Chris Foulon
cpfcoaching.bsky.social
Chris Foulon
@cpfcoaching.bsky.social
Accepting vCISO Clients for 2025 | Helping SMBs Grow by Enabling Business-Driven Cybersecurity | Fractional vCISO & Cyber Advisory Services | Empowering Secure Growth Through Risk Management
Https://www.cpf-coaching.com
How do you go from inner-city Memphis to the FBI, and then to leading policy at Twitter & Amazon?
Erica Shoemate (the "Queen of Pivot") shares her incredible non-traditional journey into #cybersecurity and #AIPolicy. A must-listen!
open.spotify.com/episode/1WCV....
#womenintech #careerpivot
Spotify – Web Player
open.spotify.com
November 15, 2025 at 2:47 PM
Since everyone has been experimenting with building agents and agentic flows, I've been wondering how we can establish governance and safeguards around them, while still making it simple for the business to develop and for security to maintain visibility and oversight.
October 25, 2025 at 6:02 PM
Eric emphasizes the importance of continuous learning in cybersecurity. With technologies and threats constantly evolving, professionals must stay informed about the latest tradecraft and techniques.

open.substack.com/pub/cpfcoach...
Breaking into Cybersecurity: An In-Depth Conversation with Eric Stride
🚀 Excited to share the latest episode of "Breaking into Cybersecurity" featuring Eric Stride from Huntress! 🎙️ Join us as Eric dives into his fascinating journey from the Air Force to becoming a cyber...
open.substack.com
October 18, 2025 at 8:20 PM
In the latest episode of “Breaking into Cybersecurity,” host Chris Foulon sits down with Eric Stride, the Chief Security Officer at Huntress.
open.substack.com/pub/cpfcoach...
October 17, 2025 at 11:08 PM
What Is Quantum Computing, Really? A Plain-English Explanation for Tech Leaders Without the Hype.

Feeling overwhelmed by quantum computing jargon? You're not alone. It's a game-changer, but often shrouded in complexity.
A Leader’s Guide to Quantum Computing
Unlock the strategic implications of Quantum Computing. This executive guide demystifies qubits, superposition, and entanglement, revealing the immense opportunities for business innovation and the ur...
open.substack.com
October 8, 2025 at 4:01 PM
If you are in the DMV (DC/Maryland/Virginia), why not come join me at Security BSides Northern Virginia on October 11, 2025? I will be hosting a career-focused panel called "Voices from the Field."

This year's theme is Hacker U, where curiosity becomes capability.

#cybersecurity #career #hiring
October 7, 2025 at 12:24 PM
Shout out to all the Sponsors for the upcoming BsidesNOVA Security Conference www.bsidesnova.org/2025-sponsors/
2025 SPONSORS |
www.bsidesnova.org
September 28, 2025 at 11:30 PM
In the contemporary business environment organizations are relentlessly pushed to innovate, adopt cloud technologies, leverage data analytics, and create seamless digital experiences for their customers.

open.substack.com/pub/cpfcoach...
Beyond the Checklist: A Strategic Framework for Assessing and Maturing Your Security Posture
Master cybersecurity maturity. Explore our multi-layered security assessment covering NIST CSF, CIS Controls, Zero Trust, IAM, vulnerability management, and SSRM. Get your custom System Security Plan ...
open.substack.com
September 22, 2025 at 12:51 PM
How your CIO and CISO should collaborate to develop a scalable security playbook for your organization. They don't need to operate in separate silos or be at odds with each other.

open.substack.com/pub/cpfcoach...
The Scalable Security Playbook: A CISO & CIO Partnership Guide
Discover how to test, refine, and replicate a standardized set of security controls for a resilient, enterprise-wide defense.
open.substack.com
September 20, 2025 at 1:45 AM
Phishing and impersonation are often linked to scams that target bank accounts and credit cards. However, these tactics also serve a more sinister purpose in geopolitics, as they are increasingly used for espionage and manipulation to gain an advantage.
open.substack.com/pub/cpfcoach...
Beyond the Bank Account: Phishing as a Tool for Espionage
Why Impersonation is a Powerful Tool for State-Sponsored Espionage
open.substack.com
September 12, 2025 at 7:45 PM
In this episode of 'Breaking Into Cybersecurity,' Motti Tal from Tel Aviv shares his journey from his father's work with mainframes to software development in the Israeli Navy. He highlights the importance of hands-on experience, mentorship, and ethics for a successful career.
youtu.be/JFcPaDP0tq0
Breaking into Cybersecurity - Motti Tal
YouTube video by Breaking Into Cybersecurity
youtu.be
September 12, 2025 at 11:50 AM
Next on my recommendations for resources for tech and cyber executives:

CISO Desk Reference Guide Executive Primer: The Executive’s Guide to Security Programs
September 3, 2025 at 10:44 PM
How to Build a Security Culture with Data-Driven Reporting.

