risk visible, intentional, and owned &#x2013; particularly to the proper stakeholders.</p><h2 id="the-information-security-policy-setting-the-tone">The Information Security Policy: Setting the Tone</h2><p>The Information Security Policy is often dismissed as a formality - it&#x2019;s a document written once, approved once, and rarely revisited. It&#x2019;s actually THE SINGLE MOST IMPORTANT policy in the entire ISMS (Information Security Management System).</p><p>This policy establishes:<br>- The organization&#x2019;s commitment to protecting information<br>- The objectives of the security program<br>- The scope of systems, data, and personnel covered<br>- Management&#x2019;s authority to enforce security requirements</p><p>For ISO 27001, this policy formally defines the scope of the ISMS. For SOC 2, it demonstrates that management has acknowledged responsibility for meeting the Trust Services Criteria.</p><p>A note on SOC 2: there are 5 &#x201C;Trust Services Criteria,&#x201D; only 1 of which is required (some reviewers can be confused about the flexibility), though more are always a better sign of your security posture to prospects.<br>More details here: <a href="https://cloudsecurityalliance.org/blog/2023/10/05/the-5-soc-2-trust-services-criteria-explained?ref=secjuice.com">https://cloudsecurityalliance.org/blog/2023/10/05/the-5-soc-2-trust-services-criteria-explained</a></p><p>A strong Information Security Policy avoids technical details. Instead, it speaks in the language of leadership. &#xA0;</p><p>NOTE: There&#x2019;s a difference between policies, procedures, guidelines, and standards. Most of what SMBs, especially unregulated ones, will use are Policies and Procedures. Here&#x2019;s a good summary: <a href="https://www.dummies.com/article/academics-the-arts/study-skills-test-prep/cissp/develop-implement-documented-security-policies-standards-procedures-guidelines-225446/?ref=secjuice.com">https://www.dummies.com/article/academics-the-arts/study-skills-test-prep/cissp/develop-implement-documented-security-policies-standards-procedures-guidelines-225446/</a></p><p>The main Infosec policy communicates <em>intent</em>, not implementation.</p><p>Firewalls, encryption, and monitoring are addressed elsewhere; this policy explains:</p><p><strong>why</strong> the controls exist, and<br><strong>who</strong> stands behind them.</p><p>When auditors review this policy, they&#x2019;re not looking for perfection (though they will have specific items they have to see, e.g., they&#x2019;ll demand a Version Table). They&#x2019;re not looking for specific tools, technologies, or titles. They want to see evidence that leadership understands its role and has set a clear direction for the organization. While it needs to be reviewed at least annually, design it so that it doesn&#x2019;t need to be changed much, but make it easy to change if needed.</p><h2 id="risk-management-replace-guesswork-with-discipline">Risk Management: Replace Guesswork with Discipline</h2><p>Risk management is the connective tissue between the muscles of governance and control implementation. Without it, security decisions are driven by fear, headlines, or vendor influence. With it, decisions become consistent, explainable, and defensible.</p><p>A Risk Management or Risk Assessment Policy defines how the organization:<br>- Identifies risks to information assets<br>- Analyzes likelihood and impact<br>- Determines acceptable risk levels<br>- Selects risk treatment options<br>- Reviews risks over time</p><p>ISO 27001 is explicit in its requirement for a risk-based approach. Controls are not implemented because they appear in some standard somewhere, but because they mitigate identified risks. SOC 2, while less prescriptive, still expects organizations to demonstrate that risks have been identified and addressed through controls.</p><p>Risk management does not require mathematical precision (though there are approaches such as <a href="https://www.fairinstitute.org/?ref=secjuice.com">FAIR</a>, that rely heavily on mathematical calculations). Auditors expect <strong>consistency </strong>- assess risks using the same criteria each time, document them in the same way, and review at a defined cadence (often it&apos;s expected to be at least annually).</p><p>Equally important is ownership. Every significant risk must have a named risk owner - someone accountable for accepting, mitigating, transferring, or avoiding that risk. When risk ownership is absent, risk acceptance becomes accidental instead of intentional.</p><h2 id="roles-and-responsibilities-eliminating-the-accountability-gap">Roles and Responsibilities: Eliminating the Accountability Gap</h2><p>A common audit finding across both ISO 27001 and SOC 2 is <strong>unclear responsibility</strong>. Tasks are performed and decisions are made;, but ownership is vague and authority is implied rather than documented.</p><p>A governance policy needs to clearly define:<br>- <strong>Sponsorship</strong> from executive leadership for the security program<br>- <strong>Responsibility</strong> for maintaining policies<br>- <strong>Authority</strong> to approve exceptions and accept risk<br>- <strong>Accountability</strong> for system and data ownership</p><p>This doesn&#x2019;t require a large security team, btw. In smaller organizations, individuals often hold multiple roles (a lot of responsibility can be crammed in <em>Security Manager</em>). What matters isn&#x2019;t separation, but clarity. Auditors want to see that someone has both the authority <strong>and</strong> responsibility to make security decisions.</p><p>Clearly defined roles also reduce friction internally (friction can be good when it puts the brakes on to keep from crashing, but too much and it moves beyond <em>irritating</em> to become <em>detrimental</em>). With documented expectations, security stops being perceived as arbitrary and starts to be predictable and fair.</p><h2 id="what-auditors-look-for">What Auditors Look For</h2><p>When auditors assess governance, they&#x2019;re looking for alignment, not volume. A small, well-integrated set of documents is often more effective than an extensive library of disconnected policies.</p><p>Auditors look for:<br>- Management approval of the Information Security Policy<br>- Evidence that risk assessments are performed and updated<br>- Clear assignment of responsibilities<br>- Consistency between governance documents and operational controls</p><p>Perhaps most importantly, auditors look for <strong>intent</strong>. Controls should exist because risks were identified. Relevant risks should be accepted because leadership understands the implications, not because they want to avoid hassle. Nothing should exist simply because &#x201C;the framework said so.&#x201D; Having said that, some regulated industries have rigorous frameworks that already outline what needs to be done. So &#x201C;the framework said so&#x201D; is a requisite starting point, and those mandatory controls really do have to be in place &#x2013; take them seriously, and as needed, go beyond to ensure proper data security. But also, in the spirit of &#x201C;reasonable security,&#x201D; don&#x2019;t take them further than they need to be taken &#x2013; no sense spending $1 million to protect only $500K of assets. Some examples of rigorous particulars are NIST, HIPAA, HITECH, HITRUST, and PCI-DSS.</p><h2 id="common-pitfalls-to-avoid">Common Pitfalls to Avoid</h2><p>Organizations can easily undermine governance unintentionally. Common mistakes include:</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Treating the Information Security Policy as a boilerplate document</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Performing risk assessments once and never revisiting them</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Allowing risk acceptance without executive awareness</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Failing to document who owns which decisions</p><p>Here&#x2019;s how to overcome these Pitfalls:</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Make it your own! After having written policies several times in a few organizations, I&#x2019;ve noticed that it&#x2019;s difficult whether you create a new policy from scratch, or rewrite existing policies. Lean on your own preference &#x2013; do you like to create written documents anew? Or do you like to rewrite? The only proper thing to do is to Get. It. Done. But, once you&#x2019;re done, it&#x2019;s easy to update.</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Risk assessment needs to be annual &#x2013; put it in your calendar with ample reminders. Make it an annual meeting with other involved &#x2013; and let them know if they can&#x2019;t make it, they need to send someone as a delegate. No exceptions &#x2013; consider it a baseline or foundation.</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Even in small orgs, email it to all involved or affected (aka, stakeholders). You can even say, &#x201C;If there are no changes by XYZ date, I&#x2019;ll take that as acceptance.&#x201D; That way, you don&#x2019;t have to follow up with everyone.</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Don&#x2019;t just write someone&#x2019;s name down and leave it. They need to be reminded, and that falls to the ISMS lead. Others have many other responsibilities, and it&#x2019;s easy for them to forget about this and/or let this go. This is where Project Management skills come into play. Take the lead to put it on their calendar, or remind yourself to email them a reminder, about a time to renew and review. Make it part of the org direction, not just a single person&#x2019;s idea, and that will help get (though not guarantee) agreement on the teamwork.<br><br></p><p>These gaps don&#x2019;t necessarily cause immediate problems, but they always surface during audits. Or &#x2013; regrettably - after a breach, when decisions must be explained under scrutiny. One of the worst things to have to say on the stand is, &#x201C;We weren&#x2019;t aware of those risks.&#x201D;</p><h2 id="governance-as-a-force-multiplier">Governance as a Force Multiplier</h2><p>Strong governance does more than satisfy auditors. It simplifies every other policy that follows. When objectives are clear and risk tolerance is defined, access control decisions become easier. Incident response becomes more decisive. Vendor risk discussions become more productive.</p><p>In many ways, governance is a force multiplier. It allows smaller teams to operate effectively and larger teams to stay aligned. It transforms security from a reactive function into a managed program.</p><p>As this series continues, each subsequent policy builds on the foundation established here. Without governance, controls exist in isolation. With governance, they become part of a coherent system.</p><h2 id="afterword-about-infosec-policy-and-infosec-policies">Afterword about Infosec <em>Policy </em>and Infosec <em>Policies</em></h2><p>This primary <em>Infosec Policy</em> can be confused with the <em>Infosec policies</em>. Yes, it&#x2019;s weird. Some places will ask for your information security policy AND your information security policies. Well, which is it? Here&#x2019;s an explainer if you&#x2019;re stuck.</p><p>The Information Security Policy is just as described in this article - it&#x2019;s the overarching source, the foundation, of all-things-infosec.</p><p>The infosec policies (plural) are all the other policies involved &#x2013; access control, backup/restore, physical security, password management, etc.</p><p>There&#x2019;s no way around it: for a good ISMS, you&#x2019;re going to have numerous policies. A distractor is that policies are often thought of in the way they used to be many years ago &#x2013; cumbersome, full of irrelevant legalese, written for the erudite and not the common person.</p><p>Policies have changed. Yes, they still have to have certain legal wording in them; yes, there have to be several; yes, they have to be updated, documented, and readily available. However, they don&#x2019;t have to be as long as some may think. To rephrase a saying, this isn&#x2019;t your grandad&#x2019;s infosec policy.</p><p>SMBs often have a choice in how they work on their entire policy book &#x2013; an all-in-one (AIO) document, or all separate. If AIO, then it&#x2019;s just one long document that people have to read and acknowledge. But it&#x2019;s long and can be tedious to navigate.</p><p>If separate, then they&#x2019;re easier to update, not having to scroll, scroll, scroll. But it can be annoying to have to open 12 separate policies.</p><p>But the org gets to decide. There&#x2019;s no right or wrong, except if you don&#x2019;t have them.</p><p>What&#x2019;s your next step? If you&#x2019;re stuck, maybe the resources below will help you along. Do the next thing, and the next thing will follow.</p><p>Happy Governing!</p><h2 id="resources">Resources</h2><p>SANS: <a href="https://www.sans.org/information-security-policy?ref=secjuice.com">https://www.sans.org/information-security-policy</a></p><p>Heimdal Security: <a href="https://heimdalsecurity.com/blog/information-security-policy-template/?ref=secjuice.com">https://heimdalsecurity.com/blog/information-security-policy-template/</a></p><p>Purplesec: <a href="https://purplesec.us/resources/it-security-policy/?ref=secjuice.com">https://purplesec.us/resources/it-security-policy/</a></p><p>Rocket Lawyer: <a href="https://www.rocketlawyer.com/business-and-contracts/employers-and-hr/company-policies/document/information-security-policy?ref=secjuice.com">https://www.rocketlawyer.com/business-and-contracts/employers-and-hr/company-policies/document/information-security-policy</a></p><p>Kordon: <a href="https://kordon.app/information-security-policy-template-free-download/?ref=secjuice.com">https://kordon.app/information-security-policy-template-free-download/</a></p><p>Cynomi: <a href="https://cynomi.com/blog/the-essential-information-security-policy-template/?ref=secjuice.com">https://cynomi.com/blog/the-essential-information-security-policy-template/</a></p><p>FRSecure: <a href="https://frsecure.com/information-security-policy-template/?ref=secjuice.com">https://frsecure.com/information-security-policy-template/</a></p><p>Hyperproof: <a href="https://hyperproof.io/resource/information-security-policy/?ref=secjuice.com">https://hyperproof.io/resource/information-security-policy/</a> </p>]]></content:encoded></item><item><title><![CDATA[SCANT: A (kind-of-decent) Framework for Ethical Deepfake Creation & Distribution]]></title><description><![CDATA[<p><strong><u>Contents</u></strong></p><ol><li>The Ethical Blueprint: Building Trust in Synthetic Media<ol><li>S&#x202F;-&#x202F;Social Benefit</li><li>C - Consent</li><li>A - Accountability</li><li>N - Non-Deception</li><li>T - Transparency</li></ol></li><li>Putting SCANT into Practice</li><li>TL;DR Checklist</li><li>It takes work!</li><li>AI - Embracing the Human</li><li>Speaking of ISO 42001</li></ol><h2 id="the-ethical-blueprint-building-trust-in-synthetic-media"><strong>The Ethical Blueprint: Building</strong></h2>]]></description><link>https://www.secjuice.com/scant-framework-for-ethical-deepfake-creation-distribution/</link><guid isPermaLink="false">696e8404f61a75041501a124</guid><dc:creator><![CDATA[Ross Moore]]></dc:creator><pubDate>Tue, 20 Jan 2026 16:10:45 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/01/crossrhythmcoffee_imagine_Scaffolding_around_a_giant_robot_th_2a9df0df-8973-4ae5-a4ed-df0a480d9ac5_2.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/01/crossrhythmcoffee_imagine_Scaffolding_around_a_giant_robot_th_2a9df0df-8973-4ae5-a4ed-df0a480d9ac5_2.png" alt="SCANT: A (kind-of-decent) Framework for Ethical Deepfake Creation &amp; Distribution"><p><strong><u>Contents</u></strong></p><ol><li>The Ethical Blueprint: Building Trust in Synthetic Media<ol><li>S&#x202F;-&#x202F;Social Benefit</li><li>C - Consent</li><li>A - Accountability</li><li>N - Non-Deception</li><li>T - Transparency</li></ol></li><li>Putting SCANT into Practice</li><li>TL;DR Checklist</li><li>It takes work!</li><li>AI - Embracing the Human</li><li>Speaking of ISO 42001</li></ol><h2 id="the-ethical-blueprint-building-trust-in-synthetic-media"><strong>The Ethical Blueprint: Building Trust in Synthetic Media</strong></h2><p>Lots of damage has been done with AI, and to keep from deep-sixing the forward-leaning tone I want in this article, I&#x2019;ll refrain from noting any details &#x2013; the internet is available for you to search to your heart&#x2019;s content. I want to start with that note because how we use AI is not just an option, like whether we want a cinnamon roll or a bagel at breakfast. AI use has meaning &#x2013; whether it&#x2019;s dark or not depends on each of us.</p><p>On the lighter side of negative consequences, more and more media influencers are posting AI videos claiming that those videos aren&#x2019;t AI, just to increase their views and to increase interaction &#x2013; drawing out those who claim, rightly, that the media truly is AI, and then arguing back and forth about its validity. Some influencers are abusing AI to waste peoples&#x2019; time for the sole benefit of the influencer; and those actions a) further erode viewers&#x2019; trust in media platforms and b) turn them against the hope of the real usefulness of AI. (plus, it wastes their time, and that time is part of life, so it really grinds on the nerves to realize that one has spent some of their life&#x2019;s breath only to be been taken for a fool). So, even on the lighter side, those consequences are eroding trust in all-things-online. But with running with the concept of &#x201C;learn to discern,&#x201D; one can beat that fraud. <a href="https://www.instagram.com/mitchckofficial/?ref=secjuice.com" rel="noreferrer">Mitch Clark </a>does an excellent job at educating on this.</p><p>For a recent cybersecurity presentation, I worked with the bots to create an ethical AI framework to fit GenAI in general. The bots gave me some decent ideas, and I prompted back and forth with them, and then moved it into my own short set that I then made into an acronym. Mnemonic devices to the rescue! This is also an example of human-in-the-loop in AI &#x2013; the robot gives some information, and there&#x2019;s back-and-forth between me and the machines, but in the end it&#x2019;s human creativity and alignment of the information presented that wins the day.</p><p>Are there other frameworks? Sure! Well-researched ones, official governmental ones, professional community-developed ones. But I wanted to make one that&#x2019;s maybe more accessible to the general public. Will it fail to gain traction? Certainly! But I have today, and maybe someone will read this and either learn something, or think &#x201C;I can do better&#x201D; and I will have accomplished a goal of forcing others to write better things because I wrote a so-so thing. (I do this at home &#x2013; I throw out weird, and even bad ideas, and that forces the kids to create better ideas &#x1F60A; )</p><p><strong>SCANT</strong> is a concise and actionable set of principles designed to keep AI-generated media safe, respectful, and trustworthy.</p><p>Why SCANT? <strong><em>Scant</em></strong> <a href="https://www.merriam-webster.com/dictionary/scant?ref=secjuice.com">means</a> &#x201C;falling short of what is normal, necessary, or desirable.&#x201D; I decided to keep it because it&#x2019;s an insufficient approach, but may be simple enough to either work as-is or urge others on to make their own. AI is still a nascent field, and a good improvement would be for those involved in the field to either adopt or form their own workable models for evaluating how AI is developed in their org, even if it&#x2019;s nothing fancy.</p><p>Yes, of course there&#x2019;s <a href="https://kpmg.com/ch/en/insights/artificial-intelligence/iso-iec-42001.html?ref=secjuice.com">ISO 42001</a> ! There are great things happening around the world. Those can be expensive and cumbersome, though just knowing the principles and proceeding accordingly is a great way to show others how you align your AI practices with the international standard. SCANT is simply a &#x201C;pet project,&#x201D; if you will, so I thought I&#x2019;d bring it in the open.</p><p><em>NOTE: The term &#x201C;deepfake&#x201D; is often used to describe unethical use of high-quality GenAI, but the term is actually used for any of those high quality results. Throughout this article, deepfake is used for the final product, not simply for the deceptive kind.</em></p><h2 id="scant">SCANT</h2><p><strong>S - Social Benefit</strong></p>
