We talk about zero trust.
MFA.
Segmentation.
Defense in depth.
But we don’t talk enough about belonging.
#Cybersecurity #HumanRisk #Leadership #SecurityCulture #Loneliness #DigitalTrust #EmotionalSecurity #InsiderThreat #LimitlessCyber
CISO | Executive Leader | Advisor | Speaker -Welcome to the forever war of #cyber. The frontline is everywhere and we all have a part to play. So be present, get a plan, and make it happen. I talk about #cybersecurity #infosec #privacy #leadership #risk #strategy and comment on both #career and #personal topics with opinions being very much my own.
We talk about zero trust.
MFA.
Segmentation.
Defense in depth.
But we don’t talk enough about belonging.
#Cybersecurity #HumanRisk #Leadership #SecurityCulture #Loneliness #DigitalTrust #EmotionalSecurity #InsiderThreat #LimitlessCyber
Ever wonder what’s on a CISO’s desk?
This isn’t a Pinterest-perfect setup—it’s a battle station for clarity, chaos, and caffeine.
• 2x monitors (because 1 isn’t enough)
• Standing desk: your only workout some days
• Lights + mic for non-stop video calls
• Reading glasses for the end-of-day blur
• Tablet: because more screens = more “productivity”
• Notebook for jotting down actual secret stuff
• Ambient alert lamp that turns red when the SHTF
• Coffee cup because: Drink coffee. Do Cool Stuff. ☕
What's your setup look like?
#Cybersecurity #CISO #Leadership #WorkSetup #LimitlessCyber #DrinkCoffeeDoCoolStuff
☕ Morning Latte of Evil - where I scan the dangerous corners of cybersecurity.
Today’s threats on my mind:
🧨 Quantum decryption event horizons
🗣️ Real-time deepfake voice/video
🕵️ Privacy ≠ anonymity
🤖 AI as friend, foe, & co-worker
🚨 New drop: The Readiness Myth 🎯
Most people wait to feel ready. Leaders move anyway.
This 2-minute video breaks down why discipline > motivation—and what real leadership requires.
▶️ Watch here: https://youtu.be/lIOp2SeYQ4c?si=GQuZm4_kfyEy9DCq
#Leadership #ReadinessMyth #Cybersecurity #Discipline
Uncertainty isn’t the enemy—it’s where success is forged.
Certainty is comforting. But it’s a lie.
Most people wait for it.
Leaders don’t.
Something new drops tomorrow.
#LeadershipMatters #MindsetShift #DecisionMaking #LimitlessCyber #BeYourself
Something new is brewing.
Drink Coffee. Do Cool Stuff.
A podcast for leaders who operate at the edge—where cyber, culture, and courage collide.
No fluff. No hustle porn. Just what matters.
🔗 https://limitlesscyber.com
#DrinkCoffeeDoCoolStuff #LimitlessCyber #Leadership
I don’t want followers. I want influence.
That’s the difference between culture and control.
Watch the short here: https://youtube.com/shorts/W1R_pX4wCsY
#Leadership #CultureBuilding #InfluenceOverFollowers #StrategicLeadership
The world runs on networks and relationships, and our industry is smaller than you think. Burn enough bridges and scorch enough earth, and one day, you won’t just run out of places to go—you’ll run out of people willing to let you in. #leadership #integrity #mindset #CISO #trust
When someone says "cyber" does it automatically mean "cybersecurity" to you? Or does it hold a broader meaning to you like all aspects of technology, from software and hardware to the internet and digital communication? What's your experience?
I'm in the latter camp, but was in a meeting today where a (non-IT) person said they would have to check with 'cyber' about the security controls after they heard back from the IT folks ...
Nice!
I’m in the Proton ecosystem and have been for a while so that is a go to for me. Just started using Aegis 2FA as Authy was a no go and that was my previous. Glad I’m fully converted over now. Futo was a win for voice to text as that was something I was missing.
Thanks!
I'm back on #grapheneos for 2025 and happy about the advancements since I last tried it as my daily driver.
What are some "go to" apps I should be trying that are equal to or better than some of the main stream options that drain the life blood of your data to sustain their dark existence?
Cybersecurity isn’t just an IT issue—it’s a business risk that impacts strategy, growth, and resilience. By 2026, 70% of boards will include cybersecurity experts.
Is your board discussing cybersecurity regularly? If not, it’s time to make it a priority.
Check out my latest video short to see how we can normalize cybersecurity in the boardroom: https://www.youtube.com/shorts/sIPfkZioebA
🎄 Big News on Christmas Eve! 🎄
As of today, my latest collaboration, "Cyber CISO Marksmanship: Hitting the Mark in Cybersecurity Leadership", is now available on Amazon!
