<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[SMB Tech & Cybersecurity Leadership Newsletter]]></title><description><![CDATA[I empower Chief Information Security Officers (CISOs) and Small to Medium-sized Businesses (SMBs) to elevate their cybersecurity strategies, guiding them past stagnation to achieve tangible outcomes.]]></description><link>https://substack.cpf-coaching.com</link><image><url>https://substackcdn.com/image/fetch/$s_!YfY-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc0ea6f9-9832-41d8-9807-cbdc9be949f0_640x640.png</url><title>SMB Tech &amp; Cybersecurity Leadership Newsletter</title><link>https://substack.cpf-coaching.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 03 Apr 2026 18:48:54 GMT</lastBuildDate><atom:link href="https://substack.cpf-coaching.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Christophe Foulon]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[info@cpf-coaching.com]]></webMaster><itunes:owner><itunes:email><![CDATA[info@cpf-coaching.com]]></itunes:email><itunes:name><![CDATA[Christophe Foulon 📓]]></itunes:name></itunes:owner><itunes:author><![CDATA[Christophe Foulon 📓]]></itunes:author><googleplay:owner><![CDATA[info@cpf-coaching.com]]></googleplay:owner><googleplay:email><![CDATA[info@cpf-coaching.com]]></googleplay:email><googleplay:author><![CDATA[Christophe Foulon 📓]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Beyond Static Defense: The SMB Leader’s Playbook for Active Resilience]]></title><description><![CDATA[Stay strategically ahead in 2026! Discover how SMB leaders can build active resilience, close the CISO gap, combat automated AI attacks, secure the browser perimeter, and implement deepfake verification. Premium content includes detailed analysis, templates (like our Generative AI policy!), guides, and exercises. Get your weekly strategic cyber and tech compass now.]]></description><link>https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 27 Mar 2026 13:53:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lPZV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Section 1: Free Strategic Overview - Active Resilience in 2026</strong></p><p>As we navigate the second quarter of 2026, the landscape for small- and midsize-business (SMB) tech, cyber, privacy, and legal leaders continues to evolve rapidly. The challenges we face, a critical leadership shortage of over 35,000 CISOs, sophisticated &#8220;automated opportunism&#8221; leveraging AI, and the web browser solidifying as the primary attack perimeter, demand a strategic shift. We must move beyond static defenses toward a comprehensive <strong>Active Resilience strategy</strong>.</p><p></p><div class="pullquote"><p>If you are ready to bridge the leadership gap without the overhead of a full-time executive, <strong><a href="https://omnistruct.com/partners/influencers-meet-omnistruct/">Omnistruct</a></strong> provides the fractional CISO expertise needed to mature your posture and align it with your business goals.</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lPZV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lPZV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lPZV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lPZV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lPZV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lPZV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg" width="1376" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SMB Cybersecurity Banner&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SMB Cybersecurity Banner" title="SMB Cybersecurity Banner" srcset="https://substackcdn.com/image/fetch/$s_!lPZV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lPZV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lPZV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lPZV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd2a2e68-1d6f-4854-8202-5f5de41be35a_1376x768.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p></p><p></p><p>Here is a consolidated overview of the critical landscape and high-level strategic guidance, incorporating the essential baseline we&#8217;ve established:</p><p><strong>The Modern Threat &amp; Operational Reality</strong></p><ul><li><p><strong>Attack Sophistication:</strong> Cybercriminals are now using AI-powered automated ransomware campaigns launched every 2 seconds, contributing to global costs projected to reach a staggering $74 billion this year. In 2025, 80 percent of small businesses faced a breach, with individual losses frequently exceeding $500,000. These are not just statistics; they are existential threats to business operations and reputations.</p></li><li><p><strong>Browser as Perimeter:</strong> 95 percent of security incidents now begin in the web browser. The standard network perimeter is long gone; your browser <em>is</em> the perimeter. Legitimate business-centric activity, however essential, is increasingly risky and requires careful governance and control. </p></li></ul><div class="pullquote"><p>To manage the 'Browser Perimeter' effectively, tools like<a href="http://vidlineinc.pxf.io/cpf-coaching"> </a><strong><a href="http://vidlineinc.pxf.io/cpf-coaching">Sider AI</a></strong><a href="http://vidlineinc.pxf.io/cpf-coaching"> </a>integrate top-tier models directly into your workflow, allowing you to centralize web interactions into a secure, actionable knowledge base without toggling between high-risk tabs.</p></div><ul><li><p><strong>AI Risks &amp; Opportunities:</strong> Beyond attack tools, leaders must be cautious about the risks posed by generic AI tools that may contain data bias or have ambiguous data retention policies, which can expose sensitive company data. Simultaneously, integrated AI-powered security tools are deemed necessary by over 62 percent of security leaders, and 73 percent plan to increase budgets for such platforms.</p></li></ul><p><strong>Strategic Mitigation: Active Resilience &amp; Modern Frameworks</strong></p><ul><li><p><strong>Active Resilience:</strong> This proactive posture moves beyond simple prevention to continuous monitoring of high-value assets and rapid incident containment. It recognizes that breaches <em>will</em> happen; the key is minimizing their impact and recovering quickly.</p></li><li><p><strong>Framework Adoption:</strong> Frameworks like NIST CSF 2.0 provide a common, business-aligned language for risk, shifting the perception of security from a costly burden to a critical operational function. Prioritizing NIST principles ensures a structured, governance-driven approach.</p></li></ul><p><strong>Tactical Implementation: Immediate Action Points</strong></p><p>For SMBs seeking immediate value, focus on narrow AI use cases and data-aware security while avoiding overly ambitious initial automation projects.</p><ul><li><p><strong>Implement a 90-Day &#8220;Active Resilience&#8221; Pilot:</strong></p><ul><li><p><strong>Days 1&#8211;30:</strong> Conduct a comprehensive Asset Inventory (aligning with NIST CSF 2.0). Map every high-value data asset and user identity.</p></li><li><p><strong>Days 31&#8211;60:</strong> Hardening phase. Deploy phishing-resistant MFA (FIDO2) across all applications, turn off vulnerable protocols like NTLM, block unauthorized browser extensions, and turn off &#8220;Save Password&#8221; features.</p></li></ul><div class="pullquote"><p>Move away from insecure, decentralized password management. <strong>Proton Pass for Business</strong> simplifies account security with end-to-end encryption and built-in 2FA, making it easy to enforce strong practices without adding complexity.</p></div><ul><li><p><strong>Days 61&#8211;90:</strong> Operationalize monitoring. Ingest logs from critical platforms (M365, Google Workspace) into AI-driven anomaly detection tools for real-time threat analysis.</p></li></ul></li><li><p><strong>Adopt Business-Specific Browsers:</strong> Deploy browsers with real-time AI to block phishing and prevent sensitive company data from being uploaded to public generative AI models. Utilize internal Data Loss Prevention (DLP) controls to intercept unauthorized &#8220;Paste&#8221; events and file uploads of source code or PII to non-approved AI domains.</p></li><li><p><strong>Develop Core Actionable Checklists:</strong></p><ul><li><p><strong>Credential Protection:</strong> Enforce phishing-resistant MFA and disable NTLM.</p></li><li><p><strong>Browser Lockdown:</strong> Block unauthorized extensions and turn off saved passwords.</p></li><li><p><strong>AI-Driven Email Defense:</strong> Implement DMARC/DKIM/SPF and look-alike detection.</p></li><li><p><strong>Log Integrity:</strong> Ingest core system logs for AI anomaly detection.</p></li><li><p><strong>Establish a Generative AI Acceptable Use Policy:</strong> Define approved models (prioritize Zero Data Retention), prohibited inputs (source code, PII), and mandatory human verification for outputs. <em>Note: We provide a full policy template to our premium subscribers in the deep-dive section below.</em></p></li></ul></li></ul><p><strong>Strategic Advice for SMB Cyber Leaders</strong></p><ul><li><p><strong>Operationalizing the vCISO Model:</strong> Transition to a virtual CISO model to access expert leadership without the high cost of a full-time executive. The primary value of a vCISO is in strategic <strong>Risk-Based Prioritization</strong>&#8212;the critical decision of <em>what not to fix</em>, ensuring resources are concentrated on high-value, high-impact security initiatives.</p></li><li><p><strong>Consolidation Alpha:</strong> Avoid &#8220;point solution bloat.&#8221; Favor integrated platforms to reduce the &#8220;integration tax&#8221;&#8212;the cost in time and complexity to make disparate tools work together. Keep your security team lean and focused by streamlining your technology stack.</p></li><li><p><strong>Deepfake Defense:</strong> Enforce a mandatory, exception-free &#8220;Out-of-Band&#8221; verification protocol for <em>any</em> financial transaction over $5,000. For example, if an internal or external request seems high-stakes or comes from an unusual source, employees must call a pre-verified number to confirm legitimacy.</p></li></ul><p>By focusing on these tactical, data-aware security practices and strategic leadership models, SMBs can effectively close the leadership gap, neutralize automated attacks, and build a resilient foundation for the challenges of 2026.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading the SMB Tech &amp; Cybersecurity Leadership Newsletter! If you have enjoyed the newsletter so far, why not share it with others?</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>Get access to the additional content in &#8220;<strong>Section 2: Premium Intelligence - 2026 Deep Dives, Templates, and Exercises&#8221; </strong>for our paid subscribers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="paywall-jump" data-component-name="PaywallToDOM"></div><p><strong>Section 2: Premium Intelligence - 2026 Deep Dives, Templates, and Exercises</strong></p><p>Welcome, premium subscribers, to this exclusive weekly briefing. While Section 1 provides the strategic baseline, this section is designed to give you the technical depth, tactical assets, and interactive exercises to translate strategy into action. This week, we&#8217;re expanding significantly on our core strategic themes.</p><p><strong>1. Generative AI Acceptable Use Policy Template</strong></p><p>Here is a comprehensive template based on the strategic objectives outlined above, designed to empower your team while protecting your critical data. Customize and implement this immediately.</p><ul><li><p><strong>Approved Models:</strong> Employees may only use AI platforms explicitly approved by the security team. We prioritize &#8220;Zero Data Retention&#8221; (ZDR) APIs or Enterprise versions that guarantee data will not be used to train public models.</p></li><li><p><strong>Prohibited Public Tools:</strong> Use of &#8220;Consumer&#8221; versions of popular LLMs is strictly forbidden for business tasks. These often default to using prompts for training.</p></li><li><p><strong>Shadow AI:</strong> Any new AI tool must undergo a &#8220;vCISO Review&#8221; before use.</p></li><li><p><strong>Tactical Data Boundaries:</strong></p><ul><li><p><strong>Prohibited Content:</strong> Never input Personally Identifiable Information (PII) of clients, internal source code, or unreleased financial statements. &#8220;If the data is not public knowledge, it does not belong in an LLM.