<p><strong>The Goal?</strong> Deploy deepfake technology only when it creates a positive impact for individuals, communities, or society at large.</p>
<div class="joplin-table-wrapper"><table><tbody><tr><th><p>Why it matters</p></th><th><p>How to achieve it</p></th><th><p>Examples</p></th></tr><tr><td><p>Avoids harm<br>Unchecked manipulation can erode trust, fuel harassment, or amplify misinformation.</p></td><td><p><strong>Purpose&#x2011;first assessment</strong></p><ul><li>Before any generation, ask:&#xA0;&quot;What problem am I solving?&quot;</li><li>Even simpler, answer &quot;Why?&quot;</li><li>Benefit&#x2011;impact analysis</li><li>Weigh expected social gains (<em>education, accessibility, art</em>) against possible negative externalities (<em>misrepresentation, emotional distress</em>).</li></ul><p><strong>Stakeholder consultation</strong></p><ul><li>Involve affected groups (e.g., subjects of the synthetic video, target audiences) early in the design phase.</li></ul></td><td><p>&#x2022; Using a deepfake to recreate a historic figure for a museum exhibit that teaches history.<br>&#x2022; Generating realistic sign&#x2011;language avatars for deaf learners.<br>&#x2022; Avoiding deepfakes that glorify violent extremist propaganda.</p></td></tr><tr><td><p>Promotes public good&#xA0;<br>Aligns technology with broader societal goals (digital literacy, cultural preservation).</p></td><td><p><strong>Tie to measurable outcomes&#xA0;</strong></p><ul><li>Define KPIs (e.g., number of students reached, reduction in accessibility barriers).</li></ul><p><strong>Iterative review</strong></p><ul><li>Reevaluate benefit after deployment; discontinue if harms emerge.</li></ul></td><td><p>&#x2022; A deepfake&#x2011;based language&#x2011;learning app that improves pronunciation for non&#x2011;native speakers.</p></td></tr></tbody></table></div>
<p><strong>C - Consent</strong></p>
<p><strong>Goal:</strong> Secure explicit and informed permission from every person whose likeness, voice, or mannerisms are used.<br>
<em>(Are voice trademarks the path forward? See this article re: Matthew McConaughey trademarking his voice</em> <a href="https://analystip.com/matthew-mcconaughey-trademark-himself-to-stop-ai-clones/?ref=secjuice.com"><em>https://analystip.com/matthew-mcconaughey-trademark-himself-to-stop-ai-clones/</em></a> <em>)</em></p>
<table>
<thead>
<tr>
<th>Core elements</th>
<th>Practical steps</th>
<th>Case handling</th>
</tr>
</thead>
<tbody>
<tr>
<td>Informed   <br>Explain what the synthetic media will depict, where it will appear, and how long it will remain online.</td>
<td>&#x2022; Provide a plain&#x2011;language consent form that includes:  <br>&#x25E6; Description of the generated content  <br>&#x25E6; Intended distribution channels  <br>&#x25E6; Rights to withdraw consent later</td>
<td>&#x2022; If a celebrity&apos;s image is required for a parody, obtain a signed release from the talent agency or the individual&apos;s legal representative</td>
</tr>
<tr>
<td>Freely given   <br>No coercion, undue pressure, or hidden incentives.</td>
<td>&#x2022; Allow the subject to decline without penalty.  <br>|&#x2022; Record consent separately from any unrelated agreements (<em>e.g., employment contracts</em>).</td>
<td>&#x2022; For archival footage where the original subject is deceased, seek permission from next&#x2011;of&#x2011;kin or estate holders</td>
</tr>
<tr>
<td>Specific &amp; revocable  <br>Consent must be tied to a particular use&#x2011;case and can be withdrawn at any time.</td>
<td>&#x2022; Store consent metadata (timestamp, version, scope) alongside the generated asset.  <br>&#x2022; Implement a &quot;right to be forgotten&quot; workflow that can purge or replace the synthetic media on demand.</td>
<td>&#x2022; If a participant later objects to a political satire video, promptly remove the clip from all platforms and replace it with a disclaimer or a non&#x2011;synthetic alternative.</td>
</tr>
<tr>
<td>Verification  <br>Authenticate the signer to prevent forged releases.</td>
<td>&#x2022; Use digital signatures or two&#x2011;factor verification.</td>
<td>&#x2022; For minors, obtain parental/guardian consent and retain proof of age.</td>
</tr>
</tbody>
</table>
<p><strong>A - Accountability</strong></p>
<p><strong>Goal:</strong> Ensure that creators, distributors, and platform operators can be identified, held responsible, and answerable for the consequences of synthetic media.</p>
<table>
<thead>
<tr>
<th>Accountability axis</th>
<th>Recommended mechanisms</th>
<th>Example actions</th>
</tr>
</thead>
<tbody>
<tr>
<td>Attribution   <br>Embed immutable provenance data with every generated file.</td>
<td>&#x2022; Metadata tags (creator ID, model version, date, purpose).  <br>&#x2022; Cryptographic hash signed by the creator&apos;s private key.</td>
<td>A journalist publishing a deepfake interview includes a signed <a href="https://dev.to/drazenbebic/what-is-json-ld-a-developers-guide-to-structured-data-4l0l?ref=secjuice.com">JSON&#x2011;LD</a> block that records the AI model used and the editorial intent.</td>
</tr>
<tr>
<td>Governance  <br>Adopt internal policies that define permissible uses, escalation paths, and sanctions.</td>
<td>&#x2022; Create a Deepfake Ethics Board (<em>legal, technical, PR, ethicists</em>).  <br>&#x2022; Present a <em>Responsible&#x2011;AI Charter</em> or <em>AI AUP</em> that employees must acknowledge.</td>
<td>If a marketing team attempts to launch synthetic endorsement without clearance, the board halts the campaign and imposes remedial training.</td>
</tr>
<tr>
<td>Liability   <br>Clarify legal responsibilities in contracts and terms of service.</td>
<td>&#x2022; Include indemnification clauses for misuse by downstream parties.  <br>&#x2022; Specify penalties for violating consent or transparency rules.</td>
<td>A SaaS provider that hosts user&#x2011;generated deepfakes must delete infringing content within 48 hours of a valid takedown request.</td>
</tr>
<tr>
<td>Auditability  <br>Enable independent verification of compliance.</td>
<td>&#x2022; Maintain tamper&#x2011;evident logs of generation parameters, consent receipts, and distribution events.  <br>&#x2022; Allow third&#x2011;party auditors to review logs on a scheduled basis.</td>
<td>An external regulator audits the logs of a political&#x2011;campaign deepfake library and confirms all videos carry proper consent documentation.</td>
</tr>
<tr>
<td>Remediation  <br>Have clear processes for addressing harms after release.</td>
<td>&#x2022; Rapid&#x2011;response team to issue corrections, removals, or apologies.  <br>&#x2022; Compensation framework for victims of defamation or emotional distress.</td>
<td>After a deepfake prank causes reputational damage, the creator posts a public correction, removes the video, and offers a settlement to the affected party.</td>
</tr>
</tbody>
</table>
<p><strong>N - Non&#x2011;Deception</strong></p>
<p><strong>Goal:</strong> Prevent the intentional misleading of viewers; synthetic media should be used to educate, entertain, or augment reality - not to fabricate false narratives.</p>
<table>
<thead>
<tr>
<th>Principle</th>
<th>Implementation tactics</th>
<th>Real&#x2011;world illustration</th>
</tr>
</thead>
<tbody>
<tr>
<td>Intent clarity   <br>The primary purpose must be obvious (art, satire, education).</td>
<td>&#x2022; Use visual cues (<em>watermarks, borders</em>) that signal synthetic origin.  <br>&#x2022; Pair the video with an introductory caption (&quot;<em>This is a simulated reconstruction</em>&quot;).</td>
<td>A documentary about a historical battle includes a deepfake reenactment labeled &quot;<em>Recreated using AI</em>&quot;.</td>
</tr>
<tr>
<td>Avoid covert manipulation   <br>Do not splice authentic footage with synthetic parts without disclosure.</td>
<td>&#x2022; Run a content&#x2011;integrity check that flags any mixing of real and generated frames.  <br>&#x2022; Require a dual&#x2011;review (technical + editorial) before publishing.</td>
<td>A news outlet refuses to air a clip that merges a politician&apos;s real speech with AI&#x2011;generated statements.</td>
</tr>
<tr>
<td>Respect contextual truth  <br>Synthetic media must not alter the factual context of the original subject.</td>
<td>&#x2022; Preserve metadata indicating the original source material and any modifications applied.  <br>&#x2022; Disallow deepfakes that change a person&apos;s expressed opinions on contentious issues.</td>
<td>A <a href="https://www.wired.com/story/ai-deepfakes-are-impersonating-pastors-to-try-and-scam-their-congregations/?ref=secjuice.com">deepfake video of a pastor</a> urges donations to a fake need, and the donors send lots of money to the criminal.</td>
</tr>
<tr>
<td>Educate audiences  <br>Promote media&#x2011;literacy so viewers can recognize synthetic content.</td>
<td>&#x2022; Provide educational resources (guides, tutorials) alongside the media.  <br>&#x2022; Partner with fact&#x2011;checking organizations to flag deceptive uses.</td>
<td>A streaming platform offers a &quot;<em>How to Spot AI&#x2011;Generated Videos</em>&quot; mini&#x2011;course linked from every deepfake title page.</td>
</tr>
</tbody>
</table>
<p><strong>T - Transparency</strong></p>
<p><strong>Goal:</strong> Make it <strong>unmistakably</strong> clear that a piece of media is synthetically generated; and disclose the technical provenance behind it.</p>
<table>
<thead>
<tr>
<th>Transparency facet</th>
<th>Recommended practice</th>
<th>Sample wording</th>
</tr>
</thead>
<tbody>
<tr>
<td>Synthetic label  <br><em>(e.g., SynthID:</em> <a href="https://deepmind.google/models/synthid/?ref=secjuice.com"><em>https://deepmind.google/models/synthid/</em></a> <em>)</em></td>
<td>Add a persistent, machine&#x2011;readable marker (e.g., EXIF tag, embedded JSON&#x2011;LD) stating &quot;synthetic media&quot;.</td>
<td>&lt;meta property=&quot;og:type&quot; content=&quot;synthetic_video&quot;&gt;</td>
</tr>
<tr>
<td>Model disclosure</td>
<td>Publish the exact AI model name, version, and training dataset characteristics.</td>
<td>&quot;Generated with Tabled Confusion v2.1, trained on LAION&#x2011;5B (publicly licensed images).&quot;</td>
</tr>
<tr>
<td>Generation parameters <em>(e.g., <a href="https://docs.cloud.google.com/vertex-ai/generative-ai/docs/multimodal/content-generation-parameters?ref=secjuice.com">https://docs.cloud.google.com/vertex-ai/generative-ai/docs/multimodal/content-generation-parameters</a>)</em></td>
<td>Record seed values, prompts, post&#x2011;processing steps, and any human&#x2011;in&#x2011;the&#x2011;loop edits.</td>
<td>&quot;Seed: 123456789; Prompt: &apos;Ambassador delivering a speech on geopolitics; Upscaled 4&#xD7; with ESRGAN.&quot;</td>
</tr>
<tr>
<td>Human oversight</td>
<td>State whether a human curated, edited, or approved the output.</td>
<td>&quot;Edited by senior editor for factual consistency.&quot;</td>
</tr>
<tr>
<td>Availability of provenance</td>
<td>Host a public ledger or API where anyone can query the metadata for a given asset ID.</td>
<td>&quot;Lookup ID abc&#x2011;def&#x2011;123 at <a href="https://xn--syntheticregistry-yz2j.example.com/abc-def-123.%E2%80%9D?ref=secjuice.com">https://synthetic&#x2011;registry.example.com/abc-def-123.&quot;</a></td>
</tr>
<tr>
<td>Clear visual cue</td>
<td>Apply a subtle watermark or overlay that reads &quot;AI&#x2011;Generated&quot; without obscuring the content.</td>
<td>A semi&#x2011;transparent banner across the bottom&#x2011;right corner.</td>
</tr>
</tbody>
</table>
<h2 id="putting-scant-into-practicea-mini-workflow">Putting SCANT into Practice - a mini-workflow</h2><ol><li><strong>Idea Generation</strong><ul><li>Conduct a&#xA0;<em>Social Benefit</em>&#xA0;questionnaire</li><li>Draft a&#xA0;<em>Purpose Statement</em>&#xA0;and identify target audiences</li></ul></li><li><strong>Consent Acquisition</strong><ul><li>Send a consent package (explanation + digital signature)</li><li>Store signed consent with timestamped metadata</li></ul></li><li><strong>Model Selection &amp; Documentation</strong><ul><li>Choose an AI model, note version, training data, and any fine&#x2011;tuning.</li><li>Log all generation parameters in a tamper&#x2011;evident ledger</li></ul></li><li><strong>Creation &amp; Attribution</strong><ul><li>Generate the deepfake, embed provenance metadata, and apply a visual&#xA0;<em>Transparency</em>&#xA0;watermark</li><li>Record the creator&#x2019;s identity and any human post&#x2011;processing</li></ul></li><li><strong>Review &amp; Accountability Check</strong><ul><li>Submit the asset to the internal&#xA0;<em>Ethics Board</em>&#xA0;for&#xA0;<em>Non&#x2011;Deception</em>&#xA0;and&#xA0;<em>Social Benefit</em>&#xA0;validation</li><li>Verify that&#xA0;<em>Consent</em>&#xA0;and&#xA0;<em>Transparency</em>&#xA0;requirements are satisfied</li></ul></li><li><strong>Publication</strong><ul><li>Release the content on chosen platforms with clear labeling (e.g., &#x201C;Synthetic Media &#x2013; For Educational Purposes&#x201D;)</li><li>Provide a public link to the <a href="https://www.splunk.com/en_us/blog/learn/digital-provenance.html?ref=secjuice.com" rel="noreferrer">provenance recor</a>d</li></ul></li><li><strong>Post&#x2011;Release Monitoring</strong><ul><li>Track audience reactions, complaints, or misuse reports</li><li>If a violation is detected, invoke the&#xA0;<em>Accountability</em>&#xA0;remediation plan (removal, apology, compensation)</li></ul></li></ol><h2 id="tldr-checklist">TL;DR Checklist</h2><ul><li><strong>Social Benefit:</strong>&#xA0;Purpose&#x2011;first, impact&#x2011;focused, measurable outcomes.</li><li><strong>Consent:</strong>&#xA0;Informed, freely given, specific, revocable, verified.</li><li><strong>Accountability:</strong>&#xA0;Provenance metadata, governance board, liability clauses, audit logs, remediation pathways.</li><li><strong>Non&#x2011;Deception:</strong>&#xA0;Intent clarity, no covert splicing, preserve factual context, educate viewers.</li><li><strong>Transparency:</strong>&#xA0;Persistent synthetic label, model/version disclosure, generation parameters, human&#x2011;oversight note, public provenance API, visual watermark.</li></ul><p>Embedding these SCANT principles into every stage of the GenAI lifecycle - from conception to post&#x2011;release monitoring - creates a defensible (<em>yes - you&apos;ll need to defend it to customers and/or auditors</em>) and ethically sound workflow that respects individuals, protects public discourse, and unlocks the creative and societal potential of synthetic media.</p><p>How does the typical person use this? It&#x2019;s really easy, actually (at least, it should be). Don&#x2019;t be a jerk, don&#x2019;t steal, don&#x2019;t defraud, don&#x2019;t mislead. Those bad things have been going on for a long time. Anyone on any social media has seen or taken part in news by memes, spreading mis/dis/mal information simply by passing on something revealing or shocking based only on a well-crafted meme, which probably has authority based on who shared it, but itself has no link, source, time/date stamp, or anything that remotely resembles a way to verify. Don&apos;t be part of that &quot;game&quot; - help out viewers and readers.</p><p>Humor, comedy, and satire are part of freedom of speech, so it&apos;s vital that we remain ethical in synthetic media while NOT stamping out these freedoms.</p><h2 id="it-takes-work">It takes work!</h2><p>You may notice that this is a lot of work. It should be. The capabilities of AI can&#x2019;t be taken lightly. Lives and reputations have been harmed because of the focus on Speed over Stability. While much of the software world has been driven by, &#x201C;Hey, let&#x2019;s create something simple and then build on it after we get feedback,&#x201D; so much of AI has been, &#x201C;Let&#x2019;s throw this enormous thing out that, see what happens, and then pare back from there.&#x201D;</p><p>Whatever approach is taken, the work needs to be put in to make AI a proper tool for everyone who wants to use it.</p><h2 id="aiembracing-the-human"><strong>AI - Embracing the Human</strong></h2><p>AI is powerful. Proceed cautiously. Any reputable AI offering will use cautionary words similar to, &#x201C;<em>Do not rely on AI&#x2019;s results for critical business or personal decisions.</em>&#x201D; Everyone knows that AI can be wrong&#x2026;or do they? (think of the movie, &quot;<a href="https://www.imdb.com/title/tt0343818/?ref=secjuice.com" rel="noreferrer">I, Robot</a>&quot;)</p><p>AI does not have <em>intellect</em> or <em>will</em> &#x2013; it has no <em>soul.</em> It&#x2019;s complicated, hi-tech, seemingly magical and mystical, but behind it all is a robot, a bunch of machines.</p><p>Harvard has an <a href="https://hfh.fas.harvard.edu/ai-human-flourishing?ref=secjuice.com">AI for Human Flourishing program</a>, so that&#x2019;s a good way to get insight into in-depth studies already performed on the potential full useful aim of AI.</p><p>An AI benchmark in conjunction with this program is the <a href="https://arxiv.org/html/2507.07787v1?ref=secjuice.com">Flourishing AI Benchmark</a> (FAI Benchmark). The benchmark is described as follows:</p><p>&#x201C;&#x2026;a novel benchmarking approach that evaluates LLMs across seven key dimensions of human flourishing, based on the flourishing measure developed by researchers at the Human Flourishing Program at Harvard and in collaboration with Barna and Gloo:<br><br>1. Character and Virtue (<em>Character</em>)</p><p>2. Close Social Relationships (<em>Relationships</em>)</p><p>3. Happiness and Life Satisfaction (<em>Happiness</em>)</p><p>4. Meaning and Purpose (<em>Meaning</em>)</p><p>5. Mental and Physical Health (<em>Health</em>)</p><p>6. Financial and Material Stability (<em>Finances</em>)</p><p>7. Faith and Spirituality (<em>Faith</em>)&#x201D;</p><p>A name connected to the study is Pat Gelsinger, a name you may recognize from his times as CEO of VMWare and Intel. More information here: <a href="https://techcrunch.com/2025/07/10/former-intel-ceo-launches-a-benchmark-to-measure-ai-alignment/?ref=secjuice.com">https://techcrunch.com/2025/07/10/former-intel-ceo-launches-a-benchmark-to-measure-ai-alignment/</a></p><p>From their report: &#x201C;<em>Initial testing of 28 leading language models reveals that while some models approach holistic alignment (with the highest-scoring models achieving 72/100), none are acceptably aligned across all dimensions, particularly in Faith and Spirituality, Character and Virtue, and Meaning and Purpose</em>.&#x201D;</p><p>Don&#x2019;t expect AI to speak realistically to matters pertaining to the above deficient areas. Regrettably, many have been severely and negatively affected by expecting their LLM(s) to provide precisely these kinds of ethical and life guidance.</p><p>In general, current models have the goal of helping people while not causing harm, but some important areas have been overlooked. With such powerful implications, while AI has not considered people holistically, it <em>could</em> be developed to take the whole person into account.</p><h2 id="speaking-of-iso-42001">&#xA0;Speaking of ISO 42001</h2>
<!--kg-card-begin: html-->

<p>ISO 42001 is considered <em>THE</em> international standard and
