Featured Posts

Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Soft Skills & Documentation

A successful audit is not just about having a strong program. It is about managing the audit itself. Four things have proven consistently effective: centralizing responses through one or two designated contacts, staying factual and concise, responding with documentation rather than verbal improvisation, and leveraging automation to produce evidence that does not require manual collection.

The most overlooked risk in any audit conversation is saying too much. Speculating, meandering, or mentioning work in progress does three things you do not want: it signals an unmanaged risk, it expands the audit scope, and it may extend the engagement or invite a follow-up review before you are ready. If you cannot clearly articulate an answer, ask for a formal documentation request and write it out.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Review

You should review your policies, standards, metrics, and exceptions at least annually — but the annual review is the floor, not the ceiling. One of the biggest value-adds of a formal review is catching scope creep before an auditor does, and making sure everything is still properly defined for the environment you are actually operating in today, not the one you documented eighteen months ago.

The more interesting opportunity is what GenAI makes possible now. An agent built to monitor your program continuously could flag drift between your defined scope and the actual landscape in your environment, surface differences between your policy language and the frameworks you adhere to, and alert you when a framework update — a new version of NIST CSF, for example — introduces requirements your current documentation does not cover. That is not a replacement for the annual review. It is the confidence going into it.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Exception Process

There is a nuanced component that sits at the intersection of scope and measurement: the exception process. An exception is not a way to manage something out of scope. Exceptions are still in scope. They are risk acceptances — situations where full compliance is not achievable or practical, but where the risk is documented, owned, and controlled.

For an exception to hold up in an audit, three things must be true. It must be transparent. It must remain within scope. And it must be tied to the formal risk register so it is not managed in isolation.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Measure

Your scope is everything when it comes to metrics. If your scope is defined correctly, your metrics will show that you are governing properly — and they do not have to be 100% to do that. In fact, a metric that always reads 100% is often a sign that something is wrong with the measurement, not that the program is perfect. Things change: systems are added, removed, and moved, and there are processes that have to run before a system is fully finalized. Your metrics should account for that.

The goal is to define two layers of measurement. The first is what your team sees — the full picture, including account lifecycle context, out-of-scope anomalies, and the calculations that explain your denominators. The second is what your executives and risk committees see: a single, well-defined metric that reflects the real effectiveness of the program.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Out of Scope

Nothing is truly ungoverned — but it may be governed under a different policy or standard than the one you are currently writing. That distinction matters more than most cybersecurity teams realize.

When you define something as out of scope, auditors do not simply move on. They have a set of controls they are expected to test, and if your document says "out of scope" without telling them where that control lives, they will find it themselves — and they will not always find it in the right place. The solution is simple but rarely done: for every exclusion in your policy or standard, point directly to the document that governs it.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Scope

Scope is everything in an audit. If you do not define it, someone else will — and they will not define it in your favor.

Your framework tells an examiner what they are measuring you against. Your scope tells them where they are allowed to test. Those are two different things, and conflating them is one of the most common mistakes a cybersecurity program can make.

The fastest way to lose control of your scope is to use absolute language in your policy and standard statements. Words like "all," "every," "always," and "never" without conditions are open invitations. Think about what "all endpoints" actually means when an auditor starts asking about your AIX servers, your ESX hosts, your AS400, and your audio/video equipment. Or what "all email" means when a third-party tool is generating automated messages you have no control over.

The goal is scope statements that are as broad as possible — but specific enough to hold a line. Too narrow and you are writing exceptions all day. Too broad and you have handed the auditor a checklist you cannot satisfy. Getting that balance right is not luck. It is how you write the statement in the first place.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Policies & Standards

Every audit, whether internal, SOX, regulatory, or otherwise, begins with your defined policies and standards. Most cybersecurity teams know this, but far fewer take the time to write them in a way that actually works in their favor.

The most common mistake is conflating frameworks, control catalogs, policies, and standards. They are not the same thing, and treating them as interchangeable is exactly where auditors find their footing. A control catalog is not designed to measure compliance — it exists to provide a menu of potential controls for potential risks. A framework organizes your program. A policy defines what is required and who it applies to. A standard defines how that requirement is implemented, measured, and scoped.