&#8221;</p></li><li><p><strong>Redaction Protocol:</strong> Before AI-summarizing meetings or analyzing reports, redact names, specific dollar amounts, and proprietary project titles. Use generic placeholders (e.g., &#8220;Client A,&#8221; &#8220;Project X&#8221;). <em>Premium Insight: Implement automated DLP to enforce this for known sensitive data patterns.</em></p></li></ul></li><li><p><strong>Browser DLP:</strong> Our business-specific browsers are configured to automatically block &#8220;Paste&#8221; events of sensitive data into unauthorized AI domains.</p></li><li><p><strong>Human Accountability &amp; Output Verification:</strong></p><ul><li><p><strong>Verification Mandatory:</strong> AI models can hallucinate. You <em>must</em> verify all factual claims, legal citations, and technical code generated by AI before sharing with a client or deploying to production.</p></li><li><p><strong>Attestation:</strong> Any deliverable created with significant AI assistance should include an internal note or watermark for transparency and an audit trail.</p></li><li><p><strong>Deepfake Awareness:</strong> Clearly label AI-generated audio or video as such to maintain trust and comply with 2026 standards.</p></li></ul></li></ul><p></p><p><strong>2. Detailed Technical Takeaways &amp; How-Tos</strong></p><ul><li><p><strong>A. Decoding &#8220;Automated Opportunism&#8221;: The Threat Evolution</strong></p><ul><li><p><strong>Technical Detail:</strong> Attackers are using sophisticated LLM-based scripts that automatically and randomly mutate ransomware signatures every few seconds. This makes signature-based AV/EDR almost completely ineffective.</p></li><li><p><strong>Actionable Strategy:</strong> Implement Heuristic-based Endpoint Detection and Response (EDR) solutions immediately. These tools analyze behavioral anomalies (e.g., rapid file-encryption patterns, unusual process creation) rather than specific file hashes, enabling them to detect and block new variants of polymorphic malware in real time. Configure your EDR with tight, behavioral-based blocking policies, not just alert-only rules.</p></li></ul></li></ul><p></p><ul><li><p><strong>B. The Browser as Perimeter: Implementation Deep Dive</strong></p><ul><li><p><strong>Browser Choice:</strong> Leverage business-specific browsers (many offer managed enterprise features/add-ons) that integrate AI-powered DLP and phishing protection directly into the browsing experience, independent of the underlying OS or network.</p></li><li><p><strong>Configuration How-To:</strong></p><ul><li><p><strong>MFA-Enforced Login:</strong> Require strong MFA for all managed browser logins.</p></li><li><p><strong>Controlled Extension Marketplace:</strong> Allowlist approved extensions and block all unmanaged extensions to prevent data leakage and malicious add-ons.</p></li><li><p><strong>DLP Rules:</strong> Configure granular rules within your managed browser console:</p><ul><li><p><strong>Clipboard Control:</strong> Prevent copying data <em>from</em> internal SaaS applications into unauthorized external sites.</p></li><li><p><strong>File Upload Restriction:</strong> Explicitly block uploads containing patterns for specific file types (e.g., source code, PII spreadsheets) to unauthorized domains (including many public generative AI sites).</p></li><li><p><strong>AI Domain Governance:</strong> Maintain a dynamically updated list of approved vs. blocked AI domains. Enable automated scanning of prompt inputs on all allowed AI domains for sensitive content.</p></li></ul></li></ul></li></ul></li></ul><p></p><ul><li><p><strong>C. Mitigating AI Data Bias &amp; &#8220;Generic AI&#8221; Risks</strong></p><ul><li><p><strong>Technical Takeaway:</strong> Generic LLMs, while powerful, are trained on massive, uncontrolled datasets, which inherently contain data bias. For specific internal tasks (e.g., log analysis, intelligent email filtering, vulnerability scoring), generic models can produce inaccurate results or even increase risk by reinforcing existing, undetected biases.</p></li><li><p><strong>Actionable Strategy:</strong> Prioritize &#8220;Narrow AI&#8221; applications in which models can be fine-tuned to your organization&#8217;s unique traffic patterns, security events, and communication style. For example, use security-specialized AI modules from trusted vendors that have been trained on curated security datasets and then further fine-tuned using your local, anonymized logs and data. Avoid using generic public LLMs for automated decision-making or critical system monitoring without intensive human oversight and validation.</p></li></ul></li></ul><p></p><p></p><p><strong>3. Implementation Templates, Samples &amp; Checklists</strong></p><ul><li><p><strong>A: Deepfake Defense Out-of-Band Verification Procedure</strong></p><ul><li><p><em>Sample SOP Snippet:</em> </p><ul><li><p>For all financial transactions over $5,000 initiated or approved via electronic communication (email, messenger, video call), the recipient/executor must immediately perform Out-of-Band verification. They must <em>call</em> a pre-verified phone number (from a centralized internal directory, <em>not</em> a number provided in the communication) for the individual or department associated with the request to confirm details verbally&#8212;a<em>bsolutely no exceptions.</em> Log the verification call and confirmation details with the transaction record.</p></li></ul></li></ul></li></ul><p></p><ul><li><p><strong>B: Vendor AI Risk Assessment Questionnaire</strong></p><ul><li><p><em>Sample Questions Snippet:</em></p><ol><li><p>Does your service integrate or utilize any third-party AI models? If so, identify them.</p></li></ol><ol start="2"><li><p>What are the origins, composition, and update frequency of your model training data?</p></li></ol><ol start="3"><li><p>What are your data retention policies for inputs (prompts) to the AI models? Are inputs used for training public models, even in an anonymized form? (Zero Data Retention Priority).</p></li></ol><ol start="4"><li><p>Do you have documented processes to identify and mitigate bias within your AI models?</p></li></ol><ol start="5"><li><p>Can you provide audit reports or certifications (e.g., SOC 2, ISO) that specifically address the security and privacy of the data processed by your AI integrations?</p></li></ol></li></ul></li></ul><p></p><ul><li><p><strong>C: Technical &#8220;Active Resilience&#8221; 90-Day Pilot - Day 31-60 Hardening Checklist</strong></p><ul><li><p>[ ] Phishing-Resistant MFA (e.g., FIDO2) enforced for all employees on all SaaS/internal applications.</p></li><li><p>[ ] NTLM protocol disabled on all Domain Controllers and critical servers. Document and address any legacy application dependencies.</p></li><li><p>[ ] Managed browser policies implemented, allowing approved extensions only.</p></li><li><p>[ ] &#8220;Save Password&#8221; and form-fill features disabled in all managed browsers. Implement an enterprise password management solution instead.</p></li><li><p>[ ] Browser DLP rules deployed for PII and source code uploads to unauthorized AI domains.</p></li><li><p>[ ] DMARC/DKIM/SPF protocols configured and enforced for all outbound company email domains. DMARC policy set to &#8220;Reject&#8221; or &#8220;Quarantine&#8221; where appropriate.</p></li><li><p>[ ] AI-driven email defense system with look-alike domain detection enabled and configured to actively block or flag highly suspicious emails.</p></li></ul></li></ul><p></p><p></p><p><strong>4. Strategic Exercises</strong></p><ul><li><p><strong>Tabletop Exercise: Deepfake Financial Scam Scenario</strong></p><ul><li><p><em>Premise:</em> A senior accountant receives a highly convincing deepfake video call (simulating the CEO or CFO) that urgently requests an out-of-band wire transfer to a new vendor for a critical project. The &#8220;executive&#8221; uses urgency, pressure, and specific details.</p></li><li><p><em>Exercise Goal:</em> Test and refine the internal financial control and deepfake verification procedures. Did the accountant recognize the potential threat? Did they follow the strict Out-of-Band verification protocol? Were there any weaknesses or gaps identified (e.g., outdated contact lists, confusion about the procedure)? Use this exercise to reinforce training and improve procedural resilience.</p></li></ul></li></ul><p></p><ul><li><p><strong>Exercise: Evaluating Current CISO Leadership Model</strong></p><ul><li><p><em>Exercise Goal:</em> Assess if a shift to a fractional vCISO model is appropriate. Consider: Do you have a full-time CISO with 2026-specific AI/cyber expertise? Are you effectively managing the leadership gap and strategically prioritizing risk? Analyze the costs and benefits of a high-quality vCISO engagement versus a less-experienced internal resource or no dedicated CISO leadership. Consider a potential strategic focus on decision <em>optimization</em> (risk-based prioritization) that a seasoned vCISO can provide.</p></li></ul></li></ul><p></p><p><strong>5. Implementation Guides</strong></p><ul><li><p><strong>vCISO Selection &amp; Engagement SOW Checklist/Template Snippet</strong></p><ul><li><p><em>Scope of Work (SOW) Key Items:</em></p><ul><li><p><strong>Deliverables:</strong> Security Strategy Roadmap (annual update), Quarterly Risk Assessment &amp; Board Reporting, Policy Development &amp; Review (including Generative AI and Deepfake Defense), Incident Response Plan Management, Vendor AI Risk Assessment Support.</p></li><li><p><strong>Meetings:</strong> Weekly strategy calls, monthly security updates, quarterly progress reviews.</p></li><li><p><strong>Specific 2026 Focus:</strong> Explicit requirement for vCISO to demonstrate expertise in AI risks, browser security, social engineering defense, and NIST CSF 2.0.</p></li><li><p><strong>Metrics for Success:</strong> Improved security posture scores (measured by specific tools or audits), reduced mean-time-to-containment for incidents, increased number of employees trained on new procedures, and successful completion of tabletop exercises.</p></li></ul></li></ul></li></ul><p></p><ul><li><p><strong>Browser DLP Configuration Best Practices Guide</strong></p><ul><li><p><em>Detailed Guide Sections:</em></p><ul><li><p>Step-by-step instructions for configuring DLP rules within popular managed browser consoles.</p></li><li><p>Specific examples of Regex patterns to use for identifying PII (Social Security Numbers, credit card numbers) and source code (common keywords/structures).</p></li><li><p>Recommendations for defining and dynamically managing approved AI tool lists vs. generic public models.</p></li><li><p>Guidance on continuous monitoring, rule refinement based on traffic patterns, and employee communication regarding browser DLP controls.</p></li></ul></li></ul></li></ul><p></p><p>This comprehensive set of technical insights, detailed templates, strategic exercises, and implementation guides equips you, the premium subscriber, not only to understand the strategic vision but also to operationalize active resilience, mitigate sophisticated AI threats, and effectively bridge the leadership gap in 2026 and beyond.</p><p>Stay strategic, stay secure.</p><div><hr></div><h3>Tactical Implementation Roadmap</h3><p>To move from theory to action, follow this 90-day pilot focused on hardening your most vulnerable vectors.</p><h4>Phase 1: The 90-Day Pilot</h4><ul><li><p><strong>Days 1&#8211;30 (Asset Inventory):</strong> Map every high-value data asset and user identity. You cannot protect what you don&#8217;t know exists.</p></li><li><p><strong>Days 31&#8211;60 (Hardening):</strong> Deploy phishing-resistant MFA (like FIDO2 keys) and disable NTLM to prevent credential relay attacks. Lock down browsers by blocking unauthorized extensions and turning off &#8220;Save Password&#8221; features.</p></li><li><p><strong>Days 61&#8211;90 (Automated Monitoring):</strong> Ingest Google Workspace or M365 logs into an AI-driven anomaly detection tool to catch identity theft in real-time.</p></li></ul><p></p><p></p><h4>Phase 2: Defense-in-Depth Checklist</h4><ul><li><p><strong>Email Defense:</strong> Enforce DMARC/DKIM/SPF protocols and utilize AI-driven &#8220;look-alike&#8221; domain detection.</p></li><li><p><strong>Deepfake Protocols:</strong> Establish a mandatory &#8220;Out-of-Band&#8221; verification for any financial transaction over $5,000. If an &#8220;Executive&#8221; sends a message, the recipient must call a pre-verified number to confirm&#8212;no exceptions.