governance framework for AI. To align with ISO 42001 principles, here&#x2019;s
a high-level plausible mapping (<em>focus on <strong>plausible</strong>
- nothing official here)</em>.</p>
<table>
<colgroup>
<col style="width: 19%">
<col style="width: 21%">
<col style="width: 28%">
<col style="width: 31%">
</colgroup>
<thead>
<tr>
<th style="text-align: center;">SCANT element</th>
<th style="text-align: center;">Core idea</th>
<th style="text-align: center;">Likely ISO&#x202F;42001 area (general
description)</th>
<th style="text-align: center;">How the SCANT content supports that ISO
requirement</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>S&#x202F;&#x2013;&#x202F;Social Benefit</strong></td>
<td>Purpose&#x2011;first assessment, stakeholder consultation, measurable
outcomes, iterative review</td>
<td><strong>Purpose &amp; Context definition</strong> <br>
ISO&#x202F;42001 calls for a clear articulation of the AI system&#x2019;s intended
purpose and its alignment with societal goals. <br>
<strong>Risk &amp; Impact Assessment</strong> <br>
The standard requires systematic evaluation of potential benefits and
harms.</td>
<td>The &#x201C;purpose&#x2011;first assessment&#x201D; and KPI definition give a concrete
method for documenting purpose and measuring social impact, satisfying
the purpose&#x2011;definition and impact&#x2011;assessment clauses.</td>
</tr>
<tr>
<td><strong>C&#x202F;&#x2013;&#x202F;Consent</strong></td>
<td>Informed, freely given, specific &amp; revocable, verification of
signer</td>
<td><strong>Human&#x2011;Centred Design / Data Governance<br>
</strong>ISO&#x202F;42001 stresses obtaining lawful, informed consent for
personal data used by AI, and ensuring that consent can be
withdrawn.</td>
<td>The detailed consent workflow (plain&#x2011;language forms,
right&#x2011;to&#x2011;be&#x2011;forgotten process, digital signatures) aligns with the
standard&#x2019;s expectations for lawful data handling and respect for
individual autonomy.</td>
</tr>
<tr>
<td><strong>A&#x202F;&#x2013;&#x202F;Accountability</strong></td>
<td>Attribution metadata, governance structures (ethics board,
responsible&#x2011;AI charter), liability clauses, auditability, remediation
processes</td>
<td><strong>Governance &amp; Accountability<br>
</strong>The ISO requires defined roles, responsibilities, and
mechanisms for traceability (e.g., immutable provenance metadata) and
for handling non&#x2011;compliance. <br>
<strong>Audit &amp; Oversight</strong> &#x2013; Regular independent audits are
prescribed.</td>
<td>Embedding cryptographic hashes, establishing a Deepfake Ethics
Board, and defining indemnification and remediation steps directly
address traceability, governance, and corrective&#x2011;action
requirements.</td>
</tr>
<tr>
<td><strong>N&#x202F;&#x2013;&#x202F;Non&#x2011;Deception</strong></td>
<td>Intent clarity, avoidance of covert manipulation, contextual truth
preservation, media&#x2011;literacy education</td>
<td><p><strong>Ethical Principles</strong></p>
<ul>
<li><p><strong>Non&#x2011;Maleficence &amp; Fairness</strong> ISO&#x202F;42001
includes provisions to prevent AI from being used to deceive or cause
unjust harm. </p></li>
<li><p><strong>User Awareness</strong> The standard encourages
mechanisms that make AI&#x2011;generated content identifiable to
end&#x2011;users.</p></li>
</ul></td>
<td>Watermarks, dual&#x2011;review processes, and audience&#x2011;education
initiatives satisfy the &#x201C;prevent deception&#x201D; and &#x201C;ensure user awareness&#x201D;
aspects of the ISO.</td>
</tr>
<tr>
<td><strong>T&#x202F;&#x2013;&#x202F;Transparency</strong></td>
<td>Synthetic label (machine&#x2011;readable), model disclosure, generation
parameters, human&#x2011;oversight statement, public provenance ledger, visual
cues</td>
<td><strong>Transparency &amp; Explainability</strong> <br>
ISO&#x202F;42001 mandates that AI systems expose sufficient technical
information (model version, data provenance, generation parameters) and
that users receive understandable disclosures.</td>
<td>The checklist of metadata tags, model and parameter disclosure, and
a public provenance API maps directly onto ISO&#x2019;s
transparency&#x2011;documentation requirements.</td>
</tr>
</tbody>
</table>

<!--kg-card-end: html-->
<p>&#xA0;</p>]]></content:encoded></item><item><title><![CDATA[California Just Built a Data Deletion Tool That Actually Works (And Data Brokers Are Sweating)]]></title><description><![CDATA[California’s DROP lets consumers delete data from 1,600+ brokers in one click—but behind the scenes it raises serious security, compliance, and transparency risks.]]></description><link>https://www.secjuice.com/california-drop/</link><guid isPermaLink="false">695b550cf61a75041501a09b</guid><category><![CDATA[INFOSEC]]></category><category><![CDATA[privacy]]></category><dc:creator><![CDATA[Deepak Gupta]]></dc:creator><pubDate>Sat, 10 Jan 2026 15:17:08 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1619083382085-9452906b7157?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fGNhbGlmb3JuaWF8ZW58MHx8fHwxNzY3NTkyNjYxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1619083382085-9452906b7157?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fGNhbGlmb3JuaWF8ZW58MHx8fHwxNzY3NTkyNjYxfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000" alt="California Just Built a Data Deletion Tool That Actually Works (And Data Brokers Are Sweating)"><p>I&apos;ve been dealing with data privacy regulations for over 15 years. GDPR, CCPA, dozens of state laws&#x2014;most of them great on paper, terrible in execution. But California just launched something different.</p><p>It&apos;s called <a href="https://privacy.ca.gov/drop/about-drop-and-the-delete-act/?ref=secjuice.com">DROP (Delete Records Of Personal Data)</a>, and it&apos;s the first government-run platform that lets you nuke your data from 1,600+ data brokers with a single request. No forms per broker. No endless verification emails. One click.</p><p>Sounds too good to be true, right? Let me tell you what&apos;s actually happening under the hood.</p><h2 id="the-problem-drop-actually-solves">The Problem DROP Actually Solves</h2><p>Here&apos;s what data deletion looked like before DROP:</p><ul><li>You discover Acxiom has your data.</li><li>You submit a deletion request.</li><li>They have 45 days to respond.</li><li>You verify your identity in three different ways.</li><li>They finally delete it.</li><li>Meanwhile, 83 other brokers still have it.</li></ul><p>Want to clean them all? That&apos;s 84 separate requests, 84 verification processes, months of follow-up. Nobody does it. That&apos;s exactly why the system was broken.</p><p>The DELETE Act (AB 375) changed the game. Instead of putting the burden on consumers, it created a centralized deletion mechanism. And DROP is that mechanism.</p><h2 id="how-drop-actually-works-technical-reality">How DROP Actually Works (Technical Reality)</h2><p>When you submit a <a href="https://guptadeepak.com/californias-drop-the-first-of-its-kind-data-deletion-platform-that-could-reshape-global-privacy-standards/?ref=secjuice.com" rel="noreferrer">request through DROP</a>, here&apos;s what happens:</p><ul><li><strong>Identity Verification:</strong> California uses Login.gov for authentication. This isn&apos;t just username/password&#x2014;it&apos;s identity proofing that meets NIST 800-63-3 standards. They need to know you&apos;re actually you before they start deleting your data everywhere.</li><li><strong>Broker Notification:</strong> Your deletion request hits the California Privacy Protection Agency&apos;s system. They batch requests and distribute them to registered data brokers through their Data Broker Registry.</li><li><strong>48-Hour Window:</strong> Brokers have 48 hours to acknowledge receipt. Not 45 days to complete it&#x2014;48 hours just to say &quot;we got it.&quot;</li><li><strong>Verification Requirements:</strong> Here&apos;s where it gets interesting. Each broker has to verify it&apos;s actually your data before deletion. But they can&apos;t ask you to verify each request individually (that would defeat the purpose). So they&apos;re stuck implementing automated verification systems that work with DROP&apos;s authentication.</li><li><strong>Deletion Execution:</strong> Brokers must delete data from:<ul><li>Active databases</li><li>Backup systems (this is the hard part)</li><li>Derived datasets</li><li>Third-party systems where they&apos;ve shared your data</li></ul></li></ul><p>That last one is brutal. If Broker A sold your data to Broker B, Broker A has to track down Broker B and get them to delete it, too.</p><h2 id="the-security-nightmare-nobodys-talking-about">The Security Nightmare Nobody&apos;s Talking About</h2><p>DROP is brilliant from a consumer perspective. From a security perspective, it&apos;s terrifying. Here&apos;s why:</p><ul><li><strong>Mass Deletion Authority:</strong> Think about what DROP represents&#x2014;a single authentication that can delete data across 1,600+ organizations. That&apos;s an incredibly high-value target.</li><li><strong>Identity Theft Paradise:</strong> If someone compromises your Login.gov account, they can delete your data from every broker. Sounds good until you realize some of that data is used for fraud prevention. Suddenly, you can&apos;t open bank accounts, get credit, or verify your identity anywhere.</li><li><strong>Broker Authentication Gaps:</strong> Each broker needs to verify that the deletion request came from DROP and applies to real data. Most brokers aren&apos;t equipped for this. They&apos;re going to implement whatever&apos;s easiest, which means inconsistent security across the ecosystem.</li><li><strong>No Audit Trail for Users:</strong> You submit a request. You get confirmation that it was sent. But do you know which brokers actually deleted your data? Do you know what they deleted? Do you know if they missed anything in backup systems? Nope.</li></ul><h2 id="what-data-brokers-are-actually-doing">What Data Brokers Are Actually Doing</h2><p>I&apos;ve talked to folks at several data brokers. Here&apos;s what&apos;s happening behind the scenes:</p><ul><li>Some are building compliant systems. Automated verification, proper deletion workflows, and audit logs. It&apos;s expensive and time-consuming, but they&apos;re doing it right.</li><li>Others are taking shortcuts. &quot;Soft deletes&quot; where data gets flagged but not actually removed. Automated &quot;we can&apos;t verify this&quot; responses to slow things down. Creative interpretations of what counts as &quot;derived data.&quot;</li><li>And some are just confused. They don&apos;t have systems to track where they&apos;ve shared data. They can&apos;t identify all instances of a person&apos;s information. They&apos;re going to miss stuff&#x2014;not maliciously, just because their infrastructure can&apos;t handle it.</li></ul><h2 id="the-ccpa-compliance-trap">The CCPA Compliance Trap</h2><p>Here&apos;s the part that keeps me up at night: DROP is built on CCPA&apos;s deletion requirements. But CCPA has exceptions&#x2014;lots of them.</p><p>Brokers can keep your data if they need it for:</p><ul><li>Completing transactions</li><li>Detecting security incidents</li><li>Complying with other legal obligations</li><li>Internal uses &quot;reasonably aligned&quot; with consumer expectations</li></ul><p>That last one is a loophole big enough to drive a truck through.</p><p>So you use DROP, you get confirmation, you think you&apos;re clean. But Broker X kept 40% of your data under &quot;reasonable business purposes.&quot; You&apos;d never know unless you submitted a CCPA data request separately to see what they still have.</p><h2 id="what-actually-needs-to-happen">What Actually Needs to Happen</h2><p>DROP is a good start, but here&apos;s what would make it actually work:</p><ul><li><strong>Verification Transparency:</strong> Users need to see which brokers confirmed deletion and which ones claimed exceptions. Right now, it&apos;s a black box.</li><li><strong>Automated Monitoring:</strong> The system should periodically check if deleted data reappears. If Broker A deleted your data but Broker B (who bought it from A six months ago) still has it, you should know.</li><li><strong>Penalty Enforcement:</strong> CCPA violations can cost $7,500 per violation. But unless California actively audits brokers, there are no teeth. They need automated compliance checking, not an honor system.</li><li><strong>Data Minimization Standards:</strong> Instead of just enabling deletion, require brokers to justify why they&apos;re collecting data in the first place. Make them prove the business purpose before collection, not after.</li><li><strong>Kill Switch Limits:</strong> Right now, DROP can delete everything. There should be categories&#x2014;delete marketing data but preserve fraud prevention data, for example.</li></ul><h2 id="for-security-practitioners">For Security Practitioners</h2><p>If you&apos;re working on systems that might interact with DROP (or similar platforms that will inevitably follow), here&apos;s what you need to think about:</p><ol><li><strong>Identity verification chains:</strong> How do you verify a deletion request is legitimate when it comes through an intermediary platform?</li><li><strong>Data lineage:</strong> Can you actually track where you&apos;ve shared data? If California says delete, can you find all copies?</li><li><strong>Backup system integration:</strong> Your backup retention policy just became a compliance risk. Can you selectively delete from backups?</li><li><strong>Audit logs:</strong> You need tamper-proof records of what was deleted, when, and why. This will matter when regulators come asking.</li><li><strong>Fraud implications:</strong> What happens when someone deletes their data and then claims they never had an account? How do you prove anything?</li></ol><h2 id="the-bigger-picture">The Bigger Picture</h2><p>DROP is California&apos;s move. But it won&apos;t be the last. Europe&apos;s looking at similar centralized mechanisms. Other states will follow.</p><p>Within two years, we&apos;ll probably see a national version (or at least regional platforms that interoperate). That means identity systems need to be built for this from the ground up.</p><p>The companies that figure out privacy-preserving identity now&#x2014;where users can prove who they are without sharing unnecessary data, where deletion is clean and complete, where transparency is built in&#x2014;they&apos;re going to have a massive advantage.</p><p>The ones still treating data like it&apos;s 2010? They&apos;re going to spend the next decade in compliance hell.</p><hr><h2 id="about-the-author">About the Author</h2><p>Deepak Gupta founded and scaled a CIAM platform to serve 1B+ users, dealing with identity and privacy regulations globally. He&apos;s now building AI-powered solutions at GrackerAI and LogicBalls. More at guptadeepak.com.</p>]]></content:encoded></item><item><title><![CDATA[AI Vendor Vetting:  An OK Practice Guide]]></title><description><![CDATA[Practical guide to AI vendor vetting, covering key data, security, compliance, and risk questions to assess and manage AI third-party risks.]]></description><link>https://www.secjuice.com/ai-vendor-vetting-an-ok-practice-guide/</link><guid isPermaLink="false">69581fa4f61a75041501a031</guid><category><![CDATA[AI]]></category><category><![CDATA[Vendors]]></category><category><![CDATA[third-parties]]></category><dc:creator><![CDATA[Ross Moore]]></dc:creator><pubDate>Sat, 03 Jan 2026 00:07:37 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2026/01/crossrhythmcoffee_imagine_Cyber_detective_checking_out_an_AI__e0c29158-6c77-4422-829a-61f4d3bae9c0_2.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2026/01/crossrhythmcoffee_imagine_Cyber_detective_checking_out_an_AI__e0c29158-6c77-4422-829a-61f4d3bae9c0_2.png" alt="AI Vendor Vetting:  An OK Practice Guide"><p>Happy New Year! Many have made plans, goals, and <a href="https://today.yougov.com/society/articles/53789-americans-new-years-resolutions-2026-poll?ref=secjuice.com">resolutions for 2026</a> &#x2013; diet, exercise, business, and finance are just some of the determinations to make personal and professional changes.</p><p>While the categories are common, how each of those plays out is completely individual. How one goes about losing weight or getting fit; how much money to save or how much debt to pay off; what certifications need to be made or university classes to take &#x2013; it all depends on what you want to do, where you want to go, who you are, and who you want to be.</p><p>When reviewing vendors, there are almost just as many factors. Are you in a regulated industry? What kind of data do you hold? What&#x2019;s the maturity of the vendor review process? Public or Private sector? How much revenue is available? What role and risk classification do the potential vendors play in the org? There&#x2019;s no one-size-fits-all for the vendors, and, therefore, no way to present a single approach to solve the Gordian knot that is third-party management.</p><p>However, knowing more about what&#x2019;s involved can help create a better approach than one had before learning more.</p><p>This is NOT a best-practice guide, but I hope the following ideas will help you as you create an AI vendor vetting strategy appropriate to your company.</p><p>And just like New Year&#x2019;s resolutions, having your &#x201C;Why?&#x201D; in place is important. Proper vetting of AI vendors better protects your corporate and customer data and reputations. Not protecting these personal, private, and proprietary details could easily land an organization in legal and regulatory hot water, incurring high fines and legal fees.</p><p><em>Disclaimer: I&#x2019;m not employed by anyone I mention below, nor do I receive any kind of kickbacks, incentives, etc. There are no sponsored links or anything of the kind. Everything I link to is just to provide information.</em></p><h1 id="main-questions">Main Questions</h1><p>In short, the main information to get from the vendor includes:</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Where is the data is going?</p><p>o&#xA0;&#xA0; <em>What and where are the subprocessors?</em></p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Do they train anything on your data?</p><p>o&#xA0;&#xA0; <em>Many AI vendors train on your data depending on the pricing model. It&#x2019;s &#x201C;privacy at a price,&#x201D; but at least they&#x2019;re transparent about it (often only in the fine print, unfortunately).</em></p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; What is done to secure the data?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; What protections are in place for cross-border transfers?</p><p>o&#xA0;&#xA0; <em>Even if it&#x2019;s transferring just username and email, that could be enough to warrant a DPA (Data Protection Agreement/Addendum) or SCC (Standard Contractual Clause).</em></p><p>An aspect that complicates what matters is that the information, if available, can be anywhere on the vendor&#x2019;s site. A security statement, the Privacy Policy, DPA, Terms of Service, T7Cs (Terms and Conditions), MSA (Master Subscription Agreement), GDPR/CCPA/CPRA notice, Trust Center. It&#x2019;s fine that every company has its own site layout - it just makes it tougher when reviewing and assessing when the site designers don&#x2019;t have security review in mind. Be prepared for a trip on the ethereal highway. There have been several vendors where it was faster to go to ChatGPT or Perplexity and ask &#x201C;Does ABC have a Trust Center?&#x201D; and it gives me the URL much faster than it took me not to find it by going directly to the vendor.</p><p>Think also about those in your company, your internal customers, coworkers, and employees. What do you need them to tell you so you can make an appropriate review?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; What is the application being used for?