Chris Foulon
cpfcoaching.bsky.social
Chris Foulon
@cpfcoaching.bsky.social
Accepting vCISO Clients for 2025 | Helping SMBs Grow by Enabling Business-Driven Cybersecurity | Fractional vCISO & Cyber Advisory Services | Empowering Secure Growth Through Risk Management
Https://www.cpf-coaching.com
Hackers don't try once and give up.

So why do we test our AI defense that way?

🛑 NIST found that when they allowed for repeated attempts on AI agents, simulating a persistent junior hacker, the average attack success rate jumped from 57% to 80%.
AI Agents Are Getting Hijacked (And Why Your Business Needs to Care)
New NIST research exposes "Agent Hijacking" risks. Learn why standard AI safety tests fail and how SMB leaders can secure their automated workflows.
open.substack.com
January 13, 2026 at 9:36 PM
New Video Alert! 🚨 Ever wonder what it really takes to break into the cybersecurity field? We sat down with Jasson Casey to get his expert insights and tips.

Learn what skills matter most: Breaking into Cybersecurity - Jasson Casey youtu.be/XNKZdASo1go
#CybersecurityCareers #CareerTips #InfoSec
Breaking into Cybersecurity - Jasson Casey
YouTube video by Breaking Into Cybersecurity
youtu.be
January 10, 2026 at 12:41 PM
Jason Casey shares his path from Software Engineer to Cyber Expert. Learn why deep technical curiosity and protocol knowledge are your best career assets in the age of AI. Watch the full episode of Breaking into Cybersecurity.

spotifycreators-web.app.link/e/tTyFy6xlNZb
January 9, 2026 at 6:53 PM
Great Audible New Year promotion! Since you were probably planning to buy a few books, why not earn a $15 credit by using 3 of your Audible Credits?

www.audible.com/ep/credit-ca...
Audible credit promotion
Spend 3 credits and enjoy a bonus reward.
www.audible.com
January 2, 2026 at 1:32 PM
Stop making resolutions. Start rebooting
You wouldn't run a critical server at 100% utilization for a year without maintenance. Why do it to yourself?
Instead of vague goals, join me for The System Reboot. It is a 3-day protocol to clear your personal technical debt
open.substack.com/pub/cpfcoach...
The "System Reboot": A 3-Day Refresh for SMB Tech Leaders
You do not need a vague New Year’s resolution.
open.substack.com
January 1, 2026 at 2:34 PM
Security Copilot in Microsoft 365 E5: Maximizing AI-Powered Security Capabilities
You can learn what your license includes and use it to protect your organization more effectively. open.substack.com/pub/cpfcoach...
Security Copilot in Microsoft 365 E5: Maximizing AI-Powered Security Capabilities
Explore how Microsoft Security Copilot transforms cybersecurity for M365 E5 customers. Learn how to optimize usage for 500-user organizations, understand SCU capacity, and discover new features in Def...
open.substack.com
December 30, 2025 at 6:06 PM
US SMBs face over $3 million annually from data breaches, similar to opening a second store. This highlights the serious risk and financial burden. Three threats demand urgent action hackers exploiting vulnerabilities in devices like WatchGuard, Fortinet, and Cisco

open.substack.com/pub/cpfcoach...
US SMB Cyber Alert: Critical Device Exploits & The $3M Risk
Urgent briefing for US SMBs: Critical patches needed for WatchGuard, Fortinet, & Cisco. Discover how to stop AI attacks and avoid $3M breach costs. Read the plan.
open.substack.com
December 26, 2025 at 5:48 PM
Most "AI Strategy" is just guessing with a chatbot.

Real deployment needs RAG architecture, token economics, and security governance. I built a no-fluff guide to move you from "playing" to "shipping."

Get the roadmap: cpfcoaching.gumroad.com/l/Mastering-...
Mastering LLMs: The Executive Guide to AI Implementation
The Problem: Everyone is using AI, but few are using it right.You've seen the hype. You've played with ChatGPT. But how do you actually integrate this technology into your business workflows without l...
cpfcoaching.gumroad.com
December 9, 2025 at 1:54 PM
CISA just released the blueprint for securely integrating AI into Operational Technology.

If you use AI to drive efficiency in physical ops, you must balance it with safety. This guide covers:
-Assessing data risks
-Continuous model testing
-Maintaining human oversight

www.cisa.gov/news-events/...
CISA, Australia, and Partners Author Joint Guidance on Securely Integrating Artificial Intelligence in Operational Technology | CISA
This guidance aims to help critical infrastructure owners and operators integrate artificial intelligence into operational technology systems securely, balancing the benefits of AI with the unique ris...
www.cisa.gov
December 4, 2025 at 1:25 PM
The "Chaos Monkey" Drill
Once a year, tell your SysAdmin they are "dead" for the day.
Try to restore a file or cut a payroll check using ONLY the documentation in the binder.
If you have to call them, you failed the test.
open.substack.com/pub/cpfcoach...
The Silent Kill Switch: Why Your Business Needs a "Human" Disaster Recovery Plan
It started with a quiet Tuesday morning and the sudden, jarring arrival of an ambulance across the street.
open.substack.com
November 30, 2025 at 9:10 PM
Most people are still guessing with AI. They type a prompt, hope for the best, and get hallucinations.