</p></li><li><p><strong>AI Policy:</strong> Create a clear Acceptable Use Policy that limits generative AI use to &#8220;Zero Data Retention&#8221; models only, ensuring your company secrets don&#8217;t end up in a public training set.</p></li></ul><p></p><div><hr></div><h2>Policy Objective: Empowering Innovation While Neutralizing Risk</h2><p>The primary goal of this Generative AI Acceptable Use Policy is to enable our team to leverage AI productivity gains without compromising company intellectual property or client confidentiality. By focusing on &#8220;Zero Data Retention&#8221; models and strict data boundaries, we ensure our competitive advantage remains internal. This policy moves us toward an active state of resilience in which technology serves the business safely.</p><div><hr></div><h3>Pillar 1: Strategic Tool Selection and &#8220;Zero Data Retention&#8221;</h3><p>We prioritize tools that provide enterprise-grade privacy protections to prevent our data from being used to train public models.</p><ul><li><p><strong>Approved Models:</strong> Employees may only use AI platforms explicitly approved by the security team. We favor &#8220;Zero Data Retention&#8221; (ZDR) APIs or Enterprise versions of tools where the provider contractually agrees not to store or learn from our inputs.</p></li><li><p><strong>Prohibited Public Tools:</strong> Use of &#8220;Consumer&#8221; versions of popular LLMs is strictly forbidden for business tasks. These public versions often default to using your prompts for training, which could expose our private strategies to competitors.</p></li><li><p><strong>Shadow AI:</strong> Any new AI tool not currently on the approved list must undergo a 48-hour &#8220;vCISO Review&#8221; to ensure its data privacy policy aligns with our risk appetite.</p></li></ul><p></p><h3>Pillar 2: Tactical Data Boundaries and Input Restrictions</h3><p>The most significant risk in AI adoption is the &#8220;leaking&#8221; of sensitive data through the prompt window. We maintain a &#8220;No PII, No Secrets&#8221; rule for all AI interactions to mitigate this.</p><ul><li><p><strong>Prohibited Content:</strong> You are never permitted to input Personally Identifiable Information (PII) of clients, internal source code, or unreleased financial statements into an AI tool. If the data is not public knowledge, it does not belong in an LLM.</p></li><li><p><strong>Redaction Protocol:</strong> Before using AI to summarize a meeting or analyze a report, you must scrub all names, specific dollar amounts, and proprietary project titles. Use generic placeholders like &#8220;Client A&#8221; or &#8220;Project X&#8221; instead.</p></li><li><p><strong>Browser DLP:</strong> Our business-specific browsers automatically block &#8220;Paste&#8221; events that contain recognized patterns of sensitive data to unauthorized AI domains.</p></li></ul><p></p><h3>Pillar 3: Human Accountability and Output Verification</h3><p>While AI can generate content rapidly, the legal and ethical responsibility for that content remains with the human employee. We enforce a &#8220;Human-in-the-Loop&#8221; requirement for all AI-assisted work.</p><ul><li><p><strong>Verification Mandatory:</strong> AI models can &#8220;hallucinate&#8221; or provide biased information. You must verify all factual claims, legal citations, and technical code generated by an AI before it is shared with a client or deployed to production.</p></li><li><p><strong>Attestation:</strong> Any major deliverable created with significant AI assistance should include a small internal note or watermark. This transparency ensures we can track the origin of the logic if a bias or error is discovered later.</p></li><li><p><strong>Deepfake Awareness:</strong> If an AI tool is used to generate audio or video for marketing, it must be clearly labeled as &#8220;AI-Generated&#8221; to maintain trust with our audience and comply with 2026 transparency standards.</p></li></ul><div><hr></div><h3>Help Other Leaders Secure Their Future</h3><p><strong>The Network Effect of SMB Security</strong> </p><p>The most effective way to strengthen our SMB community is by sharing the strategies that actually work in the field. If you find value in these technical deep dives, helping a fellow leader bridge their tech gap makes the entire ecosystem more resilient. Cybersecurity is a collective effort and more informed peers lead to a safer environment for everyone&#8217;s business.</p><p><strong>Why Share This Subscription?</strong> When you refer a colleague to this newsletter, you are giving them access to the same specialized insights you use to lead your team:</p><ul><li><p><strong>Zero-fluff technical execution:</strong> No high-level theory, just the steps to implement.</p></li><li><p><strong>Cost-saving vendor analysis:</strong> Honest looks at which tools are worth the SMB budget.</p></li><li><p><strong>Direct coaching frameworks:</strong> Access to the same logic I use with private coaching clients.</p></li></ul><p><strong>Pay It Forward</strong> Use the button below to share this post or your unique referral link. When your peers join our community, we all benefit from a more secure and tech-forward marketplace.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/p/the-weekly-smb-cyber-and-tech-compass?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/leaderboard?&amp;utm_source=post&quot;,&quot;text&quot;:&quot;Refer a friend&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/leaderboard?&amp;utm_source=post"><span>Refer a friend</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&amp;gift=true&quot;,&quot;text&quot;:&quot;Give a gift subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/subscribe?&amp;gift=true"><span>Give a gift subscription</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?group=true&amp;coupon=80263d69&quot;,&quot;text&quot;:&quot;Get 25% off a group subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/subscribe?group=true&amp;coupon=80263d69"><span>Get 25% off a group subscription</span></a></p>]]></content:encoded></item><item><title><![CDATA[Regulatory Sovereignty: The GSA, SEC, and the "American AI" Sledgehammer]]></title><description><![CDATA[How New Procurement Mandates and Board Accountability Rules are Reshaping the SMB Leadership Playbook.]]></description><link>https://substack.cpf-coaching.com/p/the-shadow-layer-epidemic-why-smb</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-shadow-layer-epidemic-why-smb</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 20 Mar 2026 21:41:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XcmT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>The Sovereign Identity Era: Strategic Resilience and the Fragmentation of Trust</h1><p>The convergence of technological autonomy and regulatory nationalism has defined the week ending March 20, 2026. For SMB leaders spanning the technical, legal, and privacy domains, the paradigm has shifted from managing discrete IT risks to navigating a complex web of &#8220;shadow layers&#8221; and &#8220;regulatory sovereignty&#8221;.</p><p>The traditional perimeter is not merely breached; it has been replaced by a fluid ecosystem where identity is the primary firewall and the supply chain is an interconnected attack surface.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XcmT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XcmT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 424w, https://substackcdn.com/image/fetch/$s_!XcmT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 848w, https://substackcdn.com/image/fetch/$s_!XcmT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 1272w, https://substackcdn.com/image/fetch/$s_!XcmT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XcmT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png" width="1024" height="572" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:572,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:945250,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/191601611?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XcmT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 424w, https://substackcdn.com/image/fetch/$s_!XcmT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 848w, https://substackcdn.com/image/fetch/$s_!XcmT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 1272w, https://substackcdn.com/image/fetch/$s_!XcmT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ec3bd1-96a6-46aa-9119-1e3d568e0e78_1024x572.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div><hr></div><h2>The Week in Review: The Invisible Supply Chain and the &#8220;American AI&#8221; Mandate</h2><h3>The Epidemic of the &#8220;Shadow Layer&#8221;</h3><p>The <em>Black Kite Seventh Annual Third-Party Breach Report</em> reveals a massive &#8220;shadow layer&#8221; of cyber victims. While 719 companies were publicly identified as victims of major breaches last year, researchers discovered an additional 26,000 organizations that were compromised but never named.</p><ul><li><p><strong>The 73-Day &#8220;Silent Window&#8221;:</strong> While intrusions are typically detected within 10 days, companies waited a median of 73 days before issuing a public notification. This delay shifts the risk onto downstream customers who remain unaware of their exposure for over two months.</p></li><li><p><strong>Concentrated Risk:</strong> 70% of the top fifty shared tech vendors have at least one vulnerability in the CISA KEV catalog.</p><p></p></li></ul><blockquote><p><strong>Stop the Breach Before the &#8220;Silent Window&#8221; Closes.</strong> &#128737;&#65039; With third-party breach notifications lagging by a median of 73 days, SMBs can no longer afford to wait for a vendor&#8217;s signal. <strong>CrowdStrike Falcon</strong> provides the AI-native, identity-first protection required to stay ahead of modern, malware-less attacks. Secure your entire infrastructure at scale and turn your identity layer into your strongest firewall. <a href="https://crowdstrike2001.partnerlinks.io/Cpf-coaching">https://crowdstrike2001.partnerlinks.io/Cpf-coaching</a></p></blockquote><p></p><h3>The GSA&#8217;s &#8220;American AI&#8221; Sledgehammer</h3><p>The General Services Administration (GSA) has proposed a radical contract clause, <strong>GSAR 552.239-7001</strong>, &#8220;Basic Safeguarding of Artificial Intelligence Systems&#8221; .</p><ul><li><p><strong>The Mandate:</strong> It prohibits federal contractors from using any AI components manufactured, developed, or controlled by non-U.S. entities.</p></li><li><p><strong>The Impact:</strong> This clause takes precedence over standard commercial service agreements, forcing SMBs to verify the &#8220;provenance&#8221; of every tool in their stack.</p></li></ul><p></p><h3>Bodily Autonomy: Washington&#8217;s HB 2303</h3><p>In a milestone for workplace privacy, Washington State has banned employers from requiring, or even requesting, that employees have microchips implanted under their skin. While marketed as a tool for streamlining office access, legislators view the ban as a necessary &#8220;preventative measure&#8221; against invasive workplace surveillance.</p><p></p><p></p><h3>&#128161; Immediate Actionable Takeaways for SMBs</h3><ol><li><p><strong>Close the &#8220;Silent Window&#8221;:</strong> Audit vendor contracts to require breach notification within 72 hours of <em>discovery</em>, not just <em>determination</em>, to bypass the 73-day industry median delay.</p></li><li><p><strong>Inventory the AI Stack:</strong> Identify any tools in your workflow (from chatbots to coding assistants) that rely on non-U.S. components to prepare for GSA compliance.</p></li><li><p><strong>Harden Public-Facing Apps:</strong> Exploitation of public apps rose 44% this year. Prioritize patching for the <strong>Langflow</strong> critical flaw (CVE-2026-33017) and <strong>SharePoint</strong> (CVE-2026-20963).</p></li><li><p><strong>Lock the Front Door:</strong> Transition from SMS-based MFA to phishing-resistant <strong>passkeys or hardware tokens</strong>, as identity abuse is now the primary entry point for attackers.</p></li></ol><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/the-shadow-layer-epidemic-why-smb?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading SMB Tech &amp; Cybersecurity Leadership Newsletter! If this post has provided you with value, why not share it with others?</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/the-shadow-layer-epidemic-why-smb?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/p/the-shadow-layer-epidemic-why-smb?