</p><p>o&#xA0;&#xA0; Is it dev? Trial? Production? On your site or in your app?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; How many people will use it?</p><p>o&#xA0;&#xA0; One department only? Corporate-wide?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Would any customer data be involved?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Will corporate data be moved?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Is there another app already in use that would fulfill the function?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; Is GenAI involved? If so, to what extent?</p><p>&#xB7;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0;&#xA0; If there are multiple options, which option is under consideration?</p><p>Each organization has its own regulatory, compliance, security, and contractual needs, so apply the above and the following as you see fit.</p><p>Keep track of the requests! You don&#x2019;t want to get caught up in any corporate spitting matches such as &#x201C;why did you approve this?&#x201D; Actually, you could easily be caught up in those, but the primary concern is having a good and documented approach and response.</p><p>You don&#x2019;t want to have to vet the same vendor (believe me &#x2013; there are more vendors than can be kept in memory, especially when they have similar names!). Sometimes, one department doesn&#x2019;t know that another department already has it, so it could save on licensing, too (and saving money is always a plus for the business).</p><p>Have an AI AUP (Acceptable Use Policy) in place to point your company to as a constant reference. As often as possible, point to an authoritative internal source document; this will prevent lots of time with extra typing, lots of time in communicating, and prevent others from using you as the source of info each time.</p><p>If you want to get quite technical - both for questions for vendors and for answering your own customers&#x2019; questions - the AI questions in the HECVAT is an excellent resource for questions. As of this writing, it&#x2019;s version 4.1.4. <a href="https://www.educause.edu/higher-education-community-vendor-assessment-toolkit?ref=secjuice.com">https://www.educause.edu/higher-education-community-vendor-assessment-toolkit</a></p><p>&#xA0;For internal risk assessment - something you can use yourself or pass to your coworkers to fill out (though you may want to simplify it because of its complexity), this is an excellent spreadsheet from FS-ISAC here: <a href="https://www.fsisac.com/hubfs/Knowledge/AI/FSISAC_GenerativeAI-VendorEvaluation&amp;QualitativeRiskAssessmentTool.xlsx?ref=secjuice.com">https://www.fsisac.com/hubfs/Knowledge/AI/FSISAC_GenerativeAI-VendorEvaluation&amp;QualitativeRiskAssessmentTool.xlsx</a></p><p>There are innumerable determining factors in what to look for when someone requests the use of AI in your company: How are you yourself going to use it? How will your other departments use it? Will it be used in a cloud instance? Or locally? Is it being tested for inclusion in your product? Or will it just be for educational purposes? What data is going in and through it? Does it need watermarked? Is your industry regulated? What will your customers expect from the product? In what industries do your customers live? These are just some of the options to consider (and we haven&#x2019;t even touched on what resources you have to obtain, test, and maintain all-the-AI-things).</p><p>For many of the AI vendors I&#x2019;ve reviewed, I&#x2019;ve noticed a good number who have SOC 2 Type1 or 2, and ISO 27001. Before AI, many vendors didn&#x2019;t have those. So, at least AI vendors are aware of that. But what&#x2019;s strangely absent is available and solid documentation on their AI development process and internal AI use. While I&#x2019;m not often expecting ISO 42001, I&#x2019;m expecting at least &#x201C;here&#x2019;s a solid page about how we develop AI, how we address ethics, etc.&#x201D; But, often, nothing is available, not even in the SDLC.</p><p>Have some idea of what you need from the potential vendor in the form of documentation, and this can be done with a simple matrix (again, this is just a sample, in the hopes that it gives a starting point for your consideration):&#xA0;&#xA0;</p>
<!--kg-card-begin: html-->
<table class="MsoTable15Grid4Accent1" border="1" cellspacing="0" cellpadding="0" width="631" style="width:473.15pt;border-collapse:collapse;border:none;
 mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;mso-border-themetint:
 153;mso-yfti-tbllook:1184;mso-padding-alt:0in 5.4pt 0in 5.4pt">
 <tbody><tr style="mso-yfti-irow:-1;mso-yfti-firstrow:yes;mso-yfti-lastfirstrow:yes">
  <td width="150" valign="top" style="width:112.25pt;border:solid #156082 1.0pt;
  mso-border-themecolor:accent1;border-right:none;mso-border-top-alt:solid #156082 .5pt;
  mso-border-top-themecolor:accent1;mso-border-left-alt:solid #156082 .5pt;
  mso-border-left-themecolor:accent1;mso-border-bottom-alt:solid #156082 .5pt;
  mso-border-bottom-themecolor:accent1;background:#156082;mso-background-themecolor:
  accent1;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:5"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:white;mso-themecolor:background1">Vendor Risk Rating<o:p></o:p></span></b></p>
  </td>
  <td width="204" valign="top" style="width:153.0pt;border-top:solid #156082 1.0pt;
  mso-border-top-themecolor:accent1;border-left:none;border-bottom:solid #156082 1.0pt;
  mso-border-bottom-themecolor:accent1;border-right:none;mso-border-top-alt:
  solid #156082 .5pt;mso-border-top-themecolor:accent1;mso-border-bottom-alt:
  solid #156082 .5pt;mso-border-bottom-themecolor:accent1;background:#156082;
  mso-background-themecolor:accent1;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:1"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:white;mso-themecolor:background1">Security documents
  needed<o:p></o:p></span></b></p>
  </td>
  <td width="277" valign="top" style="width:207.9pt;border:solid #156082 1.0pt;
  mso-border-themecolor:accent1;border-left:none;mso-border-top-alt:solid #156082 .5pt;
  mso-border-top-themecolor:accent1;mso-border-bottom-alt:solid #156082 .5pt;
  mso-border-bottom-themecolor:accent1;mso-border-right-alt:solid #156082 .5pt;
  mso-border-right-themecolor:accent1;background:#156082;mso-background-themecolor:
  accent1;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:1"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:white;mso-themecolor:background1">AI-related content
  needed<o:p></o:p></span></b></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:0">
  <td width="150" valign="top" style="width:112.25pt;border:solid #45B0E1 1.0pt;
  mso-border-themecolor:accent1;mso-border-themetint:153;border-top:none;
  mso-border-top-alt:solid #45B0E1 .5pt;mso-border-top-themecolor:accent1;
  mso-border-top-themetint:153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:
  accent1;mso-border-themetint:153;background:#C1E4F5;mso-background-themecolor:
  accent1;mso-background-themetint:51;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:68"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">Critical<o:p></o:p></span></b></p>
  </td>
  <td width="204" valign="top" style="width:153.0pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;background:#C1E4F5;mso-background-themecolor:accent1;
  mso-background-themetint:51;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:64"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">ISO 27001, ISO 27701, SOC 2 Type 2<o:p></o:p></span></p>
  </td>
  <td width="277" valign="top" style="width:207.9pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;background:#C1E4F5;mso-background-themecolor:accent1;
  mso-background-themetint:51;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:64"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">ISO 42001, DPA, clear ToS/T&amp;Cs,
  subprocessors<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:1">
  <td width="150" valign="top" style="width:112.25pt;border:solid #45B0E1 1.0pt;
  mso-border-themecolor:accent1;mso-border-themetint:153;border-top:none;
  mso-border-top-alt:solid #45B0E1 .5pt;mso-border-top-themecolor:accent1;
  mso-border-top-themetint:153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:
  accent1;mso-border-themetint:153;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:4"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">High<o:p></o:p></span></b></p>
  </td>
  <td width="204" valign="top" style="width:153.0pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">ISO 27001, SOC 2 Type 2<o:p></o:p></span></p>
  </td>
  <td width="277" valign="top" style="width:207.9pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">DPA, ToS, subprocessors<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:2">
  <td width="150" valign="top" style="width:112.25pt;border:solid #45B0E1 1.0pt;
  mso-border-themecolor:accent1;mso-border-themetint:153;border-top:none;
  mso-border-top-alt:solid #45B0E1 .5pt;mso-border-top-themecolor:accent1;
  mso-border-top-themetint:153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:
  accent1;mso-border-themetint:153;background:#C1E4F5;mso-background-themecolor:
  accent1;mso-background-themetint:51;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:68"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">Medium<o:p></o:p></span></b></p>
  </td>
  <td width="204" valign="top" style="width:153.0pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;background:#C1E4F5;mso-background-themecolor:accent1;
  mso-background-themetint:51;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:64"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">Security policies, Privacy Policy, GDPR
  statement<o:p></o:p></span></p>
  </td>
  <td width="277" valign="top" style="width:207.9pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;background:#C1E4F5;mso-background-themecolor:accent1;
  mso-background-themetint:51;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:64"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">AI handling statement, subprocessors<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:3;mso-yfti-lastrow:yes">
  <td width="150" valign="top" style="width:112.25pt;border:solid #45B0E1 1.0pt;
  mso-border-themecolor:accent1;mso-border-themetint:153;border-top:none;
  mso-border-top-alt:solid #45B0E1 .5pt;mso-border-top-themecolor:accent1;
  mso-border-top-themetint:153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:
  accent1;mso-border-themetint:153;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal;mso-yfti-cnfc:4"><b><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">Low<o:p></o:p></span></b></p>
  </td>
  <td width="204" valign="top" style="width:153.0pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">Basic security statement, Privacy Policy,
  GDPR/CCPA statement<o:p></o:p></span></p>
  </td>
  <td width="277" valign="top" style="width:207.9pt;border-top:none;border-left:
  none;border-bottom:solid #45B0E1 1.0pt;mso-border-bottom-themecolor:accent1;
  mso-border-bottom-themetint:153;border-right:solid #45B0E1 1.0pt;mso-border-right-themecolor:
  accent1;mso-border-right-themetint:153;mso-border-top-alt:solid #45B0E1 .5pt;
  mso-border-top-themecolor:accent1;mso-border-top-themetint:153;mso-border-left-alt:
  solid #45B0E1 .5pt;mso-border-left-themecolor:accent1;mso-border-left-themetint:
  153;mso-border-alt:solid #45B0E1 .5pt;mso-border-themecolor:accent1;
  mso-border-themetint:153;padding:0in 5.4pt 0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;line-height:normal"><span style="font-size:10.5pt;font-family:" arial",sans-serif;mso-fareast-font-family: "times new roman";color:black">AI handling statement, subprocessors<o:p></o:p></span></p>
  </td>
 </tr>
</tbody></table>
<!--kg-card-end: html-->
<p>Let&#x2019;s get into the verbiage-laden details.</p><h2 id="considerations">Considerations</h2><p>All of these can be prepended with &#x201C;as needed&#x201D; or &#x201C;where applicable&#x201D; or &#x201C;depending on your risk program&#x201D; or other qualifiers. Keep that in mind when going through each &#x2013; it&#x2019;s not all required, and you may user different terminology.</p><h3 id="mapping-the-data-landscape">Mapping the Data Landscape</h3><p>Get a clear picture of where the data lives and moves. The vendor may be able to supply a&#xA0;<strong>Data Location Matrix</strong>&#xA0;that identifies the geographies, region, and cloud providers used for each data type - raw inputs, processed outputs, and logs. This matrix lets you verify that the storage locations align with your regulatory obligations (for example, there could be a requirement for &#x201C;Acme Corp. needs EU&#x2011;West for GDPR&#x2011;covered data&#x201D;).</p><p>This is often revealed in a simple Subprocessors list that shows who it is, where it&#x2019;s located, and the purpose for data transfer.<em> (hint: when you search, search for <strong>subprocessor</strong> and <strong>sub-processor</strong>  - people spell things differently.)</em></p><p>Ask for a&#xA0;<strong>Data Flow Diagram (DFD)</strong>&#xA0;that traces the journey of information from ingestion through transformation, model inference, and any outbound transfers. This is more specific and visual than the Location Matrix. The diagram needs to expose every third&#x2011;party sub&#x2011;processor (analytics services, AI request processing, backup providers, hosts, storage) so you can confirm they are covered by the same Data Processing Agreement (DPA). If the flow involves cross&#x2011;border movement, the vendor should explain which approved mechanisms (Standard Contractual Clauses, Binding Corporate Rules, or adequacy decisions) are in place.</p><p>Again, they may only be able to supply subprocessors, and that&#x2019;s generally fine; at least you know where the data goes. Also, they may not provide such detail and will only provide an overview &#x2013; not to dodge the issue, but to protect details about their infra.</p><p>Understanding the&#xA0;<strong>privacy scope</strong>&#xA0;is essential. Customers need to classify the data it will handle - personal identifiers, health records, financial details, or proprietary business information - using your company&#x2019;s data&#x2011;classification framework. Verify that the vendor follows the principles of purpose limitation and data minimization, collecting only what is strictly necessary for the AI service, and that a lawful basis or explicit consent is documented for each data category.</p><p>You may only get to see the Privacy Policy, perhaps even a DPA. Check both, plus anything like GDPR/CCPA/CPRA and other data privacy and security documents and statements. Make sure you print those and keep them.</p><p>Clarify&#xA0;<strong>retention and deletion</strong>&#xA0;policies. Define explicit retention periods for each class of data, and require the vendor to provide secure deletion methods (such as cryptographic erasure or physical shredding) on contract termination or upon your request. Auditable logs that prove deletion events should be part of the deliverables.</p><h3 id="legal-and-contractual-safeguards">Legal and Contractual Safeguards</h3><p>You probably need a <strong>Data Processing Agreement (DPA)</strong>&#xA0;if data travels anywhere other than just within the USA. Treat the DPA as a standalone annex that can be updated without renegotiating the entire contract. It must spell out the precise scope of processing, the security obligations the vendor assumes, a breach&#x2011;notification timeline of typically no more than 72&#x202F;hours (some regulated companies may push for a quicker turnaround, so be ready to negotiate), and the process for approving any sub&#x2011;processors. Include clauses that obligate the vendor to assist with data&#x2011;subject rights (access, rectification, erasure) and that grant you audit rights. Liability caps should reflect the sensitivity of the data - typically at least the total contract value - and an indemnification provision should cover breaches caused by the vendor&#x2019;s negligence.</p><p>The main point is to give contractual assurance that a customer&#x2019;s data is transferred securely (meaning, &#x201C;If you don&#x2019;t protect our data, we&#x2019;ll sue you big time&#x201D;). There&#x2019;s a misconception that under GDPR or other regulations that data can&#x2019;t be transferred at all. That&#x2019;s not the general idea; the general goals are that data transferred is a) transferred and handled properly, b) customers know as precisely as possible what data is transmitted, and c) customers know where it all goes.</p><p>This usually falls under the authority of someone who has contract signing authority, such as the Legal department or C-Suite function; it&#x2019;s often beyond the scope of someone doing vendor management to sign. But the ones handling vendor management are in the middle and need to know the process.</p><p>Demand evidence of&#xA0;industry certifications&#xA0;that match your sector&#x2019;s expectations. At a minimum, look for ISO&#x202F;27001 (information&#x2011;security management) or SOC&#x202F;2 Type&#x202F;II (service&#x2011;organization controls). Depending on the data you&#x2019;ll be sharing, additional attestations such as ISO&#x202F;27701 (privacy), PCI&#x2011;DSS (payment data), or a HIPAA Business Associate Agreement (health data) may be required. If your organization follows emerging AI&#x2011;specific frameworks - such as ISO&#x202F;42001 for AI risk management - ask the vendor to demonstrate alignment.</p><p>Unless you absolutely have to, don&#x2019;t combine &#x201C;please provide your SOC 2 Type 2 report, ISO 27001 certificate, AND then answer these 300 questions that we could answer if we actually read the documents.&#x201D; That greatly prolongs the pre-engagement phase of the procurement process. SOC 2 Type 2 and ISO 27001 - while not an ongoing assessment of vulnerabilities &#x2013; when done by good auditors are rigorous assessments and attestations of the proper functioning of security controls and an infosec management system.</p><h3 id="minimum-security-measures">Minimum Security Measures</h3><p>Not everyone is able to spend money on SOC2, ISO, or other standards. But there should be documentation available, even if it&#x2019;s by being able to request it via a contact on the site. Because GenAI and other AI services are so new, many vendors are small in staff size, rather new to the business/security/vendor review game, and are focused on providing the services rather than having a full-service site. An encouraging trend I&#x2019;ve noticed over the last few years is that vendors I re-review have an improved site, so there&#x2019;s maturity in that area.</p><p>Security starts with&#xA0;encryption. There&#x2019;s hardly anybody who doesn&#x2019;t transfer data via HTTPS/TLS, but it helps to make sure (just search for data leak and breach occurrences due to lack of foundational security to reinforce the idea that one needs to cover the bases). All data at rest should be protected with AES&#x2011;256 or stronger algorithms, while data in motion must travel over TLS&#x202F;1.2 or higher (TLS&#x202F;1.3 is preferred). Keys should be managed by a dedicated hardware security module (HSM) or a reputable key&#x2011;management service such as AWS&#x202F;KMS or Azure&#x202F;Key&#x202F;Vault.</p><p>Vendors should implement strict&#xA0;<strong>identity and access management (IAM)</strong>&#xA0;based on the principle of least privilege. Every user and service account should receive only the permissions required for its function, and privileged access must be guarded by multi&#x2011;factor authentication. Regular access&#x2011;review cycles should be in place to prune stale privileges.