Get those four things straight, and you have already solved most of the problems that make audits painful.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - A Practitioner's Guide

Most cybersecurity teams don't fail audits because their programs are bad. They fail because their programs aren't documented in a way that survives scrutiny. This is the full series — and the written companion to the How to Pass Every Audit session at the 2026 Southeast Cybersecurity Summit.

Read More
Artificial Intelligence, GenAI Andrew Alaniz Artificial Intelligence, GenAI Andrew Alaniz

AI Breaks Your Biggest Security Control

"Historically, our most effective security control wasn't a firewall or an encrypted tunnel; it was natural friction. Whether it was the physical labor of punching down 66 blocks or the two-week lead time for a server rack, time was our safety net. But as Cloud and GenAI push technology toward an equilibrium with revenue-driven speed, that friction is evaporating. We are moving from 'security through obscurity' to 'vulnerability through visibility.' If we don’t answer the hard questions about data location and identity now, GenAI will solve them for us."

Read More
Andrew Alaniz Andrew Alaniz

Why I Will No Longer Use GenAI for any Content

I haven’t tried to be subversive in any way with my use of GenAI. I used it to help organize and layout many of my blog posts. But I what never did was to have it unilaterally create content that I wasn’t explicitly about. I’ve used it for research, I’ve used it for organization of content, and to give me options for how to word things.

Read More
GenAI, Artificial Intelligence, Frameworks Andrew Alaniz GenAI, Artificial Intelligence, Frameworks Andrew Alaniz

AI Prompts, Legal Privilege, Liability: A New World of Risks

When employees ask AI tools like Copilot or ChatGPT for security guidance, those conversations may not be private. Recent legal actions show that AI prompts can be discoverable, creating new risks for privilege, insurance coverage, and incident response. This article explores how to prepare your organization, and your legal team, for that reality.

Read More

AI Browsers Are Changing the Game: But at What Cost?

AI browsers like Comet are revolutionizing how we research and work, summarizing data, automating analysis, and delivering instant insights. For startups, that’s game-changing. But for regulated industries like banking and healthcare, the promise comes with serious privacy tradeoffs. In this post, CipherNorth breaks down what Comet’s own privacy policies reveal and why enterprise leaders should think twice before letting AI browsers near sensitive data.

Read More
GenAI Andrew Alaniz GenAI Andrew Alaniz

Securing Developer Environments in the Age of AI: Balancing Innovation & Safety

As organizations embrace AI assistants and Copilot tools, developer environments face new security challenges. By default, MCP servers can connect from anywhere, leaving networks and codebases open to infiltration. This post explores how enterprises can balance innovation with security using MCP gateways, access restrictions, and enterprise configurations for GitHub and Visual Studio ensuring developers can experiment safely without exposing sensitive assets.

Read More
OpenBanking, API Security Andrew Alaniz OpenBanking, API Security Andrew Alaniz

What Is Open Banking?

Open banking is transforming financial services by allowing customers to share data and access new products through secure APIs. From BBVA and JPMorgan Chase’s developer portals to fintechs like Plaid and Chime, open banking enables innovation but also introduces new risks. This article explains how APIs work in banking, the rise of Banking-as-a-Service, the evolution of fraud prevention, and the stages of maturity banks go through as they adopt open banking.

Read More
Banking Andrew Alaniz Banking Andrew Alaniz

Regulatory Expectations for Startup and Community Banks

Startup and community banks face the same regulatory expectations as large financial institutions without the same resources. Many lean on hosted platforms, small tech teams, and outsourced vendors. But with rising cybersecurity risks, even minor disruptions can have outsized financial and reputational impacts. This post explores how smaller banks can right-size security, avoid common vendor pitfalls, and meet regulator expectations without overspending.

Read More
Banking, Artificial Intelligence, GenAI Andrew Alaniz Banking, Artificial Intelligence, GenAI Andrew Alaniz

AI Risk in Banking: Preparing for Regulator Expectations

Artificial Intelligence in banking isn’t new, but its speed of deployment and regulatory scrutiny are unprecedented. Banks face a “bandwagon effect,” rushing AI initiatives while balancing risk management, governance, and consumer expectations. Key challenges like explainability and hallucinations require embedding AI into existing model risk frameworks, with strong controls, transparency, and incident readiness to safeguard compliance and trust.

Read More