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>More Information for subscribers below</p><div class="paywall-jump" data-component-name="PaywallToDOM"></div><h2>Strategic Deep Dives: Agentic AI and Board Liability</h2><h3>The Shift to &#8220;Agentic AI&#8221; (Microsoft Power Platform Update)</h3><p>Microsoft&#8217;s March 2026 update signals the transition from simple automation to &#8220;Agentic AI&#8221;&#8212;autonomous entities that can take actions on behalf of users.</p><ul><li><p><strong>Power Platform Inventory:</strong> Now generally available, providing a unified view of all &#8220;agent flows&#8221; to prevent &#8220;orphaned resources&#8221; that could create security backdoors.</p></li><li><p><strong>Object-Centric Process Mining (OCPM):</strong> This enables SMBs to analyze complex supply chains by following interacting business objects (invoices, deliveries) rather than single-case IDs, enabling cross-entity compliance verification.</p></li><li><p><strong>AI Discovery:</strong> Notably, an AI agent named &#8220;XBOW&#8221; discovered a critical remote code execution bug (CVE-2026-21536) this week, signaling that AI-driven vulnerability research is now a reality.</p></li></ul><p></p><blockquote><p><strong>Master the Mandate: AI Governance for the Sovereign Era.</strong> &#129302; As federal requirements like GSAR 552.239-7001 reshape the AI marketplace, your organization needs more than just a chatbot&#8212;it needs an orchestration layer. <strong>Airia AI</strong> delivers the comprehensive security architecture and governance controls required to deploy AI with confidence. Ensure compliance and maintain data sovereignty across your entire AI journey. <a href="https://try.airia.com/CPF-coaching">https://try.airia.com/CPF-coaching</a></p></blockquote><p></p><h3>SEC Regulation S-P: The &#8220;Materiality&#8221; Test</h3><p>With the <strong>June 3, 2026,</strong> compliance deadline approaching, the SEC has made cybersecurity a board-level fiduciary duty.</p><ul><li><p><strong>Active Supervision:</strong> Boards must move from &#8220;receiving updates&#8221; to &#8220;exercising active supervision&#8221; of the organization&#8217;s risk profile.</p></li><li><p><strong>The 4-Day Rule:</strong> Material incidents must be disclosed within four business days. &#8220;Materiality&#8221; now explicitly includes qualitative factors such as impact on reputation, customer relationships, and &#8220;shadow layer&#8221; risks to partners.</p><p></p></li></ul><h3>Threat Actor Spotlight: The &#8220;Big Six&#8221;</h3><ul><li><p><strong>The Shai-Hulud Worm:</strong> This worm has compromised 800 npm packages by harvesting tokens from CI/CD pipelines and GitHub.</p></li><li><p><strong>Handala Hack:</strong> A pro-Iranian group that launched a destructive &#8220;wiper&#8221; attack on medical firm <strong>Stryker</strong> this week, reportedly factory-resetting tens of thousands of devices globally.</p></li><li><p><strong>Zestix:</strong> An Initial Access Broker selling stolen credentials on the dark web for ShareFile and Nextcloud instances, acting as the &#8220;fuel&#8221; for the current ransomware ecosystem.</p></li></ul><div><hr></div><p></p><h2>SMB Leadership Toolkit: Resilience Templates</h2><h3>Template 1: AI Vendor &#8220;Sovereignty&#8221; Audit</h3><p>Use this to evaluate if your AI stack complies with the upcoming GSA &#8220;American AI&#8221; requirements.</p><p><strong>Audit Question Requirement Risk Level</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NDqh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NDqh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 424w, https://substackcdn.com/image/fetch/$s_!NDqh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 848w, https://substackcdn.com/image/fetch/$s_!NDqh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 1272w, https://substackcdn.com/image/fetch/$s_!NDqh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NDqh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png" width="1456" height="417" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:417,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97439,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/191601611?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NDqh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 424w, https://substackcdn.com/image/fetch/$s_!NDqh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 848w, https://substackcdn.com/image/fetch/$s_!NDqh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 1272w, https://substackcdn.com/image/fetch/$s_!NDqh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7424eb6-91ff-4b6d-ae8e-4a6c3bc879d7_1552x444.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>Template 2: Board-Level Materiality Matrix</h3><p>A guide for documenting the rationale for breach disclosure to satisfy SEC Regulation S-P.</p><ul><li><p><strong>Quantitative Check:</strong> Does the remediation cost or revenue loss exceed established internal thresholds?</p></li><li><p><strong>Qualitative Factor 1 (Regulatory):</strong> Does the breach involve &#8220;sensitive data&#8221; like <strong>neural information</strong> (protected in CT) or <strong>precise geolocation</strong> (protected in OR)?</p></li><li><p><strong>Qualitative Factor 2 (Supply Chain):</strong> Will this incident trigger a &#8220;shadow layer&#8221; breach for our downstream partners?</p></li><li><p><strong>Qualitative Factor 3 (Reputation):</strong> Was the incident caused by a failure of documented &#8220;Board Oversight&#8221; processes?</p></li></ul><p></p><blockquote><p><strong>Fiduciary Duty Meets Cyber Resilience.</strong> &#128188; With the SEC&#8217;s June 2026 deadline fast approaching, cyber oversight is no longer optional&#8212;it is a personal accountability for the board. <strong>Omnistruct</strong> acts as your embedded Business Information Security Officer (BISO), providing the strategic expertise to align your GRC and privacy programs with your core business objectives. Mature your posture without sacrificing agility. <a href="https://omnistruct.com/partners/influencers-meet-omnistruct/">https://omnistruct.com/partners/influencers-meet-omnistruct/</a></p></blockquote><p></p><h3>Template 3: CI/CD &#8220;Curated Catalog&#8221; Policy</h3><p>Tactical steps to mitigate Shai-Hulud-style supply chain attacks.</p><ol><li><p><strong>Identity Rotation:</strong> Rotate all CI/CD and npm tokens every 24 hours to prevent harvesting by worms.</p></li><li><p><strong>Pin Dependencies:</strong> Mandate the use of &#8220;pinned&#8221; versions and hashes for all open-source packages to prevent automated malicious updates.</p></li><li><p><strong>Audit Pre-installs:</strong> Flag any package that runs scripts during the <code>preinstall</code> phase for manual security review.</p></li></ol>]]></content:encoded></item><item><title><![CDATA[How to Pivot into Cybersecurity and Secure AI Agents]]></title><description><![CDATA[Learn how to pivot into cybersecurity and secure AI agents with ProArch CTO Ben Wilcox. Real-world insights on cybersecurity consulting, AI risk management, and career transitions for tech leaders. Stop building "glass houses" and start securing your growth.]]></description><link>https://substack.cpf-coaching.com/p/how-to-pivot-into-cybersecurity-and</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/how-to-pivot-into-cybersecurity-and</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Mon, 16 Mar 2026 04:49:38 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9326d7bb-a160-4c7f-baa1-2b9e2a355630_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Your &#8220;security first&#8221; culture is actually a lie.</strong></p><p>We talk about protection while leaving the backdoor open for every shiny new AI tool.</p><p>I just finished digging into the latest chat with Ben Wilcox (CTO/CSO at ProArch), and it&#8217;s a reality check for anyone thinking they can &#8220;bolt-on&#8221; security later&#8212;especially with AI agents.</p><p>The solution isn&#8217;t a bigger firewall or a 50-page policy manual that nobody reads. It&#8217;s about <strong>contextual curiosity.</strong></p><p>Here is the &#8220;Wilcox Pivot&#8221; framework you should steal for your team (or your own career):</p><ul><li><p><strong>The &#8220;Shadow AI&#8221; Audit:</strong> Stop banning ChatGPT. Instead, ask your team for the three prompts they use daily. If you don&#8217;t know the prompts, you don&#8217;t know where your data is going.</p></li><li><p><strong>The Generalist Edge:</strong> Ben points out that the best cyber pros aren&#8217;t just &#8220;hackers.&#8221; They are business people who happen to understand networks. If you&#8217;re pivoting, lead with your industry knowledge, not your coding certs.</p></li><li><p><strong>The Agent Guardrail:</strong> If you are deploying AI agents, they need &#8220;least privil&#8230;</p></li></ul>
      <p>
          <a href="https://substack.cpf-coaching.com/p/how-to-pivot-into-cybersecurity-and">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[SMB Vendor Risk Management: The 2026 TPRM Guide]]></title><description><![CDATA[Protect your SMB from supply chain attacks. Discover why trusted vendor access is your biggest cyber risk and download our free 4-step TPRM checklist.]]></description><link>https://substack.cpf-coaching.com/p/smb-vendor-risk-management-the-2026</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/smb-vendor-risk-management-the-2026</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 13 Mar 2026 20:55:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Jdw6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>The concept of &#8220;trusted behavior&#8221; is being weaponized. In 2026, relying on the security of your third-party vendors without continuous verification is a recipe for a catastrophic, industry-wide breach.</strong></p><p>We spent last week locking down internal AI usage. But what happens when the vendors you already do business with get compromised? Over the last 48 hours, the cybersecurity landscape was rocked by two major events that prove &#8220;Trust but Verify&#8221; is dead. It is now: <em>Verify.</em></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jdw6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jdw6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Jdw6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Jdw6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Jdw6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jdw6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7165980,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/190870750?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jdw6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Jdw6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Jdw6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Jdw6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86327b1c-e7ac-4b7f-bd22-595ad185bf3f_2816x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p><strong>I. Supply chain attacks are becoming hyper-targeted and industrialized.</strong> This week, the INC Ransomware group claimed to have carried out successful attacks against 10 law firms within a 48-hour window. This wasn&#8217;t a coincidence; cybersecurity researchers strongly suspect a coordinated supply-chain compromise of a shared legal technology provider. When a vendor in your SaaS stack is breached, their trusted connection to your network becomes a weapon. Your SMB is no longer an isolated castle; it is a single room in a very vulnerable apartment building.</p><p></p><p><strong>II. Extortionists are hunting &#8220;Abnormal Trusted Behavior.&#8221;</strong> Yesterday, news broke that business process outsourcing giant Telus Digital was hit with a massive cyberattack by the ShinyHunters extortion group. The attackers didn&#8217;t use smash-and-grab ransomware. Instead, they focused on strategic vishing (voice phishing) and impersonation to steal data from connected SaaS platforms like Salesforce. As one investigator noted, organizations are good at detecting &#8220;bad behavior,&#8221; but completely blind to &#8220;abnormal trusted behavior.&#8221; If your IT support vendor&#8217;s credentials are stolen, the hacker appears to be an employee.</p><div class="pullquote"><p>&#128736;&#65039; <strong>Tool Spotlight:</strong> You cannot stop these attacks with legacy antivirus. You need an AI-native platform that monitors identity and behavior. <strong><a href="https://crowdstrike2001.partnerlinks.io/Cpf-coaching">CrowdStrike Falcon</a></strong> unifies endpoint and identity protection to detect when a "trusted" account suddenly starts acting maliciously, keeping you ahead of AI-powered attacks.