</p><p>Security should be baked into the&#xA0;<strong>software development lifecycle (SDLC)</strong>. Vendors should integrate static and/or dynamic application security testing (SAST/DAST) into continuous integration/continuous deployment (CI/CD) pipelines, and schedule regular penetration tests against inference APIs and model&#x2011;serving infrastructure. A public bug&#x2011;bounty or vulnerability&#x2011;disclosure program adds an extra layer of scrutiny.</p><p>Comprehensive&#xA0;<strong>monitoring and logging</strong>&#xA0;needs to be in place. Audit logs should be immutable for every data&#x2011;access event, model&#x2011;training job, and inference request, and feed them into a security information and event management (SIEM) platform that can generate real&#x2011;time alerts for anomalous behaviour. Retain logs for a period that satisfies regulatory mandates (e.g., 90&#x202F;days for GDPR).</p><p>Speaking of inference requests, find out a) what is logged, and b) who sees it. These should be in line with what&#x2019;s allowed contractually to protect privacy of employees and customers.</p><p>The vendor must maintain a documented&#xA0;<strong>incident&#x2011;response (IR) plan</strong>&#xA0;with clearly defined escalation contacts and response timelines. Evidence of at least a regular TTX is a bonus!</p><p>Clear <strong>backup and disaster&#x2011;recovery</strong>&#xA0;capabilities are also required. Be aware that cloud-hosted services in general don&#x2019;t have backup tapes. I&#x2019;ve seen so many questionnaires that insist on backup tapes. Perform daily encrypted backups stored in a geographically distinct region, and make sure the recovery&#x2011;time objective (RTO) recovery&#x2011;point objective (RPO) meet your org&#x2019;s requirements.</p><p>Verify&#xA0;<strong>physical security</strong>&#xA0;of the data centers hosting the AI workloads. Look for certifications such as SOC 2 Type 2, ISO&#x202F;27001, and on&#x2011;site controls like biometric access and 24/7 monitoring. Usually, the AI company is not the same as the host, so you&#x2019;ll be redirected to the host&#x2019;s site. Most likely, the AI company can&#x2019;t share the host&#x2019;s documentation due to being under an MNDA.</p><p><strong>NOTE RE: ATTESTATIONS</strong>: Several AI vendors rely only on their hosts attestations yet note on their own site that &#x201C;We are SOC 2 Type 2 certified and ISO 27001 compliant!&#x201D; Check closely. This kind of statement may not be purposely misleading, but rather an indication that the vendor isn&#x2019;t aware of how the attestation game needs to be played.</p><p>Your company needs to have a good handle on what it needs for the risk levels. E.g., &#x201C;for a department to use an AI-something to share notes internally, we just need Privacy Policy, basic security policies, and know where the host is,&#x201D; whereas, &#x201C;If we might embed this in our product or use it to make corporate decisions, then we need to see ISO 27001, ISO 27701, ISO 42001, SOC 2 Type 2, and the AI policies.&#x201D;</p><p>Vendor management was complicated before AI. Do what you need to do to vet properly, but don&#x2019;t make it harder than it has to be.</p><h3 id="ai-governance-within-the-vendor%E2%80%99s-organization">AI Governance Within the Vendor&#x2019;s Organization</h3><p>A mature AI vendor will manage the&#xA0;<strong>model lifecycle</strong>&#xA0;with version control for datasets, code, and trained weights&#x2014;using tools like Git combined with DVC or ML flow. Each model release should be accompanied by a&#xA0;<strong>model card</strong>&#xA0;that outlines its intended use, performance metrics, training&#x2011;data provenance, and known limitations. Automated regression testing should be triggered for every new version to guarantee that updates do not degrade accuracy or introduce regressions.</p><p>Reality: You may not need a card, and the vendor may not share model cards, but could instead point you to the model&#x2019;s site for the cards used. But at least expect a solid answer if you ask.</p><p><strong>Bias and fairness</strong>&#xA0;MUST be actively assessed. Before any model goes live, the vendor should run fairness metrics (e.g., disparate impact, equal&#x2011;opportunity scores) on representative test sets. A documented bias&#x2011;mitigation plan should be in place, and periodic re&#x2011;evaluations -at least annually - must be performed to catch drift or emerging inequities.</p><p>For high&#x2011;risk decisions, consider asking the vendor for explainability&#xA0;artifacts such as <a href="https://arxiv.org/html/2305.02012v3?ref=secjuice.com">SHAP or LIME</a> visualizations, feature&#x2011;importance rankings, and, where feasible, an API endpoint that returns a decision rationale. This transparency helps you satisfy regulatory demands (e.g., GDPR Article&#x202F;22) and builds trust with end users.</p><p>The organization should publish an&#xA0;<strong>ethical AI policy</strong>&#xA0;that addresses safety, human oversight, privacy, and non&#x2011;discrimination.</p><p>If the AI solution is mission-critical to your company, you need to have access to the AI ethics policy or statement. Insist on it. If they don&#x2019;t have it, then it doesn&#x2019;t mean it&#x2019;s a bad product - it just can&#x2019;t be used for a critical solution. You will be asked &#x2013; even audited &#x2013; to ensure that your critical vendors are on the up-and-up.</p><p>With all the AI madness (remember &#x2013; &#x201C;slop&#x201D; is the <a href="https://www.merriam-webster.com/wordplay/word-of-the-year?ref=secjuice.com">Merriam-Webster word of 2025</a>), many AI vendors may have overlooked the need to be upfront about how they treat and approach AI.</p><p>You may not have the authority to say Yay or Nay, but make sure that, when applicable, you phrase your recommendations - in a professional way - to say what issues could crop up. With so much uncertainty about AI, you want to cover yourself as much as possible (cautions, date/time stamps, controls needed, implementation guidance, etc.).</p><p>Compliance with sector&#x2011;specific regulations must be demonstrable. Map AI processes to relevant statutes - GDPR, the upcoming EU AI Act, or industry&#x2011;specific rules - and maintain a compliance register that is refreshed with each model release. You need the vendor to demonstrate compliance, but it&#x2019;s usually only done through their DPA, GDPR/CCPA/CPRA/etc. statements, Terms of Service/Terms &amp; Conditions. And a refreshed compliance register? Not likely that you can get that from each vendor, but your creativity will make it possible to put something together.</p><p>If the vendor incorporates&#xA0;third&#x2011;party pretrained models, request a license&#x2011;compliance matrix and evidence that those external assets meet the same security and privacy standards you expect from the primary provider.</p><h3 id="transparency-through-open-source">Transparency Through Open Source</h3><p>Open&#x2011;source visibility is a strong indicator of a vendor&#x2019;s commitment to accountability. If the AI solution&#x2019;s codebase should is hosted in a&#xA0;public GitHub repo, ensure that your developers and implementers keep an eye on the Issues. That Issues page is public-facing, so criminals will know about the vulnerabilities, too.</p><p>Request a&#xA0;<strong>Software Bill of Materials (SBOM)</strong>.</p><p>Assess the health of the open&#x2011;source community around the project. Active commit frequency, a diverse contributor base, and prompt issue responses are signs of a well&#x2011;maintained project; stagnation could indicate abandonment and heightened risk.</p><p>How old is the project? If it&#x2019;s just a few months old, with not many contributors, issues, or responses, it might not be for you. This doesn&#x2019;t mean that it&#x2019;s bad, but if your org is counting on a good reputation, then having a brand new vendor may harm your reputation. The project could well be worth bookmarking and revisiting later on.</p><h2 id="practical-vetting-checklist">&#xA0;Practical Vetting Checklist</h2><ol><li><strong>Data Mapping</strong>&#xA0;&#x2013; Obtain a Data&#x2011;Location Matrix, a detailed Data&#x2011;Flow Diagram, and a data&#x2011;classification report. Keep signed copies of these artifacts for audit purposes.</li><li><strong>Legal Review</strong>&#xA0;&#x2013; Secure the DPA, the URL to the vendor&#x2019;s trust center, and copies of all relevant certifications (ISO&#x202F;27001, SOC&#x202F;2, etc.).</li><li><strong>Security Audit</strong>&#xA0;&#x2013; Request the most recent penetration&#x2011;testing report and the scope of the vendor&#x2019;s ISO&#x202F;27001 Information Security Management System.</li><li><strong>AI Governance</strong>&#xA0;&#x2013; Collect model cards, bias&#x2011;audit results, and the vendor&#x2019;s AI ethics policy. These documents should be version&#x2011;controlled and regularly refreshed.</li><li><strong>Open&#x2011;Source Transparency</strong>&#xA0;&#x2013; Verify the public repository link, examine the issue backlog, and obtain an SBOM for the current release.</li><li><strong>Ongoing Monitoring</strong>&#xA0;&#x2013; Establish a quarterly review cadence for security and compliance, and define key&#x2011;performance indicators such as the percentage of issues resolved within 30&#x202F;days.</li><li><strong>Exit Planning</strong>&#xA0;&#x2013; Confirm the procedures for data return and secure deletion at contract termination, and obtain a certification of completion once the process is executed.</li></ol><h1 id="a-plea-to-ai-vendors">A Plea to AI Vendors</h1><p>AI vendors, please help ease the path of prospects and customers reviewing your product. I know the Privacy Policy is always at the bottom of a website for a reason &#x2013; many people are only concerned with how a product operates. Yet more security, IT, Dev, and Engineering teams are tasked with ensuring more than just a good UX.</p><p>It&#x2019;s surprising after all these years and technological innovations that there are so many companies that still operate slower than expect on information transfer. So often, there&#x2019;s a slowdown somewhere along the way. The internet has gotten faster, automation capabilities are incredible, and the demand for diminishing friction in all areas so that Sales can be lean is at an all-time high. And yet, even many AI companies take days before they respond to a request for security documentation.</p><p>Reviews by security and IT teams are increasing, and AI companies need to know that. Until it&#x2019;s reviewed accordingly, a sale doesn&#x2019;t happen.</p><p>Security and IT teams need to do their part, too! They need to know that they are an integral part of the operations and sales pipelines. So, the process is not always slowed by the potential vendor.</p><p>If vendors want to streamline the process, thereby making more sales and money, then it&#x2019;s critical to transfer that information as quickly as possible</p><p>It helps to have a Trust Center. I know &#x2013; brand-name Trust Centers are expensive; even if done in-house, they&#x2019;re expensive in the sense of hosting costs and maintenance hours. Even something like &#xA0;Ally Security&#x2019;s Trust Center (<a href="https://ally-security.notion.site/Ally-Security-Trust-Center-1be299d5994b45bb8c0769a32af33917?ref=secjuice.com">https://ally-security.notion.site/Ally-Security-Trust-Center-1be299d5994b45bb8c0769a32af33917</a>) is of great value to those of us who have to review apps. It can be a simple and well-structured page.</p><p>The individuals reviewing the ever-increasing list of items to ensure their corporate and customer data stays safe face a concomitant increase in what they have to look through. Is the data center noted in the MSA, or the DPA, or the Privacy Policy, or, or&#x2026;? Where&#x2019;s the list of subprocessors? What security attestations, if any, do you have? I&#x2019;ve seen so many that say they have SOC 2 and/or ISO 27001, but there&#x2019;s no sign of it on their site other than a badge. Often, I resort to ChatGPT or Perplexity to find out if there&#x2019;s a Trust Center for company ABC. Many times, I only find it via the bots. Be proud of those attestations! They&#x2019;re expensive &#x2013; so if you went through it, make it EASY to find them. Sure, you&#x2019;ll want an MNDA, especially for the confidential information in many of those reports. But make it feasible.</p><p>A couple good items to invest the time and effort in are the following free self-assessments:</p><p><strong>1.&#xA0;&#xA0;&#xA0;&#xA0; CAIQ &#x2013; CSA STAR Level 1</strong></p><p>a.&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v4/?ref=secjuice.com">https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v4/</a></p><p><strong>2.&#xA0;&#xA0;&#xA0;&#xA0; HECVAT</strong></p><p>a.&#xA0;&#xA0;&#xA0;&#xA0; <a href="https://www.educause.edu/higher-education-community-vendor-assessment-toolkit?ref=secjuice.com">https://www.educause.edu/higher-education-community-vendor-assessment-toolkit</a> </p><h1 id="iso-42001-%E2%80%93-artificial-intelligence-ai-risk-management">ISO 42001 &#x2013;&#x202F;Artificial Intelligence (AI) Risk Management</h1><p>What good AI conversation can be had without talking about ISO 42001?</p><p>ISO&#x202F;42001 establishes a&#xA0;<strong>system&#x2011;wide framework</strong>&#xA0;for identifying, assessing, treating, and monitoring risks that arise from the design, development, deployment, and use of AI systems. Its purpose? Help organizations embed responsible AI practices while still being able to reap AI&#x2019;s benefits. The standard is built around a set of&#xA0;<strong>guiding principles</strong>&#xA0;that shape every step of the AI&#x2011;risk&#x2011;management lifecycle.</p><p>If a vendor shows the ISO 42001 badge, great! But that&#x2019;s pricey, so they may say &#x201C;we are compliant with ISO 42001 principles.&#x201D; That means that, while they haven&#x2019;t passed an ISO 42001 audit, at least their AIMS (Artificial Intelligence Management System) is tracking with the international Standards. And that&#x2019;s a good thing.</p><p>While there&#x2019;s no official chart, below is an unofficial summary of those principles. I hope this chart helps in figuring out what a good AI governance program looks like.</p>
<!--kg-card-begin: html-->
<table class="MsoNormalTable" border="0" cellspacing="3" cellpadding="0" width="702" style="width:526.5pt;mso-cellspacing:1.5pt;mso-yfti-tbllook:1184">
 <thead>
  <tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes">
   <td style="padding:.75pt .75pt .75pt .75pt">
   <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
   auto;line-height:normal;background:white"><b><span style="font-size:10.5pt;
   font-family:" arial",sans-serif;color:black">Guiding Principle<o:p></o:p></span></b></p>
   </td>
   <td style="padding:.75pt .75pt .75pt .75pt">
   <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
   auto;line-height:normal;background:white"><b><span style="font-size:10.5pt;
   font-family:" arial",sans-serif;color:black">What It Means <o:p></o:p></span></b></p>
   </td>
   <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
   <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:
   auto;line-height:normal;background:white"><b><span style="font-size:10.5pt;
   font-family:" arial",sans-serif;color:black">Typical Actions &amp; Evidence<o:p></o:p></span></b></p>
   </td>
  </tr>
 </thead>
 <tbody><tr style="mso-yfti-irow:1">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Accountability &amp; Governance</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Someone is clearly responsible
  for AI decisions, risks, and outcomes. AI is governed like any other critical
  system.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Appoint AI system owner(s) <br>
  &#x2022; Define RACI for AI lifecycle <br>
  &#x2022; Establish AI governance committee or decision forum <br>
  &#x2022; Maintain AI inventory/register<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:2">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Risk-Based Approach</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Not all AI is equal&#x2014;controls
  scale with risk, impact, and context.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Perform AI risk assessments <br>
  &#x2022; Classify AI systems by impact <br>
  &#x2022; Apply stronger controls to higher-risk systems <br>
  &#x2022; Maintain risk treatment plans<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:3">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Human Oversight</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Humans retain meaningful control
  and can intervene when AI behaves unexpectedly.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Define
  human-in-the-loop/on-the-loop/in-command roles <br>
  &#x2022; Escalation and override procedures <br>
  &#x2022; Approval gates before deployment <br>
  &#x2022; Training for operators and reviewers<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:4">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Transparency &amp; Explainability</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI use is not hidden, and
  decisions can be explained at an appropriate level.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; AI use disclosures to users <br>
  &#x2022; Document intended purpose &amp; limitations <br>
  &#x2022; Explainability techniques for models where required <br>
  &#x2022; Maintain system documentation<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:5">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Fairness &amp; Non-Discrimination</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI systems are designed and
  monitored to avoid unjust bias or discriminatory outcomes.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Bias risk assessment during
  design <br>
  &#x2022; Review training data sources <br>
  &#x2022; Test outputs for disparate impact <br>
  &#x2022; Periodic fairness reviews<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:6">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Data Governance &amp; Quality</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI decisions depend on
  trustworthy, lawful, and well-managed data.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Define data sourcing standards <br>
  &#x2022; Data quality checks <br>
  &#x2022; Data provenance documentation <br>
  &#x2022; Alignment with privacy and IP requirements<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:7">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Robustness, Safety &amp; Security</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI systems perform reliably and
  are protected against misuse, failure, and attack.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Model testing and validation <br>
  &#x2022; Monitoring for drift or degradation <br>
  &#x2022; Secure model and pipeline access <br>
  &#x2022; Abuse and misuse case analysis<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:8">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Lifecycle Management</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI systems are governed from
  design through retirement&#x2014;not &#x201C;set and forget.&#x201D;<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; AI lifecycle procedures <br>
  &#x2022; Change management for models <br>
  &#x2022; Version control and rollback plans <br>
  &#x2022; Decommissioning criteria<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:9">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Continuous Monitoring &amp;
  Improvement</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif; color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI governance improves over time
  based on evidence, incidents, and lessons learned.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Ongoing performance monitoring <br>
