<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Posts on Sade</title><link>https://sadesing.github.io/posts/</link><description>Recent content in Posts on Sade</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 12 Apr 2026 20:38:51 -0500</lastBuildDate><atom:link href="https://sadesing.github.io/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Mapping Cyber Risk with NIST CSF 2.0</title><link>https://sadesing.github.io/posts/mapping-cyber-risk-with-nist-csf-2-0/</link><pubDate>Sun, 12 Apr 2026 20:38:51 -0500</pubDate><guid>https://sadesing.github.io/posts/mapping-cyber-risk-with-nist-csf-2-0/</guid><description>&lt;p&gt;A 480-person consulting firm operating almost entirely in the cloud, with teams regularly handling client data, is also preparing to expand into federal, healthcare, and payment card markets.&lt;/p&gt;
&lt;p&gt;Across twelve NIST CSF 2.0 controls, nine were rated as severe.&lt;/p&gt;
&lt;p&gt;That number makes more sense in context. The workforce is mostly remote and many engagements require direct access to client systems and data. Each new market also brings its own set of compliance requirements, including FISMA, HIPAA, and PCI DSS.&lt;/p&gt;</description></item><item><title>One HIPAA manual, four major gaps</title><link>https://sadesing.github.io/posts/one-hipaa-manual-four-major-gaps/</link><pubDate>Sun, 01 Mar 2026 20:38:51 -0500</pubDate><guid>https://sadesing.github.io/posts/one-hipaa-manual-four-major-gaps/</guid><description>&lt;p&gt;I was given a HIPAA compliance policy manual and asked to review it, propose revisions, and explain my reasoning.&lt;/p&gt;
&lt;p&gt;The manual belonged to NAIPTA, the Northern Arizona Intergovernmental Public Transportation Authority and was adopted in April 2017. While it demonstrates a solid foundational commitment to HIPAA compliance, it is now approaching nearly a decade old.&lt;/p&gt;
&lt;p&gt;It was last updated April 19, 2017. Almost eight years have passed, during which the HHS Office for Civil Rights has issued updated guidance, the 2013 Omnibus Rule has been in full effect, and proposed modifications to the HIPAA Privacy Rule were introduced in 2021. None of that was reflected in this manual.&lt;/p&gt;</description></item><item><title>When a Name Reveals Too Much</title><link>https://sadesing.github.io/posts/when-a-name-reveals-too-much/</link><pubDate>Sun, 18 Jan 2026 20:38:51 -0500</pubDate><guid>https://sadesing.github.io/posts/when-a-name-reveals-too-much/</guid><description>&lt;p&gt;A court case about a patient’s roommate ended up teaching me more about privacy than I expected.&lt;/p&gt;
&lt;p&gt;The case was &lt;em&gt;Rogers v. NYU Hospitals Center&lt;/em&gt;. A hospital released the name of a patient’s roommate and someone questioned whether this violated HIPAA. The name came up during a legal proceeding and the patient argued it should have been protected. The court disagreed, noting that the name alone did not reveal any medical diagnosis or treatment. A wide range of rehabilitative services were offered at Rusk Institute of Rehabilitation Medicine, so knowing someone was there didn’t tell you anything about their condition. A name by itself wasn’t protected health information in this situation.&lt;/p&gt;</description></item><item><title>What AI Risk Management Actually Looks Like</title><link>https://sadesing.github.io/posts/ai-risk-management-in-practice/</link><pubDate>Sun, 16 Nov 2025 20:38:51 -0500</pubDate><guid>https://sadesing.github.io/posts/ai-risk-management-in-practice/</guid><description>&lt;p&gt;Imagine you&amp;rsquo;re working with a 400-person global consulting firm that operates across healthcare, financial services, and government. AI is everywhere: custom models trained on proprietary client data, RAG systems pulling from internal documents, AI-assisted hiring, automated contract review, and predictive analytics delivered straight to the C-suite.&lt;/p&gt;
&lt;p&gt;Now someone asks you to figure out where the risks are. Not in theory, but in practice. Which systems could cause the most damage if something goes wrong? What framework do you apply? And how do you build a governance plan that actually fits a firm this size without over-engineering it?&lt;/p&gt;</description></item><item><title>My Path to Privacy</title><link>https://sadesing.github.io/posts/path-to-privacy/</link><pubDate>Sat, 30 Aug 2025 20:38:51 -0500</pubDate><guid>https://sadesing.github.io/posts/path-to-privacy/</guid><description>&lt;p&gt;My interest in privacy didn&amp;rsquo;t start with some big “aha” moment. It just kind of grew over time.&lt;/p&gt;
&lt;p&gt;I’ve been working as a frontend engineer for the past few years, mostly focused on accessibility compliance. My background in systems engineering and human factors shapes how I think about technology. I naturally look at it through the lens of how people actually experience it — does it help them, or does it subtly get in their way? This perspective started to shape how I thought about privacy too. I began to see that principles like consent, transparency, and control were just as important as usability.&lt;/p&gt;</description></item></channel></rss>