</p></div><p></p><p><strong>III. The &#8220;Post-Breach&#8221; Arsenal is expanding.</strong> If an attacker piggybacks on a vendor to slip into your network, stopping them is getting harder. Microsoft&#8217;s March 2026 Patch Tuesday released fixes for over 80 vulnerabilities. The alarming statistic? <strong>55% of them were privilege-escalation bugs</strong>, including critical flaws in Windows SMB Server. This means once a low-level threat actor gets a foothold, they can trivially escalate their access to full administrator control before your automated defenses even register an anomaly.</p><p><strong>The Fix:</strong> You can no longer afford to give third-party vendors standing, permanent access to your environments. You must transition to &#8220;Just-in-Time&#8221; (JIT) access models, where vendors are granted the minimum necessary permissions for a limited time window, and every action is logged.</p><p></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/smb-vendor-risk-management-the-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading the SMB Tech &amp; Cybersecurity Leadership Newsletter! This part of the blog is currently public. Why not share it with others? </p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/smb-vendor-risk-management-the-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/p/smb-vendor-risk-management-the-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h3><strong>Paid Subscriber Exclusive: Auditing Your &#8220;Trusted&#8221; Connections</strong></h3><p></p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/smb-vendor-risk-management-the-2026">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[CPF Coaching: Fractional CISO Advisory & Career Growth]]></title><description><![CDATA[Join CPF Coaching to unlock exclusive cybersecurity job hunting strategies, executive CISO mentorship, and the ultimate career accelerator bundle.]]></description><link>https://substack.cpf-coaching.com/p/cpf-coaching-fractional-ciso-advisory</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/cpf-coaching-fractional-ciso-advisory</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Tue, 10 Mar 2026 16:03:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YfY-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc0ea6f9-9832-41d8-9807-cbdc9be949f0_640x640.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone,</p><p>Over the last few years, this newsletter has grown to over 2,000 CISOs, IT Directors, MSP owners, and cybersecurity practitioners. It<strong>&#8217;</strong>s been incredible to build this community and share the trenches with you.</p><p>As a Fractional CISO, I spend a lot of time advising growing organizations on security strategy. But behind the scenes, I spend just as much time coaching highly talented cybersecurity professionals who are stuck in their careers.</p><p>Time and time again, I see brilliant technical minds get passed over for promotions or struggle to land the right roles because of three things:</p><ol><li><p>They don&#8217;t have time to network effectively.</p></li><li><p>They hate &#8220;self-promotion&#8221; and struggle to build a digital brand.</p></li><li><p>They don&#8217;t know how to translate their technical wins into the business language that leadership cares about.</p></li></ol><p>I developed the <strong>CPF Method</strong> to solve exactly these problems. And today, I&#8217;m thrilled to announce a new way to bring this method directly to you, in a highly actionable, accessible format.</p><p>S&#8230;</p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/cpf-coaching-fractional-ciso-advisory">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The "Hidden" Tech Debt of 2026 AI Adoption]]></title><description><![CDATA[Unchecked AI usage is creating massive "Shadow Tech Debt" for SMBs. Learn how to stop AI data leaks and download our free 1-Page AI Acceptable Use Policy.]]></description><link>https://substack.cpf-coaching.com/p/the-hidden-tech-debt-of-2026-ai-adoption</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-hidden-tech-debt-of-2026-ai-adoption</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Sun, 08 Mar 2026 18:31:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bJNp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Unchecked AI experimentation is creating a new class of "Shadow Tech Debt" that will cause major security breaches and prolonged downtime in 2026 unless leaders centralize governance now.</p><p>While AI tools promised a productivity revolution, many SMBs inadvertently built a house of cards. The speed of adoption outpaced the implementation of necessary guardrails. If you do not have a formal policy for which AI tools can touch company data, you are essentially leaving your front door unlocked. The cybersecurity events of this past week prove this is no longer a theoretical risk.</p><p></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bJNp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bJNp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 424w, https://substackcdn.com/image/fetch/$s_!bJNp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 848w, https://substackcdn.com/image/fetch/$s_!bJNp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 1272w, https://substackcdn.com/image/fetch/$s_!bJNp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bJNp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png" width="1408" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:768,&quot;width&quot;:1408,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:0,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bJNp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 424w, https://substackcdn.com/image/fetch/$s_!bJNp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 848w, https://substackcdn.com/image/fetch/$s_!bJNp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 1272w, https://substackcdn.com/image/fetch/$s_!bJNp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa7bda24-e63f-43d8-81d0-9bb1ad82de79_1408x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?utm_source=email&amp;r=&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/subscribe?utm_source=email&amp;r="><span>Subscribe</span></a></p><p></p><p></p><p><strong>I. AI-driven data leaks are the new "Shadow IT" crisis.</strong></p><p>Employees frequently feed sensitive client information and proprietary code into free or unvetted AI tools to save time. Without formal oversight, these tools often use that data for training.</p><p>Just this week, reports surfaced detailing how a misconfigured AI application exposed over 1.5 million private records and API keys. Industry analysis surrounding this event highlighted that 63% of organizations currently lack formal AI governance policies. Relying on manual annual audits is an obsolete strategy when a single shadow AI tool can compromise millions of records overnight. You need a continuous monitoring process to ensure new integrations do not learn from your private customer data without consent.</p><p></p><p><strong>II. The "AI Speed Tax" is crippling incident recovery.</strong></p><p>The cost of remediation far outweighs the cost of early governance. The financial hit from an AI-related data breach is higher than traditional breaches due to the complexity of identifying exactly what data was ingested by a model.</p><p>A new Fastly Global Security Research Report released this week puts hard numbers behind this reality. The report reveals that AI-first businesses are taking an average of 80 days longer to recover from cybersecurity incidents compared to businesses that have not heavily integrated AI. This 80-day penalty stems directly from decentralized data flows and agentic workflows expanding the attack surface faster than security teams can modernize their defenses.</p><p></p><p><strong>III. Traditional Identity Security is failing against AI-enabled threats.</strong></p><p>As AI integrates deeper into operations, securing the identity of the user accessing those tools becomes paramount. However, relying on standard MFA is no longer enough to protect your stack.</p><p>This week, a global coalition of law enforcement disrupted Tycoon 2FA, an industrialized phishing-as-a-service platform. This platform specifically automated Adversary-in-the-Middle (AiTM) attacks to capture one-time passcodes and session cookies at scale.</p><p>Cybercriminals are buying off-the-shelf software to defeat the exact MFA tools most SMBs rely on. Moving to phishing-resistant authentication is now a baseline survival requirement for protecting your AI and SaaS environments.</p><p></p><p>If you gained value from this post, why not share it with others?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/p/the-hidden-tech-debt-of-2026-ai-adoption?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/p/the-hidden-tech-debt-of-2026-ai-adoption?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>If you have not subscribed as yet, this month I will be rolling out more content for paid subscribers, to help implement the concepts we cover in your business or the ones that you support.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?utm_source=email&amp;r=&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.cpf-coaching.com/subscribe?utm_source=email&amp;r="><span>Subscribe</span></a></p><p></p><p>Below is additional content for paid subscribers to implement this weeks content.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/cpfcoaching/chat&quot;,&quot;text&quot;:&quot;Join the chat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.substack.com/pub/cpfcoaching/chat"><span>Join the chat</span></a></p><p>And ask more questions </p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/the-hidden-tech-debt-of-2026-ai-adoption">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Data-Driven Cyber Leader]]></title><description><![CDATA[Why data-driven optimization and business context are the next frontiers in cybersecurity engineering. From Best Buy to founding Zaun.ai, Tyler Lalicker&#8217;s journey defines a new paradigm for AI-native security, leveraging business context to disrupt commodity MDR.]]></description><link>https://substack.cpf-coaching.com/p/architecting-ai-native-secops-the</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/architecting-ai-native-secops-the</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 06 Mar 2026 11:50:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EBFz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F083c3e85-bcb6-4f09-97e9-4c1e6944448e_1024x559.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the hyper-dynamic landscape of modern cybersecurity, the most disruptive solutions rarely emerge from traditional academic silos. Instead, they are engineered by &#8220;Unconventional Architects,&#8221; professionals who can synthesize disparate data streams into high-stakes business intelligence. Tyler Lalicker&#8217;s journey from a retail associate at Best Buy to the founder of <a href="https://zaun.ai/contact?ref=cpf">Zaun.ai</a> embodies this evolution. Lalicker did not follow a leisurely path; out of pure necessity, he secured his bachelor&#8217;s degree in a staggering six months, a testament to his &#8220;accelerated acquisition&#8221; methodology.</p><p>Entering cybersecurity is frequently described as &#8220;drinking from multiple fire hoses,&#8221; an intense experience that paralyzes many. For Lalicker, this intensity was the required fuel for innovation. By applying a perspective forged in retail optimization and a childhood obsession with engineering, he bypassed the standard entry-level stagnation. Before he became a security leader, Lalicker was a master of identif&#8230;</p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/architecting-ai-native-secops-the">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[2026 SMB Strategy: Why the "Forward Deployed" Model is the New Standard for AI and Compliance]]></title><description><![CDATA[The Bottom Line: As we navigate 2026, passive cybersecurity and AI compliance are no longer just operational risks.]]></description><link>https://substack.cpf-coaching.com/p/2026-smb-strategy-why-the-forward</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/2026-smb-strategy-why-the-forward</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Thu, 05 Mar 2026 02:22:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Rg18!