  &#x2022; AI incident tracking <br>
  &#x2022; Internal audits and reviews <br>
  &#x2022; Corrective and preventive actions<o:p></o:p></span></p>
  </td>
 </tr>
 <tr style="mso-yfti-irow:10;mso-yfti-lastrow:yes">
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><b><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">Legal &amp; Ethical Compliance</span></b><span style="font-size:10.5pt;font-family:" arial",sans-serif;color:black"><o:p></o:p></span></p>
  </td>
  <td style="padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">AI use complies with applicable
  laws, regulations, and organizational values.<o:p></o:p></span></p>
  </td>
  <td width="266" style="width:199.5pt;padding:.75pt .75pt .75pt .75pt">
  <p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
  line-height:normal;background:white"><span style="font-size:10.5pt;
  font-family:" arial",sans-serif;color:black">&#x2022; Regulatory mapping (EU AI Act,
  sector rules) <br>
  &#x2022; Ethical AI policy <br>
  &#x2022; Contractual controls for vendors <br>
  &#x2022; Periodic compliance reviews<o:p></o:p></span></p>
  </td>
 </tr>
</tbody></table>
<!--kg-card-end: html-->
<p><strong>Happy New Year!</strong></p>]]></content:encoded></item><item><title><![CDATA[SecjuiceCON 2026]]></title><description><![CDATA[SecjuiceCON is an online event for infosec and OSINT industry insiders, and we'd love for you to talk to our audience about your wisdom and learnings.]]></description><link>https://www.secjuice.com/secjuicecon2026/</link><guid isPermaLink="false">6935b3b4f61a750415019ef4</guid><category><![CDATA[INFOSEC]]></category><dc:creator><![CDATA[Secjuice]]></dc:creator><pubDate>Sun, 07 Dec 2025 18:45:21 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2025/12/SecjuiceCON-2026-logo-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2025/12/SecjuiceCON-2026-logo-1.png" alt="SecjuiceCON 2026"><p>SecjuiceCON is an online event for infosec and OSINT industry insiders, and we&apos;d love for you to talk to our audience about your wisdom and learnings.</p><p>You might already know about our work, but Secjuice is the only<a href="https://www.secjuice.com/about-us/" rel="noreferrer"> non-profit, independent, and volunteer-led publication</a> in the information security space.</p><p>We are a private members&apos; writing club focused on cybersecurity, information security, hacking, and open-source intelligence gathering.</p><p>We believe that our value as professionals lies in our ability to share our research and knowledge with others through the written word.</p><p>We mentor hackers and help them prepare their research for publication.</p><p>Our members feel a strong sense of civic duty; it&apos;s what drives us to spread our knowledge and experiences with our community.</p><p>Defending the interests of those who hack is <a href="https://www.secjuice.com/about-us/" rel="noreferrer">within our remit</a>.</p><h2 id="call-for-presenters">Call for Presenters</h2><p>Please visit <a href="https://sessionize.com/SecjuiceCon2026/?ref=secjuice.com">https://sessionize.com/SecjuiceCon2026/</a> to submit an abstract.  </p><p>The deadline to submit is <strong>1/31/2025</strong>.</p><h2 id="conference-date">Conference Date</h2><p>Planning for Sunday, May 31, 2026</p><p>12 PM Eastern Daylight Savings Time (EDT)</p><p>4 PM Coordinated Universal Time (UTC)</p><h2 id="venue">Venue</h2><p>YouTube Premier Video</p><p><a href="https://www.youtube.com/@secjuice?ref=secjuice.com">https://www.youtube.com/@secjuice</a></p><h2 id="sponsors">Sponsors</h2><p>We thank the following sponsors.</p><p><strong>Gold Sponsors</strong></p><ul><li><a href="https://sessionize.com/?ref=secjuice.com" rel="noreferrer">Sessionize.com</a></li></ul><p><strong>Bronze Sponsors</strong></p><ul><li><a href="https://devitjobs.uk/?ref=secjuice.com" rel="noreferrer">DevITJobs.uk</a></li></ul><h3 id="want-to-sponsor-secjuicecon">Want to sponsor SecjuiceCON?</h3><p>Please email <code>conference</code> <code>at</code> <code>secjuice</code> <code>dot</code> <code>com</code> to get more details!!</p><h2 id="topics">Topics</h2><p>SecjuiceCON will cover the following topics and welcome speaker applications around these topics on any subject:</p><ul><li>Artificial Intelligence &amp; Threat Intelligence</li><li>Incident Response &amp; Digital Forensics</li><li>Security Architecture &amp; Engineering</li><li>Governance, Risk &amp; Compliance</li><li>Red, Blue &amp; Purple Teaming</li><li>Future Horizons &amp; Emerging Threats</li><li>Give Us What You Got</li></ul><h2 id="schedule-and-presenters">Schedule and Presenters</h2><p>The schedule uses the America/New_York or Eastern Daylight Time.</p><ul><li>TBD</li></ul><p>The schedule is tentative and subject to change.</p><h2 id="code-of-conduct">Code Of Conduct</h2><p>No drama, no hostility, maintain civility, or else.</p>]]></content:encoded></item><item><title><![CDATA[CMMC Final Assessment: What I Did Right, What I’d Change, and How You Can Prepare]]></title><description><![CDATA[A senior security analyst shares key lessons, wins, and improvements from completing a CMMC audit to help others prepare effectively.]]></description><link>https://www.secjuice.com/cmmc-lessons-learned/</link><guid isPermaLink="false">6935ba4df61a750415019f1f</guid><category><![CDATA[INFOSEC]]></category><dc:creator><![CDATA[Miguel A. Calles]]></dc:creator><pubDate>Sun, 07 Dec 2025 18:44:42 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2025/12/Copilot_20251207_104341.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2025/12/Copilot_20251207_104341.png" alt="CMMC Final Assessment: What I Did Right, What I&#x2019;d Change, and How You Can Prepare"><p>When I started my organization&#x2019;s CMMC journey, I knew I was stepping into one of the most important projects of my career. As a Department of Defense subcontractor, our business depends heavily on contract awards from large prime contractors. When I learned that CMMC would roll out in phases, where certified companies receive priority in Phase 1 and non-certified organizations could be excluded entirely in Phase 2.</p><p>I committed myself to:</p><blockquote><strong>&#x201C;I will not be responsible for putting this company out of business.&#x201D;</strong></blockquote><p>That clarity of purpose fueled every decision I made. We ultimately succeeded, earning a <strong>CMMC Conditional Certification with only one POAM</strong>, and later achieving the <strong>full certification</strong>. But the journey wasn&#x2019;t flawless. I am sharing what worked, what I would do differently, and how you can prepare for your own assessment.</p><h2 id="what-i-did-well"><strong>What I Did Well</strong></h2><h3 id="1-taking-the-cmmc-certified-professional-ccp-course"><strong>1. Taking the CMMC Certified Professional (CCP) Course</strong></h3><p>One of the best decisions I made early on was completing the CCP training. I was not trying to become an auditor&#x2014;I wanted to understand how auditors think.</p><p>The course gave me:</p><ul><li>A strong understanding of CMMC history and intent</li><li>Clarity on the three evaluation methods: examine, interview, test</li><li>Insight into what auditable evidence actually looks like</li></ul><p>This foundation removed guesswork and let me structure our implementation around <strong>defensible, auditable evidence</strong> instead of assumptions.</p><h3 id="2-following-a-proven-audit-preparation-plan"><strong>2. Following a Proven Audit Preparation Plan</strong></h3><p>Our Quality Manager (QM), who leads our AS9100 audits every year, gave us a plan that became the backbone of our preparation. It was simple, realistic, and highly effective:</p><p><strong>Year-long audit readiness plan:</strong></p><ul><li><strong>Step 1:</strong> Hire an external CMMC consultant to conduct an initial assessment and create an implementation plan.</li><li><strong>Step 2 (6 months later):</strong> Have the actual CMMC auditor perform a gap assessment.</li><li><strong>Step 3 (6 months later):</strong> Conduct the pre-assessment&#x2014;the final gate before the real assessment.</li></ul><p>This phased approach made expectations clear and prevented surprises late in the journey.</p><h3 id="3-using-an-auditing-firm-we-already-knew"><strong>3. Using an Auditing Firm We Already Knew</strong></h3><p>We selected the same audit organization that handles our other certifications.</p><p>That mattered because:</p><ul><li>They already understood our business operations.</li><li>We didn&#x2019;t waste assessment time explaining our structure.</li><li>They referred us to a consultant whom they trusted and worked well with.</li></ul><p>Relationships matter in this process. Familiarity reduced friction and helped us avoid misunderstandings during evidence inspection.</p><h3 id="4-implementing-requirements-in-house-with-help"><strong>4. Implementing Requirements In-House (With Help)</strong></h3><p>We chose to implement the consultant&#x2019;s findings ourselves rather than outsourcing every change. It wasn&#x2019;t always fast&#x2014;but it worked.</p><p>Benefits of the DIY approach:</p><ul><li>We built internal competency.</li><li>We tailored policies and procedures to our real business operations.</li><li>We avoided forcing the company to conform to &#x201C;canned&#x201D; templates.</li></ul><p>Ironically, during our final assessment, we learned that our consultant&#x2019;s other clients had more findings than we did. That validated our more hands-on approach.</p><h3 id="5-setting-realistic-expectations-with-leadership"><strong>5. Setting Realistic Expectations With Leadership</strong></h3><p>I made it clear early on that the goal wasn&#x2019;t a perfect 110 score.</p><p>The real objective was:</p><ul><li><strong>Pass all 3-point and 5-point controls</strong>, and</li><li>Get at least <strong>80% with allowable POAMs</strong></li></ul><p>This mindset kept leadership aligned and supportive. When we earned a conditional certification with one POAM, they understood it was a success, not a failure.</p><h2 id="what-i-wish-i-had-done-differently"><strong>What I Wish I Had Done Differently</strong></h2><h3 id="1-securing-an-executive-level-champion"><strong>1. Securing an Executive-Level Champion</strong></h3><p>I reported to an IT Manager who didn&#x2019;t have enough organizational influence to push company-wide changes. I was four levels down from the CEO, yet responsible for implementing policies that affected the entire organization.</p><p>Without a champion at the director/VP/C-suite level:</p><ul><li>I spent countless hours negotiating and socializing changes.</li><li>Adoption took longer than it needed to.</li><li>Enforcement became a constant battle.</li></ul><p>If I could start over, <strong>I would secure an executive sponsor from day one</strong>. It would be someone who could clear resistance and endorse changes from the top.</p><h3 id="2-defining-a-cmmc-enclave-early"><strong>2. Defining a CMMC Enclave Early</strong></h3><p>Our leadership wanted the <strong>entire company</strong> to be certified instead of just the handful of employees who actually handle CUI. Looking back, this was one of our biggest inefficiencies.</p><p>The analogy I use is PCI compliance: Imagine certifying a 500-employee company for credit card handling when only 10 employees actually process payments. Now everyone&#x2014;from custodians to executives&#x2014;must take PCI training and follow PCI procedures.</p><p>That&#x2019;s what we did with CMMC, and that added an excessive and unnecessary burden to everyone.</p><p>Yet, having a small, well-structured enclave would have:</p><ul><li>Reduced training</li><li>Eliminated unnecessary policy scope</li><li>Simplified implementation</li><li>Reduced audit burden</li><li>Improved overall compliance</li></ul><p>I strongly recommend assessing whether your organization truly needs enterprise-wide certification&#x2014;or if an enclave is the smarter path.</p><h3 id="3-involving-the-quality-manager-earlier"><strong>3. Involving the Quality Manager Earlier</strong></h3><p>Leadership was anxious about whether we would pass, so they instructed the QM to audit all evidence during the final month before the assessment.</p><p>The result?</p><ul><li>I worked 7 days a week, rushing to restructure evidence.</li><li>We survived&#x2014;but it was unnecessary stress.</li></ul><p>If I had involved the QM throughout the entire program, the evidence format would have been clean, consistent, and audit-ready from the start.</p><h2 id="the-final-result"><strong>The Final Result</strong></h2><p>We earned a <strong>CMMC Conditional Certification with one POAM</strong> during the final assessment period.</p><p>We closed that POAM within five months and achieved <strong>full CMMC Certification</strong>.</p><p>This journey pushed me professionally and personally, and I&#x2019;m proud of the outcome. The lessons above aren&#x2019;t hypothetical: they&#x2019;re battle-tested. If you&#x2019;re preparing for your own assessment, I hope these insights help you navigate your path more efficiently and with fewer surprises.</p><h2 id="closing-thoughts"><strong>Closing Thoughts</strong></h2><p>CMMC is challenging, especially if you work for a small or mid-sized contractor. But with the right structure, the right people, and realistic expectations, it&#x2019;s absolutely achievable.</p><p>If you&#x2019;re getting ready for your final assessment:</p><ul><li>Invest in training.</li><li>Choose your partners wisely.</li><li>Secure an executive champion.</li><li>Scope your environment thoughtfully.</li></ul><p>And remember: the goal isn&#x2019;t perfection&#x2014;it&#x2019;s certification.</p><h2 id="before-you-go">Before You Go</h2><p>Wishing you much success in your CMMC certification journey.</p><p>Sign up for my mailing list at&#xA0;<a href="%%checkout_url%%" rel="noopener noreferrer nofollow">https://miguelacallesmba.medium.com/subscribe</a></p>]]></content:encoded></item><item><title><![CDATA[Unusual Journeys into Infosec Featuring Phillip Wylie]]></title><description><![CDATA[Learn about Philip Wylie's journey into infosec, including bear wrestling, getting shot, and overcoming some major challenges.]]></description><link>https://www.secjuice.com/unusual-journeys-into-infosec-phillip-wylie/</link><guid isPermaLink="false">65a4855960f891a98bddfcb6</guid><category><![CDATA[UNUSUAL JOURNEYS INTO INFOSEC]]></category><dc:creator><![CDATA[CyberSecStu 🔕]]></dc:creator><pubDate>Mon, 10 Nov 2025 10:57:00 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2022/12/bearvr-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2022/12/bearvr-1.png" alt="Unusual Journeys into Infosec Featuring Phillip Wylie"><p>Jumping into the ring for a second round of Unusual Journeys into Infosec, reaching for the ladder of inspiration we aim to pin down what makes this industry great. This week we are joined by <a href="https://twitter.com/PhillipWylie?ref=secjuice.com"><strong>Phillip Wylie</strong></a><strong> </strong>who has a really unusual journey. </p><p>I was first introduced to Phillip on <a href="https://twitter.com/TheManyHatsClub?ref=secjuice.com"><strong>The Many Hats Club</strong></a> discord where he shared his story, and even created a special role for him. When we kicked off the second season of this series, <a href="https://twitter.com/guisebule?ref=secjuice.com"><strong>Guise Bule </strong></a>asked him to reach out to me on Twitter and the rest is history, as they say.</p><p>I&apos;m a big fan of Phillip and don&apos;t want to spoil his story in this introduction, this is however, another example of how hard work, dedication, and facing into challenges really pays off. <strong>This is Phillip Wylie&apos;s Unusual Journey Into Infosec.</strong></p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.secjuice.com/content/images/2019/09/image-21.png" class="kg-image" alt="Unusual Journeys into Infosec Featuring Phillip Wylie" loading="lazy"><figcaption><span style="white-space: pre-wrap;">The Chuck Norris of Infosec!</span></figcaption></figure><p><strong>CyberSecStu (CSS): My vision for this article (or series), is to help break the illusion that you have to follow a certain route to have a career in Infosec. I have so many questions about your story, where did your journey begin?</strong></p><p><strong>Phillip Wylie (PW): </strong><em>I didn&apos;t take high school serious enough. Not finishing was never an option. My GPA was too low and my college entrance exam score was too low for my GPA. So I gave up prematurely on college. I had no idea what I wanted to do for a career. Since I was a big muscular guy from powerlifting, my friends recommended pro wrestling. This was a very interesting career path. I signed up at a wrestling school in Dallas, TX. After being trained to wrestle I started getting wrestling matches.</em></p><p><em>I wrestled in the WCW and it was at the time the WCW bought the UWF. I had several televised matches with the WCW and a wrestling federation based out of Dallas, TX called the WCCW.</em></p><figure class="kg-card kg-embed-card kg-card-hascaption"><iframe width="480" height="270" src="https://www.youtube.com/embed/videoseries?list=PL3E74C9B864DC14CB" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><figcaption><p><span style="white-space: pre-wrap;">Some of Phillip&apos;s Wrestling matches, these are so worth watching!</span></p></figcaption></figure><p><em>My pro wrestling career lasted about two years with one year of training before I got matches. I got married and got out of wrestling a little over a year later. I didn&apos;t make enough money wrestling, so my main source of income was working as a bouncer at a nightclub in my home town in Denton, TX.</em></p><p><em>The nightclub hosted special events on Sundays to bring in a crowd. Sundays were typically slow unless there was something special going on.</em></p><p><em>The nightclub planned an event which entailed a wrestling bear. It was open to anyone to wrestle the bear, but they asked me to wrestle the bear. They used my wrestling promo picture on the posters and flyers announcing the event.</em></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.secjuice.com/content/images/2019/09/image-19.png" class="kg-image" alt="Unusual Journeys into Infosec Featuring Phillip Wylie" loading="lazy"><figcaption><span style="white-space: pre-wrap;">Bear Wrestling! Its actually a thing.</span></figcaption></figure><p><em>The bear was named Sampson and he was a 750lb brown bear. There were others that wrestled the bear. I did not beat the bear, but I did the best. I won a bar tab and a T-Shirt that read &quot;I wrestled Sampson The Bear and lost.&quot;</em></p><p><em>I wrestled Sampson twice and after the first time I wasn&apos;t going to wrestle him again, but a couple hours later and taking advantage of the bar tab, the club owner easily convinced me to wrestle the bear a second time. I got out of wrestling due to getting married and needing a more stable income, I worked in retail, retail sales, restaurants, and manual labor.</em></p><p><em>After my daughter was born I realized that I needed something better with health insurance. I saw a commercial on TV about a trade school that taught computer-aided design (CAD).  I enrolled in the school. This was in the Fall of 1992. I did not have any experience with computers. I graduated in the Fall of 1993 and got a job as a CAD draftsman. I discovered after working as a draftsman, that I had more of a talent for computers. I would troubleshoot and resolve problems that my coworkers were having. In 1995 I taught myself how to build computers and I was introduced to the role of a system administrator. I learned that they made about $10 an hour more than what I was making. In 1997 I took a 90 Novell NetWare course and after completion, I went to work as a system administrator.