It is time to treat English like a programming language.

cpfcoaching.gumroad.com/l/Mastering-...
Mastering LLMs: The Executive Guide to AI Implementation
The Problem: Everyone is using AI, but few are using it right.You've seen the hype. You've played with ChatGPT. But how do you actually integrate this technology into your business workflows without l...
cpfcoaching.gumroad.com
November 27, 2025 at 3:42 AM
How do you go from inner-city Memphis to the FBI, and then to leading policy at Twitter & Amazon?
Erica Shoemate (the "Queen of Pivot") shares her incredible non-traditional journey into #cybersecurity and #AIPolicy. A must-listen!
open.spotify.com/episode/1WCV....
#womenintech #careerpivot
Spotify – Web Player
open.spotify.com
November 15, 2025 at 2:47 PM
Since everyone has been experimenting with building agents and agentic flows, I've been wondering how we can establish governance and safeguards around them, while still making it simple for the business to develop and for security to maintain visibility and oversight.
October 25, 2025 at 6:02 PM
Eric emphasizes the importance of continuous learning in cybersecurity. With technologies and threats constantly evolving, professionals must stay informed about the latest tradecraft and techniques.

open.substack.com/pub/cpfcoach...
Breaking into Cybersecurity: An In-Depth Conversation with Eric Stride
🚀 Excited to share the latest episode of "Breaking into Cybersecurity" featuring Eric Stride from Huntress! 🎙️ Join us as Eric dives into his fascinating journey from the Air Force to becoming a cyber...
open.substack.com
October 18, 2025 at 8:20 PM
In the latest episode of “Breaking into Cybersecurity,” host Chris Foulon sits down with Eric Stride, the Chief Security Officer at Huntress.
open.substack.com/pub/cpfcoach...
October 17, 2025 at 11:08 PM
What Is Quantum Computing, Really? A Plain-English Explanation for Tech Leaders Without the Hype.

Feeling overwhelmed by quantum computing jargon? You're not alone. It's a game-changer, but often shrouded in complexity.
A Leader’s Guide to Quantum Computing
Unlock the strategic implications of Quantum Computing. This executive guide demystifies qubits, superposition, and entanglement, revealing the immense opportunities for business innovation and the ur...
open.substack.com
October 8, 2025 at 4:01 PM
If you are in the DMV (DC/Maryland/Virginia), why not come join me at Security BSides Northern Virginia on October 11, 2025? I will be hosting a career-focused panel called "Voices from the Field."

This year's theme is Hacker U, where curiosity becomes capability.

#cybersecurity #career #hiring
October 7, 2025 at 12:24 PM
Shout out to all the Sponsors for the upcoming BsidesNOVA Security Conference www.bsidesnova.org/2025-sponsors/
2025 SPONSORS |
www.bsidesnova.org
September 28, 2025 at 11:30 PM
In the contemporary business environment organizations are relentlessly pushed to innovate, adopt cloud technologies, leverage data analytics, and create seamless digital experiences for their customers.

open.substack.com/pub/cpfcoach...
Beyond the Checklist: A Strategic Framework for Assessing and Maturing Your Security Posture
Master cybersecurity maturity. Explore our multi-layered security assessment covering NIST CSF, CIS Controls, Zero Trust, IAM, vulnerability management, and SSRM. Get your custom System Security Plan ...
open.substack.com
September 22, 2025 at 12:51 PM
How your CIO and CISO should collaborate to develop a scalable security playbook for your organization. They don't need to operate in separate silos or be at odds with each other.

open.substack.com/pub/cpfcoach...
The Scalable Security Playbook: A CISO & CIO Partnership Guide
Discover how to test, refine, and replicate a standardized set of security controls for a resilient, enterprise-wide defense.
open.substack.com
September 20, 2025 at 1:45 AM
Phishing and impersonation are often linked to scams that target bank accounts and credit cards. However, these tactics also serve a more sinister purpose in geopolitics, as they are increasingly used for espionage and manipulation to gain an advantage.
open.substack.com/pub/cpfcoach...
Beyond the Bank Account: Phishing as a Tool for Espionage
Why Impersonation is a Powerful Tool for State-Sponsored Espionage
open.substack.com
September 12, 2025 at 7:45 PM
In this episode of 'Breaking Into Cybersecurity,' Motti Tal from Tel Aviv shares his journey from his father's work with mainframes to software development in the Israeli Navy. He highlights the importance of hands-on experience, mentorship, and ethics for a successful career.
youtu.be/JFcPaDP0tq0
Breaking into Cybersecurity - Motti Tal
YouTube video by Breaking Into Cybersecurity
youtu.be
September 12, 2025 at 11:50 AM
Next on my recommendations for resources for tech and cyber executives:

CISO Desk Reference Guide Executive Primer: The Executive’s Guide to Security Programs
September 3, 2025 at 10:44 PM
How to Build a Security Culture with Data-Driven Reporting.

Anything else that you would add?

open.substack.com/pub/cpfcoach...
How to Build a Security Culture with Data-Driven Reporting
Foster a true security-first culture by mastering effective cloud security reporting. Learn to translate technical risk into business impact for leadership and technical teams using tools like Microso...
open.substack.com
September 2, 2025 at 12:55 AM