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cdeaa7a-7fbe-479c-a968-7e6f232d78de_1408x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>The Bottom Line:</strong> As we navigate 2026, passive cybersecurity and AI compliance are no longer just operational risks. They are fiduciary liabilities. To survive the shift from speculative AI to hard regulatory enforcement, SMBs must abandon traditional, hands-off consulting. Instead, high-growth companies are adopting a "Forward Deployed" model, integrating engineering and cybersecurity leadership directly into their daily operations to build compliance into the code itself.</p><p>Here is why this shift is critical for your business and how you can implement it.</p><p><strong>The 2026 Regulatory Storm</strong></p><p>Two major deadlines are fundamentally reshaping the SMB landscape this year.</p><p>First, the SEC&#8217;s amended Regulation S-P reaches its mandatory compliance cutoff on June 3, 2026, for smaller entities. This is not a simple technical checklist. It is a strict mandate for active board supervision. Documentation like meeting minutes and records of tabletop exercises will now serve as primary evidence during regulatory inq&#8230;</p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/2026-smb-strategy-why-the-forward">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Unconventional Path: Peter Swimm's Pivot from Library Tech to Microsoft Product Owner]]></title><description><![CDATA[From Library to Microsoft to Toilville: Peter Swimm's Journey in Cybersecurity and AI Leadership]]></description><link>https://substack.cpf-coaching.com/p/navigating-the-cybersecurity-landscape-255</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/navigating-the-cybersecurity-landscape-255</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Thu, 26 Feb 2026 18:30:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tvbs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Breaking into the cybersecurity field is no small feat, but for Peter Swimm, it&#8217;s been a journey marked by discovery, adaptability, and continuous learning. In a recent episode of &#8220;Breaking into Cybersecurity,&#8221; Peter shared his unique career path and the lessons he&#8217;s learned along the way.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tvbs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tvbs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!tvbs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!tvbs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!tvbs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tvbs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/639700c5-16b6-4b55-83af-0146d087656d_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:984113,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/187299008?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tvbs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!tvbs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!tvbs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!tvbs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F639700c5-16b6-4b55-83af-0146d087656d_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/navigating-the-cybersecurity-landscape-255">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The 2026 SMB Strategic Pivot: Agentic AI, Binary Insurance, and Global Data Wars]]></title><description><![CDATA[In 2026, cyber risk has officially surpassed inflation as the #1 threat to SMB survival. This strategic guide explores how agentic AI, a hardening insurance market, and a fragmented global regulatory landscape are redefining corporate resilience for tech, legal, and privacy leaders.]]></description><link>https://substack.cpf-coaching.com/p/the-2026-smb-strategic-pivot-agentic</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-2026-smb-strategic-pivot-agentic</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Thu, 26 Feb 2026 17:44:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!po5p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Convergence of 2026: A Leadership Overview</h2><p>For SMBs, 2026 marks the end of the &#8220;digitization&#8221; era and the beginning of the &#8220;autonomy&#8221; mandate. The historical reliance on being &#8220;too small to target&#8221; has collapsed as cyberattacks officially surpass inflation and recessionary fears as the #1 threat to business survival.</p><p>We are currently navigating a convergence of three forces: the weaponization of <strong>Agentic AI</strong>, a <strong>Binary Insurance Market</strong> that demands &#8220;Proof of Defense,&#8221; and a <strong>Geopolitical Data War</strong> that has effectively eliminated the regulatory &#8220;right to cure&#8221; for non-compliance.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!po5p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!po5p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!po5p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!po5p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!po5p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!po5p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1619400,&quot;alt&quot;:&quot;A high-fidelity digital mesh representing a \&quot;trust stack\&quot; in deep obsidian and emerald green. In the background, a translucent globe highlights regulatory zones (EU, North America, APAC) with glowing data paths. A central, glowing shield icon symbolizes the transition to identity-centric, intelligent defense.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/189248755?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A high-fidelity digital mesh representing a &quot;trust stack&quot; in deep obsidian and emerald green. In the background, a translucent globe highlights regulatory zones (EU, North America, APAC) with glowing data paths. A central, glowing shield icon symbolizes the transition to identity-centric, intelligent defense." title="A high-fidelity digital mesh representing a &quot;trust stack&quot; in deep obsidian and emerald green. In the background, a translucent globe highlights regulatory zones (EU, North America, APAC) with glowing data paths. A central, glowing shield icon symbolizes the transition to identity-centric, intelligent defense." srcset="https://substackcdn.com/image/fetch/$s_!po5p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!po5p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!po5p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!po5p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e0a7a5-e507-470c-aa53-d71936ef9292_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Agentic AI Trust stack vs Legal</figcaption></figure></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/the-2026-smb-strategic-pivot-agentic">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Scaling the vCISO: How to Deliver "White-Glove" Security Without the Burnout]]></title><description><![CDATA[Discover the origin story of Zaun.ai and how founders Tyler Lalicker and Woo are revolutionizing SMB cybersecurity. Learn how AI-native autonomous SOAR captures business context to deliver bespoke, "white-glove" security at scale.]]></description><link>https://substack.cpf-coaching.com/p/beyond-the-checklist-why-context</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/beyond-the-checklist-why-context</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 20 Feb 2026 12:15:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SAId!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The shift from general security monitoring to true &#8220;Revenue Intelligence&#8221; and risk management requires more than just a SIEM and a dream. It requires a deep understanding of business context&#8212;something traditional Managed Detection and Response (MDR) has struggled to scale.</p><p>By leveraging the current &#8220;Technological Tailwind&#8221; of Large Language Models (LLMs), founders Tyler Lalicker and Woo are building <a href="https://zaun.ai/contact?ref=cpf">Zaun.ai </a>to provide the &#8220;white-glove&#8221; security that SMBs and niche MSSPs actually need.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SAId!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SAId!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 424w, https://substackcdn.com/image/fetch/$s_!SAId!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 848w, https://substackcdn.com/image/fetch/$s_!SAId!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 1272w, https://substackcdn.com/image/fetch/$s_!SAId!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SAId!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png" width="1456" height="769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:769,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1644921,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/188488460?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SAId!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 424w, https://substackcdn.com/image/fetch/$s_!SAId!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 848w, https://substackcdn.com/image/fetch/$s_!SAId!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 1272w, https://substackcdn.com/image/fetch/$s_!SAId!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5170e234-f9bf-44cb-90b6-b15eddf97dea_1534x810.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/beyond-the-checklist-why-context">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Charting the Path to Cybersecurity Success: Insights from Adeel Shaikh Muhammad]]></title><description><![CDATA[The Power of Specialization and Ethical AI in Shaping a Cybersecurity Career]]></description><link>https://substack.cpf-coaching.com/p/charting-the-path-to-cybersecurity</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/charting-the-path-to-cybersecurity</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Thu, 19 Feb 2026 18:53:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l5Am!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the latest episode of &#8220;Breaking into Cybersecurity,&#8221; we sat down with Adeel Shaikh Muhammad, a seasoned cybersecurity strategist with over 15 years of experience in the field. With an impressive array of certifications and a passion for education and innovation, Adeel shares his journey from the world of networking to becoming a cybersecurity expert and author.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l5Am!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l5Am!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!l5Am!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!l5Am!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!l5Am!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l5Am!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:817315,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/187296646?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l5Am!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!l5Am!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!l5Am!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!l5Am!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f78775a-c0df-47ff-9c5f-73da1983345a_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/charting-the-path-to-cybersecurity">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[AI Weaponization and Regulatory Fragmentation: The New Normal for SMB Tech Leaders]]></title><description><![CDATA[A strategic briefing for SMB tech and legal leaders on the top risks of early 2026: weaponized AI deepfakes, a fragmented regulatory patchwork, and supply chain vulnerabilities. Learn actionable steps to build resilience.]]></description><link>https://substack.cpf-coaching.com/p/top-cybersecurity-risks-for-smb-leaders</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/top-cybersecurity-risks-for-smb-leaders</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Wed, 18 Feb 2026 16:20:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hc7Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We are only a few weeks into 2026, and the narrative for small and medium-sized business (SMB) leaders is already clear: the era of &#8220;flying under the radar&#8221; is officially over. The threats are more sophisticated, the regulations are more complex, and your vulnerabilities are likely sitting outside your direct control.