</em></p><p><em>I worked as a system administrator from September 1997 to December 2003 and I moved into a network security role. </em></p><p><em>I worked in network security from January 2004 to September 2005. My employer hired a CISO and he separated our department into different security functions. Prior to this we all did network security. I was put in an application security role. </em></p><p><em>This role inspired me to become a pentester. In the Fall of 2011, the company I was working for announced the sale of the mortgage division, which I worked in. On the all-hands call announcing the sale, they said if the division was not sold it would be shutdown. I started to apply for jobs. In March 2012 I got a consulting job performing pentests.</em></p><p><em> I&apos;ve been pentesting since then and started teaching pentesting January 2018 at Richland College in Dallas, TX. My passion for pentesting and teaching led me to start </em><a href="http://pwnschool.com/?ref=secjuice.com"><strong><em>The Pwn School Project</em></strong></a><em> as a way to educate people on pentesting and security. I host two meetings a month. One in Dallas, TX and one in Denton, TX. I also enjoy speaking at conferences and teaching workshops.</em></p><p><strong>CSS: This is all amazing! You&apos;ve been in Infosec for a while now, what do you see as the biggest challenges for people trying to break into the industry? Second part to this, have these (OR How have these), changed from when you first started?</strong></p><p><em><strong>PW: </strong>I think the biggest challenge with people that are trying to break into the industry is finding companies that are willing to give people with no experience a chance. The best way to deal with this is through networking. Attending local infosec meetings and conferences are great ways to network. Through networking, those looking to break in the industry are able to get their resumes to hiring managers directly or from others working for the hiring company.</em></p><p><em>I think the biggest change since I started is that security jobs are a lot more in demand, but it doesn&apos;t make it easy to get into infosec. Internships are a good way for students or college grads to get into security. My wife works in DFIR and got her job through an internship</em><br></p><p><strong>CSS: Awesome, love this. Internships and apprenticeships are a decent route.</strong></p><p><strong>PW: </strong><em>It amazes me how difficult it can be and there is a shortage of security people.</em></p><p><strong>CSS: What do you think companies should be doing to help attract more people or bridge the gap?</strong></p><p><strong>PW: </strong><em>I think internships, apprenticeships, and temporary contract jobs would help bridge the gap. Companies wouldn&apos;t have to commit to long term employment and they would get to see if candidates have potential. Apprenticeships and temp contract jobs could be open to not only students or grads, but they could also be open to those moving from IT to security or those that have gone the self-study route.</em></p><p><strong>CSS: What is the best advice you&apos;ve been given by someone in infosec on your journey so far, OR you&apos;ve given?</strong></p><p><em><strong>PW:</strong> The best advice I have given is to network through local infosec meetings and conferences. Getting involved in the community makes it easier to find jobs. I got my last two full-time jobs through meetups. Networking and community involvement is a good way to share and learn. My experience with the infosec community has been rewarding and my best friends are from the community.</em></p><p><em>I share this with students and people I mentor. As well as anyone else looking for advice.</em></p><p><strong>CSS: Very close to my heart, cons and meetups are really valuable, and helped me no end when starting out.</strong></p><p><strong>Okay, so is there anything you want to share or anyone you want to give a shout out to?</strong></p><p><strong>PW: </strong><em>I<strong> </strong>would like to give a shout out to my Dallas/Fort Worth infosec and hacking community. Dallas Hackers Association has done so much to grow and improve our local community and part of the inspiration for my meetup The Pwn School Project. I would also like to give a shout out to my friend on Infosec Twitter.</em></p><p><strong>CSS: Thank you so much for sharing your story it&apos;s going to help a lot of people. One final question I have to ask (well it wasn&apos;t for sure). What was it like wrestling an actual bear?</strong></p><p><em><strong>PW:</strong> It&apos;s tough and nearly impossible. Trying to move a 750 pound bear is like trying to move a parked car, it will barely move. The bear I wrestled was very tame and like a big dog. It was a fun experience that I would not do again.</em></p><p><strong>CSS: Kudos to you for doing it though!</strong></p><p><em><strong>PW:</strong> It&apos;s probably not legal in the US anymore with the protections around animals. Even back in the late 1980&apos;s there were rules that made sure the bear got mandatory rest periods.</em></p><p><em>I was involved in </em><a href="https://twitter.com/RachelTobac?ref=secjuice.com"><strong><em>Rachel Tobac&apos;s</em></strong></a><em> </em> <em>Non-Linear Paths to InfoSec talk at BSides San Francisco in February and I use it on my slide when I was telling my story.</em></p><p><strong>CSS: That&apos;s awesome, and also glad the bear got a rest. Still the craziest thing I&apos;ve heard in a while! Thank you Phillip you&apos;re a star!</strong></p><p><strong>PW</strong>: <em>Thanks for the opportunity, Stu! I had some crazy things happen when I was younger. I was also shot when I was 15 years old.</em></p><p><strong>CSS: Wait you were shot when 15, what happened?</strong></p><p><strong>PW: </strong><em>My history of being shot, wrestling, wrestling a bear and powerlifting has earned me the nickname the Chuck Norris of infosec.</em></p><p><em>My brother was playing with a gun and shot me. He did not know that it was loaded.</em><br></p><p><strong>CSS: Damn!! That&apos;s gotta leave a mental scar, for like both of you!</strong><br></p><p><em><strong>PW:</strong> He was 11 years old and trying to impress a neighbor&apos;s kid. The bullet went in through my left arm, then into my side. It entered my lung and pumped out of my lung into my heart. From my heart it lodged into the bend of my left leg.</em></p><p><em>When the paramedics got me to the hospital, they took x-rays and saw the bullet was in my heart. They transferred me 36 miles from Denton, TX to Dallas, TX to Parkland Hospital the leading trauma center in the area and the same hospital that JFK was sent to.</em></p><p><em>When I got there they cracked my chest open and didn&apos;t see an entry wound on my heart. They took an x-ray and the bullet was no longer there. It pumped into my leg.</em><br><br><strong>CSS: <em>You&apos;re like a machine, </em>gets shot, pro wrestler, bear wrestler, and infosec pro! So they got the bullet out I assume. How long did it take to recover?</strong></p><p><em><strong>PW:</strong> It&apos;s a miracle I lived to tell about it. The bullet is still there. I have an x-ray of it.</em></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.secjuice.com/content/images/2019/09/image-20.png" class="kg-image" alt="Unusual Journeys into Infosec Featuring Phillip Wylie" loading="lazy"><figcaption><span style="white-space: pre-wrap;">The bullet is still there today!!</span></figcaption></figure><p><strong>CSS: You&apos;re like proof of no matter what happens in your life - you can still achieve anything!!!!</strong></p><p><strong>PW:</strong> The summer before I got shot I started lifted and when I wasn&apos;t sure that I would survive, I was worried about my classmates beating my bench press. <em>Years ago I did not think I had the intelligence or potential to do what I am now doing. Hopefully, it will encourage others.</em></p><p><strong>CSS: Thank you for sharing, this story  definitely will inspire loads of people.</strong><br></p><p>There is so much inspiration from this story to summarise in a mere paragraph, I think as Phillip has proven, that no matter what happens in your life, you can still achieve your potential. Again getting involved in the community, going to meetups and networking is vital to making those important connections. Having hosted, and attended many meetups, I cannot stress the importance of this! </p><p><strong>In summary, go wrestle a bear- </strong>which is now a metaphor for tackling those big fears and challenges in your life, because if you can do that, anything is possible!</p><p>The amazing image is called Arm Wrestling and is by <a href="https://dribbble.com/DaniloDeDonno?ref=secjuice.com" rel="contact"><strong>Danilo De Donno</strong></a><strong> </strong>go check them out!</p>]]></content:encoded></item><item><title><![CDATA[Four-Step Intelligence Model for Decision Making]]></title><description><![CDATA[Mars Groves explains the four steps of the OODA Loop model used in intelligence for decision-making, which is very useful for difficult and time-sensitive situations.]]></description><link>https://www.secjuice.com/time-sensitive-decision-making-with-the-ooda-loop-model/</link><guid isPermaLink="false">65a4855960f891a98bddfe90</guid><category><![CDATA[INFOSEC]]></category><category><![CDATA[CYBERSEC]]></category><dc:creator><![CDATA[Mars Groves]]></dc:creator><pubDate>Mon, 10 Nov 2025 06:12:00 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2022/01/kota-03.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2022/01/kota-03.jpg" alt="Four-Step Intelligence Model for Decision Making"><p><strong>The OODA loop is a four-step model used in intelligence for decision making that involves analyzing information and acting on it. In this article, I explain the roots of its history, its applications in combat operations, and how it can be utilized for time-sensitive decision making processes in cybersecurity, including other areas of our lives.</strong></p><h3 id="history"><br>History</h3><p>OODA is an acronym for observe, orient, decide, and act. It was developed in the 1960s by a man named John Boyd who was a Colonel in the United States Air Force as a fighter pilot, military researcher, and strategist. He came up with the concept after his experiences in the Korean War, realizing that a fighter pilot is at a disadvantage when dealing with an adversary who is more equipped and advanced than they are. The OODA loop model became developed as a result. </p><h3 id="model-of-choice">Model of Choice</h3><p>Inevitably, the OODA loop became a model of choice for combat operations, which required a decision making process that can be effectively executed during critical and time-sensitive events. Indeed, the OODA loop model was proven as effective for decision-making with its recurring cycle of observe&#x2013;orient&#x2013;decide&#x2013;act. In fact, the model can be used for any problem or issue that requires strategic decision-making. Not limited to areas such as business, medical, management, litigation, marketing, and especially cybersecurity.</p><figure class="kg-card kg-image-card"><img src="https://www.secjuice.com/content/images/2021/12/ooda-loop.png" class="kg-image" alt="Four-Step Intelligence Model for Decision Making" loading="lazy" width="496" height="495"></figure><h3 id="the-four-stages-of-the-ooda-loop-model"><br>The four stages of the OODA Loop Model</h3><p><br><strong>1. Observe:</strong><br>The <strong>Observe</strong> stage is the <strong>information gathering process</strong>. This is the stage when you gather as much information that you possibly can regarding something. For example, a doctor first needs to gather all the information they need about a patient&#x2019;s body in order to determine if anything is not functioning properly. They will observe a patient&#x2019;s body and will notice if there is abnormal swelling or pain in a particular area and take a look at their lab results to determine if further testing or treatment needs to be done. In the event that a company or organization&#x2019;s network becomes attacked, an information security or cybersecurity analyst on their technical security team is often the first to observe the network attacker, and will try to capture them by gathering logs, monitoring systems, and collecting any further information that will help them identify the attacker.<br><br><strong>2. Orient:</strong><br>The <strong>Orient</strong> stage <strong>puts the information gathered from the Observe stage into context.</strong> This is when everything is taken into account ranging from past experiences of dealing with a situation at hand or particular thing, preconceived notions, outcomes, expectations, and models. Let&#x2019;s say a doctor notices a patient has an abnormal lump in their throat about the size of a golf ball. That doctor will take into account all the past experiences he had with patients that had the same problem in order to help themselves determine what could possibly be happening, to help them determine what direction to take for treating their patient. As far as dealing with a network attacker in the prior example, orientation takes the telemetry pulled from logs and combines it with knowledge about the network, APT groups who may target networks of those particular companies and organizations, and previously identified information such as specific IP addresses, devices used, and more.<br><br><strong>3. Decide:</strong><br>The <strong>Decide </strong>stage is when <strong>the final course of action is determined </strong>after considering a variety of options, but it is NOT the stage when you officially execute an action. In the case of a doctor who sees a patient with a lump in their throat that is the size of a golf ball, they can decide if the patient has cancer and needs chemotherapy or other alternative therapies based on their observational findings and analysis. Let&#x2019;s say that the doctor decided the patient needs chemotherapy for this example. As far as dealing with the network attacker goes, this is the stage when a decision is made on whether the network attacker should continue to be observed to wait and see what their next move should be, to decide if they should be ignored instead, or if an incident-response action should be initiated. Regardless of the situation, a final course of action is decided in this stage.<br><br><strong>4. Act:</strong><br>The<strong> Act </strong>stage is when you <strong>execute the final course of action that was already decided</strong>. <em>This is when you DO the action.</em> It&#x2019;s the point of no return where there is no turning back. What&#x2019;s done is done. And it doesn&#x2019;t necessarily mean what is done will be a 100% guaranteed success. Just like the doctor who decided their patient needs chemotherapy, it doesn&#x2019;t mean that form of treatment will be 100% successful. The same applies to the network attacker (let&#x2019;s say it was finally decided to ignore them which turned out to be a terrible idea). If the course of action acted upon doesn&#x2019;t work, then we return to the whiteboard back to the OODA loop and start with the first stage of observation all over again. Observe&#x2013;orient&#x2013;decide&#x2013;act becomes the loop that we rinse and repeat. Otherwise, the Act stage is final when successful.</p><h3 id="the-importance-of-ooda-loop">The importance of OODA loop</h3><p>The OODA loop is a simple four step process that is effective for decision-making, especially when time-sensitive situations are at hand, which is an important intelligence strategy that is useful in information security. OODA reveals how important it is to gather as much information as possible before filtering out what&#x2019;s unnecessary when the context of information is considered in the orientation stage. The first two stages are critical in helping to decide what course of action needs to be acted on. <br><br>You can clearly recognize how <em>prioritization</em> in the decision-making process is crucial. For example, during the decision-making process in dealing with a particular situation at hand, it must be determined if it would be extremely destructive to ignore the situation, if it even requires an immediate or time-based response, or if it is a minor dealing that happens all the time and doesn&#x2019;t require an intense response, etc. In intelligence analysis, energy must be focused on areas that demand our attention rather than being wasted on areas that are irrelevant or out of context based on the information we gathered. We can agree that this is an important intelligence model that we can apply not just to cybersecurity, but also to everything else outside of it in our daily lives.<br><br><strong>When in doubt, use the OODA loop.</strong></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.secjuice.com/content/images/2022/01/kota-03-1.jpg" class="kg-image" alt="Four-Step Intelligence Model for Decision Making" loading="lazy" width="1200" height="1200" srcset="https://www.secjuice.com/content/images/size/w600/2022/01/kota-03-1.jpg 600w, https://www.secjuice.com/content/images/size/w1000/2022/01/kota-03-1.jpg 1000w, https://www.secjuice.com/content/images/2022/01/kota-03-1.jpg 1200w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">This eye-catching image was created by Tokyo artist </strong></b><a href="https://linktr.ee/kotayamaji?ref=secjuice.com"><b><strong style="white-space: pre-wrap;">Kota Yamaji</strong></b></a><b><strong style="white-space: pre-wrap;"> who never fails to make colors pop beautifully.</strong></b></figcaption></figure>]]></content:encoded></item><item><title><![CDATA[Five Serverless Security Tools You Need To Adopt Right Now]]></title><description><![CDATA[Heads up! You can improve the security of your serverless project using free or open source solutions that are already out there.]]></description><link>https://www.secjuice.com/5-serverless-security-tools-you-should-adopt-now/</link><guid isPermaLink="false">65a4855960f891a98bddfd6f</guid><dc:creator><![CDATA[Miguel A. Calles]]></dc:creator><pubDate>Sun, 09 Nov 2025 18:51:00 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2020/06/ccyo.gif" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2020/06/ccyo.gif" alt="Five Serverless Security Tools You Need To Adopt Right Now"><p>Hello everyone and welcome to another why you should adopt serverless computing special! There are some wonderful free or open source tools you can use to improve the security of your serverless projects. Let&apos;s explore some of them in this post.</p><h3 id="1-linters">1. Linters</h3><p>Linters help improve your code by finding common coding flaws. You would typically run them when you create a pull request, create a build, or in your CI/CD.</p><ul><li>ESLint (Node): <a href="https://eslint.org/?ref=secjuice.com">https://eslint.org</a></li><li>Pylint (Python): <a href="https://www.pylint.org/?ref=secjuice.com">https://www.pylint.org</a></li><li>golanglint (golang): <a href="https://github.com/golang/lint?ref=secjuice.com">https://github.com/golang/lint</a></li></ul><h3 id="2-dependency-checkers">2. Dependency checkers</h3><p>Your project might use dependencies, libraries, or packages. Some of these packages might be out-of-date, deprecated, or have known vulnerabilities. A dependency checker can help you find packages that need updating and create pull requests to update them automatically.</p><ul><li>npm audit (Node): <a href="https://docs.npmjs.com/auditing-package-dependencies-for-security-vulnerabilities?ref=secjuice.com">https://docs.npmjs.com/auditing-package-dependencies-for-security-vulnerabilities</a></li><li>Snyk (Node, .Net, Java, Python, and more): <a href="https://snyk.io/?ref=secjuice.com">https://snyk.io</a></li><li>Dependabot (Node, Python, Java, .Net, and more): <a href="https://dependabot.com/?ref=secjuice.com">https://dependabot.com</a></li><li>GitHub Dependabot (Node, Python, Java, .Net, and more): <a href="https://help.github.com/en/github/administering-a-repository/keeping-your-dependencies-updated-automatically?ref=secjuice.com">https://help.github.com/en/github/administering-a-repository/keeping-your-dependencies-updated-automatically</a></li></ul><h3 id="3-aws-iam-roles">3. AWS IAM Roles</h3><p>If you are using Amazon Web Services, your projects has IAM roles for your serverless functions. The Serverless Framework automatically creates one IAM role for all the functions in your configuration file. Each function should have its own IAM role to enable the Principle of Least Privilege.</p><ul><li>serverless-iam-roles-per-function Serverless plugin: <a href="https://github.com/functionalone/serverless-iam-roles-per-function?ref=secjuice.com">https://github.com/functionalone/serverless-iam-roles-per-function</a></li><li>serverless-plugin-custom-roles Serverless plugin: <a href="https://github.com/AntonBazhal/serverless-plugin-custom-roles?ref=secjuice.com">https://github.com/AntonBazhal/serverless-plugin-custom-roles</a></li><li>Collection of AWS IAM policies for the Serverless Framework: <a href="https://github.com/miguel-a-calles-mba/serverless-policies?ref=secjuice.com">https://github.com/miguel-a-calles-mba/serverless-policies</a></li></ul><h3 id="4-error-monitoring-and-alerting">4. Error Monitoring and Alerting</h3><p>Your functions may throw an error, but you may not know about it unless you manually monitor the logs or you setup an alerting system.</p><ul><li>Dashbird: <a href="https://dashbird.io/?ref=secjuice.com">https://dashbird.io</a></li><li>Sentry: <a href="https://docs.sentry.io/platforms/node/guides/aws-lambda/?ref=secjuice.com">https://docs.sentry.io/platforms/node/guides/aws-lambda/</a> and <a href="https://github.com/arabold/serverless-sentry-plugin?ref=secjuice.com">https://github.com/arabold/serverless-sentry-plugin</a></li></ul><h3 id="5-termination-protection">5. Termination Protection</h3><p>When you deploy a new AWS CloudFormation stack to production, you might want to enable termination protection to avoid accidentally deleting your stack.</p><ul><li>serverless-stack-termination-protection Serverless plugin: <a href="https://github.com/miguel-a-calles-mba/serverless-stack-termination-protection?ref=secjuice.com">https://github.com/miguel-a-calles-mba/serverless-stack-termination-protection</a></li></ul><h3 id="conclusion">Conclusion</h3><p>You can improve the security of your serverless project by taking advantage of free or open source solutions that are already out there.</p><h3 id="a-note-from-the-author">A Note from the Author</h3><p>Join my mailing list to get updates on my writings, upcoming books, and cybersecurity news. Visit <a href="https://miguelacallesmba.com/subscribe?ref=secjuice.com"><strong>https://miguelacallesmba.com/subscribe</strong></a> to join.</p><p>Stay secure, Miguel</p>