Anything else that you would add?

open.substack.com/pub/cpfcoach...
How to Build a Security Culture with Data-Driven Reporting
Foster a true security-first culture by mastering effective cloud security reporting. Learn to translate technical risk into business impact for leadership and technical teams using tools like Microso...
open.substack.com
September 2, 2025 at 12:55 AM
Join us for an eye-opening conversation with William (Bill) Welser IV, a trailblazer in cybersecurity and AI. As the CEO/CTO & Cofounder of Lotic.ai, Inc., Bill explores the intersection of behavioral science and advanced technology.

youtu.be/pGUSP4_aSqU
Breaking Into Cybersecurity with William (Bill) Welser IV: Tips, Challenges, and the Future
YouTube video by Breaking Into Cybersecurity
youtu.be
August 29, 2025 at 12:18 PM
"You can't improve what you don't measure." This holds especially true for vulnerability management. 🤔 Our new blog post explores actionable metrics and KPIs to help you track progress, identify bottlenecks, and drive continuous improvement in your security posture
open.substack.com/pub/cpfcoach...
Vulnerability Management Metrics: 15 KPIs to Measure & Mature Your Program
Measure, Monitor, and Mature Your Program with Actionable Metrics: Use data-driven KPIs to track progress, demonstrate value, and guide continuous improvement.
open.substack.com
August 26, 2025 at 1:11 AM
Check out this blog from Keeper Security, Inc. on How AI can crack passwords and why passwords managers can be helpful in generating strong credentials and keeping them safe

keepersecurity.partnerlinks.io/t3wa0yv9h7es...
AI can crack your passwords. Here’s how Keeper can help.
Learn what AI is, what password cracking is, how cybercriminals are using AI to crack passwords and how Keeper can keep you safe from AI password cracking.
keepersecurity.partnerlinks.io
August 25, 2025 at 12:22 AM
Be sure to catch the latest episode of "Breaking into Cybersecurity," featuring the inspiring Sinan Eren! With decades of experience, Sinan shares his remarkable journey, starting in the late '90s as a red teamer and penetration tester.
youtu.be/ateZK68voD0
Breaking into Cybersecurity: Sinan Eren's Inspiring Journey from Red Teaming to Startup Success
YouTube video by Breaking Into Cybersecurity
youtu.be
August 23, 2025 at 8:03 PM
Highlight Reel of Breaking into Cybersecurity - Sinan Eren
youtu.be/lt2TJGlUpbM
Highlight Reel of Breaking into Cybersecurity - Sinan Eren
YouTube video by Breaking Into Cybersecurity
youtu.be
August 23, 2025 at 2:39 AM
Breaking into Cybersecurity - Sinan Eren

Sinan Eren is a pioneering figure in cybersecurity. He began as a hacker in the late 90s and has since become a leader in red teaming and penetration testing, while also making strides as an entrepreneur.

youtu.be/JjbLl0cgQmY
Breaking into Cybersecurity - Sinan Eren
YouTube video by Breaking Into Cybersecurity
youtu.be
August 23, 2025 at 1:15 AM
Is there a ghost in your cloud? 👻 Traditional security looks for a smash-and-grab, but modern attackers are playing the long game. They get in, stay quiet, and strike later. #Cybersecurity #CloudSecurity #SocialEngineering #InfoSec

open.substack.com/pub/cpfcoach...
The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack
Unmasking the "low and slow" identity attacks where threat actors lie in wait within your cloud accounts, and how to fight back before they strike.
open.substack.com
August 20, 2025 at 10:45 PM
Be the Best Version of Yourself - CISO Tradecraft® / Breaking Into Cybersecurity

youtube.com/shorts/xngwW...
Be the Best Version of Yourself - CISO TradeCraft / Breaking into Cybersecurity
YouTube video by Breaking Into Cybersecurity
youtube.com
August 12, 2025 at 12:34 PM
Check out this week's blog “Creating Effective Remediation Policies and SLAs for Vulnerability Management”

open.substack.com/pub/cpfcoach...
Develop and Enforce Robust Remediation Policies and SLAs
Strengthen your organization's security response with robust Remediation Policies and SLAs! Discover how to transform your vulnerability management program into a mature, auditable business function t...
open.substack.com
August 12, 2025 at 12:47 AM
The Harsh Reality Behind the Allure of the CISO Title - CISO Trade Craft / Breaking into Cybersecurity
youtube.com/shorts/fiVE8...
The Harsh Reality Behind the Allure of the Title - CISO Trade Craft / Breaking into Cybersecurity
YouTube video by Breaking Into Cybersecurity
youtube.com
August 5, 2025 at 11:44 AM
New double podcast 📻 alert 🚨:
CISO Tradecraft® and Breaking Into Cybersecurity
Hosts and Guests:
G Mark Hardy
☁️ Christophe Foulon
Streamed at noon ET 8/4/25!

youtu.be/Jg_0laZpQWE
#cisotradecraft #breakingintocybersecurity #CISO #leadership
CISO Tradecraft - Guest: Christophe Foulon
YouTube video by Breaking Into Cybersecurity
youtu.be
August 4, 2025 at 10:59 AM