</p><p>For tech, legal, and cybersecurity leaders in the SMB space, the last week has highlighted a convergence of risks that demands immediate strategic attention. It is no longer sufficient to rely solely on a firewall and antivirus software. You need a holistic risk strategy that accounts for AI, your entire supply chain, and a rapidly shifting legal landscape.</p><p>Here are the top three trending topics you need to be concerned about and, more importantly, what you should be doing about them.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hc7Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:7929925,&quot;alt&quot;:&quot;As we settle into 2026, the convergence of AI-driven threats, complex supply chain risks, and a fragmented regulatory environment is creating a perfect storm for small and medium-sized businesses. Leadership must now move beyond basic security measures to strategic risk management.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/188385121?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="As we settle into 2026, the convergence of AI-driven threats, complex supply chain risks, and a fragmented regulatory environment is creating a perfect storm for small and medium-sized businesses. Leadership must now move beyond basic security measures to strategic risk management." title="As we settle into 2026, the convergence of AI-driven threats, complex supply chain risks, and a fragmented regulatory environment is creating a perfect storm for small and medium-sized businesses. Leadership must now move beyond basic security measures to strategic risk management." srcset="https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Hc7Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5efe344b-d5a0-4003-a2f2-f61cd62610e6_2816x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>SMB Risk Briefing: AI, Regulation, Supply Chain</strong></figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a f&#8230;</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/top-cybersecurity-risks-for-smb-leaders">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[2026 Operational Maturity: Navigating the Convergence of AI Law, Cyber Risk, and Cloud Economics]]></title><description><![CDATA[Strategic Insights into the Disney Settlement, the Colorado AI Act, and the End of the "Warning Era"]]></description><link>https://substack.cpf-coaching.com/p/the-2026-smb-leadership-briefing</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-2026-smb-leadership-briefing</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 13 Feb 2026 18:48:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QhxE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Executive Summary: The 2026 Inflection Point</h2><p>The second week of February 2026 serves as a definitive marker for the maturation of the SMB sector. We have officially moved past the era of &#8220;checking the box&#8221; and into a phase defined by <strong>Operational Maturity</strong>. In this environment, the most successful organizations are those that have unified their tech, legal, and cyber functions into a single &#8220;Resilience Strategy.&#8221;</p><p>The &#8220;K-shaped&#8221; trajectory of 2026 is clear: Leaders who view governance as a tool for investability and growth are scaling faster, while those who treat it as a technical burden are facing compounding liabilities, from record-breaking privacy fines to the financial volatility of unmanaged AI spend. This briefing analyzes the strategic mandates of February 9&#8211;13, 2026, and provides a roadmap for long-term organizational health.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QhxE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QhxE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 424w, https://substackcdn.com/image/fetch/$s_!QhxE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 848w, https://substackcdn.com/image/fetch/$s_!QhxE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 1272w, https://substackcdn.com/image/fetch/$s_!QhxE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QhxE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png" width="1024" height="679" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:679,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1109180,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/187864358?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e9ae2ab-9a95-4d1d-8add-3cdb73d9df93_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QhxE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 424w, https://substackcdn.com/image/fetch/$s_!QhxE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 848w, https://substackcdn.com/image/fetch/$s_!QhxE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 1272w, https://substackcdn.com/image/fetch/$s_!QhxE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb2177ad-d4bc-4454-b5ce-54c78ba72005_1024x679.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI Sovereignty is the battle of local control over intelligence assets</figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To re&#8230;</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/the-2026-smb-leadership-briefing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From History Teacher to Cybersecurity Director: John Murrow's Unique Career Journey]]></title><description><![CDATA[From History Teacher to Cybersecurity Director: John Murrow's Unique Career Journey]]></description><link>https://substack.cpf-coaching.com/p/from-history-teacher-to-cybersecurity-55b</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/from-history-teacher-to-cybersecurity-55b</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 13 Feb 2026 18:00:00 GMT</pubDate><enclosure url="https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/42350278/ca551cd323e2faff.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>From History Teacher to Cybersecurity Director: John Murrow's Unique Career Journey</p><p>In this episode of Breaking Into Cybersecurity, we explore the incredible journey of John Murrow, who transitioned from being a history teacher and college athletic coach to becoming the Director of Delivery at Elite Ops. John shares how his passion for technology was reignited despite early-career obstacles, the critical role of military service in his career transition, and how foundational skills in networking and people management were vital to his success.</p><p>Learn about the importance of continuous learning, the impact of family and networking, and the value of hands-on experience. Don't miss John's valuable advice for aspiring cybersecurity professionals!</p><p>00:00 Introduction to Breaking Into Cybersecurity</p><p>00:58 John Murrow's Early Career Path</p><p>02:04 Transitioning to Cybersecurity</p><p>02:52 Joining the Military for a Career Change</p><p>04:32 Starting at Elite Ops</p><p>04:50 The Importance of Communication Skills</p><p>06:04 Advic&#8230;</p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/from-history-teacher-to-cybersecurity-55b">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Cybersecurity Success Through Diverse Experiences: Jon Morrow's Story]]></title><description><![CDATA[A Testament to Resilience and the Power of Diverse Experiences]]></description><link>https://substack.cpf-coaching.com/p/navigating-the-cybersecurity-landscape-e1a</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/navigating-the-cybersecurity-landscape-e1a</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Thu, 12 Feb 2026 18:00:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lyaO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>In the ever-evolving field of cybersecurity, diverse pathways enrich the industry with varied experiences and innovative ideas. Jon Morrow&#8217;s unique journey into cybersecurity illustrates how flexibility, determination, and transferable skills can transform career trajectories. This post delves into Jon&#8217;s story, from contemplating career options during his teenage years to becoming a leader at Elite Ops.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lyaO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lyaO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lyaO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lyaO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lyaO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lyaO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:631468,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/187294598?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lyaO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lyaO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lyaO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lyaO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87946d10-77a8-4454-9aa1-c587b56832d2_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/navigating-the-cybersecurity-landscape-e1a">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[From National Security to Quantum Founder: Bridging the Cyber Gap]]></title><description><![CDATA[Shadya Maldonado on why critical thinking&#8212;not just a PhD&#8212;is the key to securing the next generation of technology.]]></description><link>https://substack.cpf-coaching.com/p/cybersecurity-and-quantum-computing</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/cybersecurity-and-quantum-computing</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 06 Feb 2026 18:30:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iQ4J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>In a field as dynamic and crucial as cybersecurity, Shadya Maldonado has forged an inspiring path, from military service to founding ArcQubit, a pioneering software company. With over 16 years of experience, Shadya&#8217;s journey is marked by her relentless curiosity and dedication to bridging the gaps in cybersecurity and technology modernization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iQ4J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iQ4J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!iQ4J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!iQ4J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!iQ4J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iQ4J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:637579,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/186845111?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iQ4J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!iQ4J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!iQ4J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!iQ4J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d013d19-855a-4772-8c1d-3c680538a165_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://substack.cpf-coaching.com/p/cybersecurity-and-quantum-computing">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Shadya Maldonado Pioneering Quantum Computing and Cybersecurity | Breaking into Cybersecurity]]></title><description><![CDATA[Breaking into Cybersecurity with Shadya Maldonado]]></description><link>https://substack.cpf-coaching.com/p/shadya-maldonado-pioneering-quantum-8ec</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/shadya-maldonado-pioneering-quantum-8ec</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Fri, 06 Feb 2026 18:00:00 GMT</pubDate><enclosure url="https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/42350278/ca551cd323e2faff.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Breaking into Cybersecurity with Shadya Maldonado</p><p>In this episode of Breaking into Cybersecurity, Shadya Maldonado, Founder and CEO of ArcQubit, shares her journey and extensive experience in the field. With 16 years in security operations, technology modernization, and risk management, Shadya discusses her transition from a military analyst to a leader in cybersecurity and AI. She highlights her work with organizations such as CISA, DARPA, DOE, and NASA, as well as her passion for developing tools to make quantum computing accessible. Shadya also offers valuable advice for individuals looking to grow their careers in cybersecurity.</p><p>00:00 Introduction and Guest Welcome</p><p>01:16 Shaday's Unconventional Path to Cybersecurity</p><p>01:48 From Military to Cybersecurity</p><p>02:50 Exposure to Data Science and Cybersecurity</p><p>03:43 Immersion in Cybersecurity and SANS Conference</p><p>04:45 Founding Arc Qubit and Quantum Computing</p><p>06:49 Developing Quantum-Ready Talent</p><p>14:02 The Importance of Cybersecurity Knowledge</p><p>21:06 S&#8230;</p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/shadya-maldonado-pioneering-quantum-8ec">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The 2026 SMB Strategic Risk Report: Navigating the Convergence of Autonomous Threats, Regulatory Fracture, and Supply Chain Weaponization]]></title><description><![CDATA[Executive Summary and The 2026 Strategic Landscape]]></description><link>https://substack.cpf-coaching.com/p/the-2026-smb-strategic-risk-report</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-2026-smb-strategic-risk-report</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Thu, 05 Feb 2026 17:15:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mQeL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce147e7e-9aa1-4e98-b35c-f14eb64208c1_929x758.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Executive Summary and The 2026 Strategic Landscape</strong></h2><p>At the start of 2026, the operational risk landscape for Small and Medium-sized Businesses (SMBs) has undergone a pivotal shift. Recent data shows that SMBs are now encountering over 5 million automated scans for vulnerabilities each week, making them a primary focus for a new class of threats. No longer the 'forgotten' sector of cybersecurity, these businesses have become the primary battleground for automated, highly scalable threats. Key crises include: - Weaponization of autonomous Artificial Intelligence (AI) agents - Compromise of fundamental IT infrastructure supply chains - Fracturing regulatory landscape placing business leaders in federal-state sovereignty conflict. This narrative reveals a convergence of these distinct but interlocking issues.</p><p>This report provides an exhaustive analysis of these developments. It is designed not merely as a news recap but as a strategic dossier for technology and risk leadership. We analyze th&#8230;</p>