<!--kg-card-begin: html-->
<p style="text-align:left;width:100%;">
<a style="padding:8px;border-radius:4px;background-color:#0099ee;color:#fff;box-shadow:none;font-size:14px;" href="https://www.linkedin.com/in/miguel-a-calles-mba?ref=secjuice.com" target="_blank">View my <strong>linkedIn</strong> profile</a>
</p>
<p>
<a href="https://twitter.com/MiguelCallesMBA?ref_src=twsrc%5Etfw&amp;ref=secjuice.com" class="twitter-follow-button" data-size="large" data-show-count="false" target="_blank">Follow @MiguelCallesMBA</a><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</p>
<!--kg-card-end: html-->
<figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.secjuice.com/content/images/2020/06/ccyo-1.gif" class="kg-image" alt="Five Serverless Security Tools You Need To Adopt Right Now" loading="lazy" width="800" height="600" srcset="https://www.secjuice.com/content/images/size/w600/2020/06/ccyo-1.gif 600w, https://www.secjuice.com/content/images/2020/06/ccyo-1.gif 800w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">The awesome GIF used in this article is called Cute Couples and it was created by </span><a href="https://dribbble.com/jerryliustudio?ref=secjuice.com"><span style="white-space: pre-wrap;">Jerry Liu Studio</span></a><span style="white-space: pre-wrap;">.</span></figcaption></figure>]]></content:encoded></item><item><title><![CDATA[Securing Corporate Crypto: Why Your LLC’s Private Keys Matter More Than You Think]]></title><description><![CDATA[The moment your LLC decides to buy cryptocurrency, you’ve crossed a threshold that most business owners never consider: you’re now responsible for securing private keys that represent real value, but traditional corporate security frameworks were never designed for crypto.]]></description><link>https://www.secjuice.com/securing-corporate-crypto-why-your-llcs-private-keys-matter-more-than-you-think/</link><guid isPermaLink="false">6911e5ebf61a750415019e18</guid><category><![CDATA[BUYING CRYPTO WITH YOUR LLC]]></category><dc:creator><![CDATA[Mitch Miller]]></dc:creator><pubDate>Sat, 01 Nov 2025 15:06:00 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2025/11/corporate-crypto-llc.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2025/11/corporate-crypto-llc.png" alt="Securing Corporate Crypto: Why Your LLC&#x2019;s Private Keys Matter More Than You Think"><p>The moment your LLC decides to hold cryptocurrency, you&#x2019;ve crossed a threshold that most business owners never consider: you&#x2019;re now responsible for securing private keys that represent real value. This isn&#x2019;t theoretical. </p><p>This is infrastructure security at the most fundamental level.</p><p>Here&#x2019;s the uncomfortable truth: traditional corporate security frameworks were never designed for crypto. Your IT team knows how to lock down servers, manage access controls, and implement multi-factor authentication across email systems. But crypto introduces a different animal entirely. One compromised private key means total asset loss. There&#x2019;s no password reset. There&#x2019;s no support team to call. </p><p>The money is simply gone.</p><h3 id="the-attack-surface-nobody%E2%80%99s-talking-about">The Attack Surface Nobody&#x2019;s Talking About</h3><p>When your LLC buys crypto through a standard exchange, you&#x2019;re introducing new vulnerabilities into your corporate infrastructure. Exchange accounts get compromised. Not because exchanges are inherently weak, the institutional players like Coinbase Prime and Kraken have serious security, but because the human element always cracks first.</p><p>A founder gets a convincing phishing email. They click a link. Suddenly someone in Belarus has access to the exchange account. Or an employee gets socially engineered into approving a wire transfer to a wallet address that looks legitimate but isn&#x2019;t. These aren&#x2019;t hypothetical scenarios. This is what actually happens.<br></p><p>The cybersecurity implication is stark: if your LLC holds any meaningful amount of crypto, you need the same operational security protocols that nuclear facilities use. That&#x2019;s not hyperbole. It&#x2019;s proportional response to actual risk.</p><h3 id="private-key-management-the-hardest-problem-in-crypto">Private Key Management: The Hardest Problem in Crypto</h3><p>Every security team knows the fundamental challenge: how do you secure something that, by design, cannot be recovered if lost? Traditional password management systems don&#x2019;t work here. You can&#x2019;t hash a private key and store it in a database. You can&#x2019;t implement account recovery procedures. </p><p>The moment you compromise operational security around key management, your asset is vulnerable. This is why institutional custodians exist. Services like <a href="https://spindipper.com/?ref=secjuice.com" rel="noreferrer">Spindipper</a>, Coinbase Prime, and Kraken Institutional solve this through hardware security modules, multi-signature requirements, and airgapped infrastructure.  They&#x2019;re essentially applying crypto-specific security to the problem rather than trying to retrofit traditional corporate security practices. </p><p>But here&#x2019;s what matters for your LLC: using a custodian isn&#x2019;t weakness. It&#x2019;s acknowledging that key management is a specialized security problem that requires specialized infrastructure. If your company is treating private keys like passwords, storing them in shared drives, emailing them, keeping backups in Dropbox, you&#x2019;ve already lost.</p><h3 id="the-human-factor-your-biggest-vulnerability">The Human Factor: Your Biggest Vulnerability</h3><p>Cryptocurrency security ultimately fails because of human error, not technical failure. An employee leaves and nobody removes their hardware wallet from the secure storage system. A finance person writes down a seed phrase and leaves it on a desk. Someone reuses passwords across personal and business accounts. These are the scenarios that actually compromise corporate crypto holdings.<br>Your LLC needs written security policies for every person with access to crypto infrastructure. That means defined procedures for wallet access, explicit requirements for multi-signature transactions, regular rotation of access credentials, and audit trails that log every action. </p><p>Most importantly, it means consequences for deviation. Security protocols fail when they&#x2019;re optional. The cybersecurity team needs to treat crypto asset security with the same rigor as protecting customer data or intellectual property. Because frankly, if someone steals your customer database, you have legal liability and insurance claims. If someone steals your crypto, it just vanishes.</p><h3 id="cold-storage-hot-wallets-and-operational-risk">Cold Storage, Hot Wallets, and Operational Risk</h3><p>Every crypto security framework involves this tension: you need liquidity for business operations, but liquid assets are vulnerable. A hot wallet connected to the internet can execute transactions instantly but gets compromised more easily. Cold storage is secure but slow. The solution most institutional operators use is layered: a small amount in hot storage for immediate operational needs (paying contractors, settlement), the bulk in cold storage (hardware wallets, airgapped systems, multi-sig arrangements that require physical presence to authorize), and everything audited and logged. Your LLC probably doesn&#x2019;t need the complexity of a major exchange&#x2019;s infrastructure, but the principles apply. Figure out the minimum amount you need liquid for daily operations. Put that in a hot wallet with appropriate controls. Everything else goes cold. Document it. Audit it. </p><p>Make it boring.</p><h3 id="compliance-documentation-and-audit-trails">Compliance Documentation and Audit Trails</h3><p>Here&#x2019;s what most founders miss: your LLC&#x2019;s crypto security posture will eventually be audited. Either by internal compliance, external auditors, tax authorities, or regulators. The documentation needs to exist in advance. That means records of how private keys are stored, who has access, what authorization procedures exist, what happened on every transaction date, and proof that the security measures are actually being followed. This is tedious. But the alternative, explaining to auditors why you have no documentation of how a million dollars in crypto is secured, is worse. Your cybersecurity team should be documenting the entire crypto infrastructure the same way they document every other critical system. Network diagrams. Access control matrices. Incident response procedures. The works.</p><h3 id="third-party-risk-and-vendor-assessment">Third-Party Risk and Vendor Assessment</h3><p>When your LLC uses a custodian or exchange, you&#x2019;re introducing third-party risk into your security posture. You need to evaluate that risk the same way you&#x2019;d evaluate any critical vendor. What are their security certifications? Do they have SOC 2 compliance? What&#x2019;s their incident response history? What happens if they get hacked? What insurance do they carry? These aren&#x2019;t abstract questions. They&#x2019;re the difference between losing corporate assets and having some recourse.<br>Most institutional custodians publish security documentation. Review it. Have your security team review it. Understand the attack scenarios where you&#x2019;re still vulnerable even if the custodian is secure.</p><h3 id="the-uncomfortable-conclusion">The Uncomfortable Conclusion</h3><p>If <a href="https://spindipper.com/can-an-llc-buy-crypto?ref=secjuice.com" rel="noreferrer">your LLC is going to buy and trade crypto</a>, you&#x2019;re committing to a security posture that goes beyond standard business practices. You&#x2019;re managing bearer instruments in a digital format where compromise means total loss. This isn&#x2019;t a reason to avoid crypto. But it is a reason to approach it with the same rigor a financial services company brings to protecting customer accounts. Wrong approach and you&#x2019;ll spend 2025 explaining to investors why the company&#x2019;s digital assets got stolen because nobody documented the access procedures.</p><p>Get the security right. Everything else follows.</p>]]></content:encoded></item><item><title><![CDATA[The OSINT Intelligence Cycle Part 1: Planning and Direction]]></title><description><![CDATA[My advice for those wishing to improve their OSINT skills is to go back to the basics, namely the intelligence cycle.]]></description><link>https://www.secjuice.com/osint-intelligence-cycle-part-i-planning-and-direction/</link><guid isPermaLink="false">65a4855960f891a98bddfd9e</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Sinwindie]]></dc:creator><pubDate>Tue, 12 Aug 2025 18:42:00 GMT</pubDate><media:content url="https://www.secjuice.com/content/images/2020/08/ghostbusters.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.secjuice.com/content/images/2020/08/ghostbusters.png" alt="The OSINT Intelligence Cycle Part 1: Planning and Direction"><p>Many newcomers to open source intelligence immediately gravitate towards the tools and become reliant on them rather quickly. This becomes problematic when the tools break, become deprecated, or otherwise unavailable. While automation, collection assistance, and visualization tools can help immensely in an investigation, they cannot analyze the work and do your job for you. </p><p>One of my most repeated bits of advice for those new to OSINT or those wishing to improve their current OSINT skills is to go back to the basics, namely the intelligence cycle. This series of articles aims to reframe each phase of the intelligence cycle to show specifically how I apply it during one of my OSINT investigations.</p><h3 id="part-one-planning-and-direction">Part One: Planning and Direction</h3><p>The planning and direction phase of the OSINT intelligence cycle is where an analyst should determine their investigative requirements, outline what questions they are attempting to answer, and make note of any special circumstances that might arise due to the target, the situation, or the platforms that might be used. </p><p>At best, going into an OSINT investigation without a plan or direction can cause an investigation to take longer than needed. At worst? An investigator may lack the proper dependencies required for the investigation or risk being detected by the target due to technical oversights. During this phase of the intelligence cycle, I tend to take the following steps:</p><p><strong>Identify what question(s) need to be answered:</strong><br>Write down any questions that need to be answered as part of the investigation and avoid chasing tangents that do not assist in answering these questions. I tend to have one main question to answer, and many smaller questions that when combined may help answer the main question. The main question of &#x201C;Who is behind this account?&#x201D; might have subquestions such as: &#x201C;What is their name?&#x201D;, &#x201C;What country are they in?&#x201D;, &#x201C;What is their approximate age?&#x201D;, and &quot;Are they on any other platforms?&quot;. Keep in mind it is perfectly fine to add, remove, or modify these questions as the investigation progresses.</p><p><strong>Identify what platform(s) may need to be accessed:</strong><br>Be sure to set up any required accounts and acquire any additional software or hardware before beginning the investigation. Early on, it may not be possible to know all of the platforms a target frequents. However, it is always a good idea to try and identify potential platforms and any prerequisites needed to access them based on the target&apos;s currently known information. Most mainstream social media platforms will share the same requirements, usually a sock puppet account and perhaps an email or telephone number for verification. However, if investigating a platform that is home to a small, tight-knit group that tends to be suspicious to outsiders they may have heightened requirements for new joiners. Some groups may require vetting by another member before allowing new users to join, which will require additional setup and prep. </p><p><strong>Assess the technical capabilities of the target(s):</strong><br>It is important to assess a target&#x2019;s technical capabilities and if that might increase the chances of being detected during the investigation. Knowing how technologically savvy a target is might also offer insight into how likely they are to make technical mistakes. This isn&#x2019;t always possible to answer in the planning stage, however as the intelligence cycle continues it may become clearer. While it doesn&#x2019;t hurt to always assume a target contains advanced technological skills, it might not be feasible for every analyst to take state actor level precautions for every target. As a rule of thumb, I suggest taking precautions at a higher level than a target&#x2019;s perceived technical abilities. Consider using an <a href="https://tiger404.com/anonymous-browser?ref=secjuice.com" rel="noreferrer">anonymous browser</a> like <a href="https://tiger404.com/?ref=secjuice.com" rel="noreferrer">Tiger404</a> to protect yourself when assessing a target&apos;s technical capabilities.</p><p><strong>Determine end goal(s):</strong><br>Set reasonable goals and expectations for the investigations and write them down. What is the expected outcome of the investigation? Will it result in a written report, notifying the authorities, or something else? Knowing the end goal ahead of time will help drive the OSINT investigation. Identifying the end goal(s) help keep an investigation on track and will assist in making decisions during the other phases that may be dependent on the end goals.</p><h3 id="conclusion">Conclusion</h3><p>The planning and direction phase of an OSINT investigation helps an investigator start off on the right foot by ensuring they have what is needed to begin investigating a target. This phase of the OSINT intelligence cycle is critical to mitigating time lost spent going down unrelated rabbit holes or setting up accounts mid-investigation. Once an investigator completes initial work in the planning and direction phase, it is time to move on to the next phase of the intelligence cycle: Collection.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.secjuice.com/content/images/2020/08/ghostbusters-1.png" class="kg-image" alt="The OSINT Intelligence Cycle Part 1: Planning and Direction" loading="lazy" width="1000" height="750" srcset="https://www.secjuice.com/content/images/size/w600/2020/08/ghostbusters-1.png 600w, https://www.secjuice.com/content/images/2020/08/ghostbusters-1.png 1000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">The awesome image used in this article is called Ghostbuster and was created by </span><a href="https://dribbble.com/Servin8?ref=secjuice.com"><span style="white-space: pre-wrap;">Servin</span></a><span style="white-space: pre-wrap;">.</span></figcaption></figure>]]></content:encoded></item></channel></rss>