Becoming a published author has been a lifelong bucket list goal—and I’m thrilled to check it off with this book! 📝✅
This is no ordinary cybersecurity book—it’s a unique resource crafted by a team of seasoned CISOs, sharing over a century of real-world leadership experience.
📌 What makes it different?
**Real-world accounts of what works (and what doesn’t) in the CISO role
**Actionable takeaways with Bottom Line Up Front (BLUF) insights
**Practical guidance with “Sharpshooter” and “Misfire” tips for success
If you’re a cybersecurity leader—or aspiring to be one—this book is for you!
🔗 If you are interested, you can grab a copy here: Cyber CISO Marksmanship on Amazon
https://a.co/d/3NSOrgN
Happy Holidays!
@triciakickssaas Thank you. ❤️
You too are not alone.
@triciakickssaas I hear you on this.
I start with petting my golden retriever on the regular as he kinda gets life in general. :)
That said, 2024 is going to go down as a rough year on the personal front for me. I made a post over on LinkedIn last week on the topic and listed out the 12 top of mind things that have been helping me in this context.
#MindsetMatters #Resilience #FocusOnWhatMatters #BePresent #LifeLessons #Leadership #IntentionalLiving #TimeIsPrecious #SelfCare #LeadWithKindness
@pH_0x05 'risk' is a tricky one but I have found that when expressed as an $X over Y time % chance has the most impact at the board level. Tough one there is getting everyone to agree on the specific equitation for calculating that.
Instead of 'we need MFA', say: "We need to be confident the people trying to access our systems are who they say they are, so operations aren't disrupted."
Instead of 'ransomware risk', say 'Criminals holding our data hostage for extortion which could lead to multiple-day outages at a cost of $X million'
As cybersecurity leaders, it's on us to bridge the gap.
💡 Question for the room: What are some acronyms or terms that you've translated or need to?
I speak to a lot of Boards and across the board (<-- see what I did there), they want business impact and not acronyms. Gone are the days when cybersecurity is a 𝘵𝘦𝘤𝘩𝘯𝘪𝘤𝘢𝘭 𝘤𝘰𝘯𝘷𝘦𝘳𝘴𝘢𝘵𝘪𝘰𝘯 and that is for good reason.
𝗧𝗵𝗲 𝗰𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲: 𝗧𝗿𝗮𝗻𝘀𝗹𝗮𝘁𝗶𝗻𝗴 𝗰𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗶𝗻𝘁𝗼 𝗯𝘂𝘀𝗶𝗻𝗲𝘀𝘀 𝗹𝗮𝗻𝗴𝘂𝗮𝗴𝗲 🧵
𝗜𝗺𝗽𝗹𝗲𝗺𝗲𝗻𝘁𝗶𝗻𝗴 𝗭𝗲𝗿𝗼 𝗧𝗿𝘂𝘀𝘁: 𝗪𝗵𝗲𝗿𝗲 𝗶𝘀 𝘆𝗼𝘂𝗿 𝗼𝗿𝗴𝗮𝗻𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗻 𝘁𝗵𝗲 𝗷𝗼𝘂𝗿𝗻𝗲𝘆?
Zero Trust isn’t a buzzword. It’s a necessary shift in how we approach security in an increasingly complex and dangerous digital world. Gone are the days of assuming trust simply because a user or device is “inside” the network. In today’s landscape, every interaction must be earned.
But Zero Trust can feel overwhelming. Is it a product? A framework? A checklist? The truth: it’s none of these things. Zero Trust is a mindset shift. It’s about recognizing that the frontline is everywhere—and your defenses must be, too.
Here’s how to think about it in three actionable steps:
1️⃣ Verify Continuously - Trust nothing, verify everything.
• Vault privileged accounts and require strong authentication to access them.
• Use adaptive MFA that adjusts based on user behavior, location, or risk signals, stepping up security as needed.
2️⃣ Limit Access - Give access to only what’s necessary—and nothing more.
• Micro-segmentation ensures that systems only communicate if they truly need to, stopping lateral movement in its tracks.
• Secure APIs enforce strict access controls and validate every interaction with sensitive resources.
3️⃣ Monitor and Assume Breaches - Breaches happen. Build resilience into your system.
• Endpoint Detection and Response (EDR) solutions can detect and contain abnormal behavior before it spreads.
• Regular breach simulations will test your incident response plan and ensure you’re ready when—not if—a breach occurs.
Zero Trust is not a project you complete; it’s a way of thinking. It transforms how you approach cybersecurity, moving from perimeter defenses to dynamic, ongoing trust verification.
Where is your organization on this journey?
What challenges are you facing?
How we can overcome the friction and take practical steps toward implementing Zero Trust.
The world is a dangerous place. Your network should be prepared.