IT governance

A leader seeking a Interim Chief Information Officer for Court Services Organizations

Interim Chief Information Officer for Court Services Organizations (Stabilize Reliability and Continuity Fast)

In December 2025, court services organizations are carrying heavy demand with public consequences. People expect e-filing to work, remote hearings to connect, and self-help services to be available when they need them. There’s almost no tolerance for downtime, and no slack in the staffing model when something breaks in judicial administration. An Interim Chief Information […]

Interim Chief Information Officer for Court Services Organizations (Stabilize Reliability and Continuity Fast) Read More »

A team establishing a board ready data protection strategy for civil justice system organizations

Board Ready Data Protection Strategy for Civil Justice System Organizations

A survivor reaches out from a borrowed phone. Your intake team moves fast, because timing matters. Then a simple mistake lands hard: an advocate auto-forwards an email thread, it goes to the wrong address, and suddenly a client’s location and case details are exposed. In civil justice work vital to access to justice, data loss

Board Ready Data Protection Strategy for Civil Justice System Organizations Read More »

A leader working with a Fractional CISO for Capacity Building Organizations

Fractional CISO for Capacity Building Organizations (Security Governance Funders Can Trust)

Your intake queue is overflowing. A partner needs access to a shared platform today. A funder due diligence form lands in your inbox, asking about encryption, vendor risk, and incident response, with a deadline you can’t move. In capacity building organizations, you’re not only protecting your own systems and ensuring data protection. You’re protecting the

Fractional CISO for Capacity Building Organizations (Security Governance Funders Can Trust) Read More »

A team choosing a implementation partner for capacity building organizations

Implementation Partner for Capacity Building Organizations (Standardize Outcomes Across Programs)

You know the moment in non-profit organizations dedicated to capacity building. A report is due, a funder wants clean numbers, and three program leads send three different versions of “served” and “completed.” Staff scramble. Someone rebuilds a spreadsheet late at night. The numbers still don’t reconcile, and nobody feels good about what gets submitted. This

Implementation Partner for Capacity Building Organizations (Standardize Outcomes Across Programs) Read More »

How To Build an AI Acceptable Use Policy in One Week

How To Build an AI Acceptable Use Policy in One Week

You already know AI is in your company. Sales is pasting customer data into chatbots. Finance is testing spreadsheet add-ins. Your vendors keep pitching “AI-powered” features. Without guardrails, every one of those experiments can turn into a data breach, a compliance headache, or a disappointed board. The good news: you can set a clear, AI

How To Build an AI Acceptable Use Policy in One Week Read More »

A team building a decision rights map.

Nobody owns the decision, so nothing ships: building a decision rights map and escalation ladder

On Monday, intake is exploding. On Tuesday, a partner says they never got the referral packet. On Wednesday, a funder report is due and the numbers don’t reconcile. By Friday, someone says, “We should fix the system,” and everyone nods, because it’s true. Then nothing ships. Not because people don’t care. Not because staff aren’t

Nobody owns the decision, so nothing ships: building a decision rights map and escalation ladder Read More »

The checklist for switching MSPs without downtime, data loss, or finger-pointing

Switching the team that runs your company’s IT is a little like changing the tires on a moving car. It’s possible. It’s common. It can also go sideways fast when nobody owns the plan. If you’re switching MSPs, your real goal isn’t “a better provider.” Your goal is business continuity, clean accountability, and a handover

The checklist for switching MSPs without downtime, data loss, or finger-pointing Read More »

Executive checklist for picking a password manager and rolling it out in 30 days

Executive checklist for picking a password manager and rolling it out in 30 days

Most companies don’t get breached because they “forgot security.” They get breached because passwords spread like loose change, pockets, couches, backpacks, old laptops, and the one shared spreadsheet everyone swears is temporary. A strong enterprise password manager is one of the fastest ways to reduce that mess. Not by asking people to “be better,” but

Executive checklist for picking a password manager and rolling it out in 30 days Read More »

Stop privacy by design being an afterthought: A field memo on protecting vulnerable clients in justice nonprofits

The intake queue is exploding. A partner needs a same-day handoff. A funder report is due, and the numbers don’t reconcile. In that pressure, privacy turns into a cleanup job. A rushed form. A shared spreadsheet. A “temporary” folder that becomes permanent. For justice nonprofits serving people at real risk, that’s not just an IT

Stop privacy by design being an afterthought: A field memo on protecting vulnerable clients in justice nonprofits Read More »