      <p>
          <a href="https://substack.cpf-coaching.com/p/the-2026-smb-strategic-risk-report">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[5 Critical Security Alerts from Last Week: Copilot Bugs, Bluetooth Hacks, and New Privacy Laws]]></title><description><![CDATA[Don't let the new year catch you off guard. Here are the top risks from Jan 2026 affecting your tech stack right now.]]></description><link>https://substack.cpf-coaching.com/p/the-smb-leaders-guide-to-surviving</link><guid isPermaLink="false">https://substack.cpf-coaching.com/p/the-smb-leaders-guide-to-surviving</guid><dc:creator><![CDATA[Christophe Foulon 📓]]></dc:creator><pubDate>Sat, 31 Jan 2026 17:02:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5ess!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>The SMB Leader&#8217;s Guide to Surviving January 2026&#8217;s Cyber Shift: AI, Privacy, and Bluetooth Risks</strong></h1><h1><strong>Executive Summary</strong></h1><p><br>Security by obscurity is no longer a viable strategy for Small and Mid-sized Businesses (SMBs). As of the final week of January 2026, the technology landscape shifted fundamentally: the tools you rely on for productivity, Artificial Intelligence agents, and wireless hardware, have been weaponized, and the regulatory net has tightened around mid-market companies. To protect your organization this quarter, you must immediately pivot from &#8220;deploying&#8221; technology to &#8220;governing&#8221; it. This requires three specific actions: hardening your Microsoft 365 Copilot instances against new injection attacks, updating firmware on all corporate Bluetooth peripherals, and auditing your customer data against new, lower privacy thresholds in Rhode Island, Indiana, and Kentucky.  <a href="https://thehackernews.com/2026/01/researchers-reveal-reprompt-attack.html">1</a> <a href="https://www.malwarebytes.com/blog/news/2026/01/whisperpair-exposes-bluetooth-earbuds-and-headphones-to-tracking-and-eavesdropping">2</a> <a href="https://www.cozen.com/news-resources/publications/2025/three-states-will-ring-in-2026-with-new-privacy-laws">3</a></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5ess!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5ess!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 424w, https://substackcdn.com/image/fetch/$s_!5ess!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 848w, https://substackcdn.com/image/fetch/$s_!5ess!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 1272w, https://substackcdn.com/image/fetch/$s_!5ess!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5ess!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png" width="1456" height="1246" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1246,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2267217,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.cpf-coaching.com/i/186297873?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5ess!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 424w, https://substackcdn.com/image/fetch/$s_!5ess!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 848w, https://substackcdn.com/image/fetch/$s_!5ess!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 1272w, https://substackcdn.com/image/fetch/$s_!5ess!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755cfee4-5898-4a42-a232-f5bd8877c985_1512x1294.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://substack.cpf-coaching.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">SMB Tech &amp; Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>The Weaponization of Productivity: Why You Must Lock Down Copilot</strong><br></h2><p>The most critical threat to your data right now is not a shadowy hacker breaking through your firewall, but a malicious link tricking your trusted AI assistant. The &#8220;Reprompt&#8221; attack (CVE-2026-24307), disclosed in late January, transforms Microsoft 365 Copilot from a productivity booster into a data exfiltration tool. Unlike traditional attacks that require downloading malware, &#8220;Reprompt&#8221; requires only a single click on a legitimate-looking link. This injection exploits the AI&#8217;s architecture, forcing it to bypass its own safety guardrails and silently siphon sensitive emails, chats, and documents to an attacker&#8217;s server.  <a href="https://thehackernews.com/2026/01/researchers-reveal-reprompt-attack.html">4</a> <a href="https://www.varonis.com/blog/reprompt">5</a></p><blockquote><p><strong>Stop Shadow AI Before It Stops You.</strong> Your employees are already using AI. The question is: are they doing it securely? I recommend <strong>Airia AI</strong> to leaders who need to pivot from "blocking" AI to "governing" it. Airia provides the orchestration layer you need to securely prototype, deploy, and monitor AI agents across your enterprise. Don't let your data leave the perimeter without a passport. </p><p>&#128073; <strong>Secure Your AI Journey Here: </strong><a href="https://try.airia.com/CPF-coaching">https://try.airia.com/CPF-coaching</a></p></blockquote><p>For SMB leaders, this vulnerability changes the risk calculation for AI adoption. Copilot respects the &#8220;Identity Perimeter,&#8221; meaning it has access to everything the user can see. </p><div class="pullquote"><p>This makes identity your new perimeter. If you can't control credentials, you can't control Copilot. <strong><a href="https://1password.partnerlinks.io/mbc5t5ya4aps-gp0g2q">1Password</a></strong> is our standard for hardening this layer&#8212;enforcing strong, unique credentials and integrating 2FA directly into the workflow. <br><strong>Try 1Password at</strong> <a href="https://1password.partnerlinks.io/cpf-coaching">https://1password.partnerlinks.io/cpf-coaching</a></p></div><p>If a senior executive clicks a malicious link, the AI agent can be manipulated to search for and steal &#8220;confidential&#8221; or &#8220;financial&#8221; documents accessible to that executive. You must treat your AI configuration with the same rigor as your firewall. Immediate mitigation involves configuring Data Loss Prevention (DLP) policies within Microsoft Purview to block sensitive data egress from Copilot and enforcing Conditional Access to prevent usage on unmanaged personal devices.  <a href="https://www.varonis.com/blog/reprompt">6</a> <a href="https://wizardcyber.com/reprompt-attack-microsoft-copilot-ai-abuse/">7 </a></p><p></p><p><strong>The Hardware Crisis: Your Headphones Are Listening</strong><br>The &#8220;WhisperPair&#8221; vulnerability has shattered the assumption that local hardware connections are private. This flaw affects the Bluetooth &#8220;Fast Pair&#8221; protocol used by millions of devices, including standard enterprise equipment like Sony&#8217;s WH-1000XM5 headphones and Google&#8217;s Pixel Buds. Research reveals that this vulnerability allows attackers within physical range to hijack the connection without user confirmation. Once connected, they can eavesdrop on microphone audio, capturing sensitive board meetings or client calls, and track the user&#8217;s precise location.&nbsp;<a href="https://www.privacyguides.org/news/2026/01/16/bluetooth-exploit-leaves-hundreds-of-millions-of-accessories-vulnerable-to-full-takeover/">8</a>&nbsp;<a href="https://www.malwarebytes.com/blog/news/2026/01/whisperpair-exposes-bluetooth-earbuds-and-headphones-to-tracking-and-eavesdropping">9&nbsp;</a><a href="https://www.appliedtech.us/resource-hub/this-week-in-cybersecurity-jan23-2026/">10</a>&nbsp;<a href="https://www.hackster.io/news/researchers-warn-of-eavesdropping-vulnerabilities-in-popular-fast-pair-bluetooth-devices-e7725196ab95">11</a> </p><p>This introduces a physical security risk that most SMB IT policies overlook entirely. While you likely patch your laptops weekly, peripheral firmware is often overlooked. Leaders must mandate an immediate &#8220;firmware audit&#8221; for all employees using affected devices. Furthermore, in high-stakes environments, you should enforce a policy requiring wired headsets or disabling Bluetooth in high-density public spaces such as airports and train stations.  <a href="https://www.malwarebytes.com/blog/news/2026/01/whisperpair-exposes-bluetooth-earbuds-and-headphones-to-tracking-and-eavesdropping">12</a> <a href="https://www.pcmag.com/news/update-your-headphones-now-google-fast-pair-flaw-may-let-hackers-track">13</a></p><p></p><p><strong>The Regulatory Patchwork: Compliance Is Now Granular</strong><br>While you secure your tech stack, you must also navigate a fractured legal landscape. On January 1, 2026, comprehensive data privacy laws took effect in Indiana, Kentucky, and Rhode Island. For SMBs, the Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA) poses a specific, hidden danger. Unlike other states that set high applicability thresholds (typically 100,000 consumers), Rhode Island&#8217;s law applies to businesses processing the data of as few as 35,000 residents.  <a href="https://www.cozen.com/news-resources/publications/2025/three-states-will-ring-in-2026-with-new-privacy-laws">14</a> <a href="https://www.koleyjessen.com/insights/publications/new-state-privacy-laws-effective-january-1-2026-indiana-kentucky-and-rhode-island">15</a> <a href="https://www.privacyanddatasecurityinsight.com/2026/01/rhode-islands-new-privacy-law-an-overview-and-highlighted-differences/">16</a> <a href="https://www.bytebacklaw.com/2024/06/rhode-island-legislature-passes-consumer-data-privacy-act/">17</a> </p><p>This lower threshold means many mid-sized SaaS providers and e-commerce companies are now unknowingly out of compliance. If you have a customer base in the Northeast, you may now be legally required to disclose the specific names of third parties to whom you sell data, a stricter requirement than in almost any other jurisdiction. Simultaneously, compliance in Indiana and Kentucky requires you to conduct Data Protection Impact Assessments (DPIAs) for high-risk processing. You should immediately review your customer distribution to determine if these new laws apply to you.  <a href="https://www.privacyanddatasecurityinsight.com/2026/01/rhode-islands-new-privacy-law-an-overview-and-highlighted-differences/">18</a> <a href="https://www.cozen.com/news-resources/publications/2025/three-states-will-ring-in-2026-with-new-privacy-laws">19</a> <a href="https://www.koleyjessen.com/insights/publications/new-state-privacy-laws-effective-january-1-2026-indiana-kentucky-and-rhode-island">20</a> <a href="https://www.lplegal.com/content/new-consumer-data-privacy-laws-and-rules-for-2026/">21</a> </p><p></p><p><strong>Conclusion: Operationalizing Resilience</strong><br>The threats of January 2026 share a common theme: they exploit the trust we place in our tools and the complexity of our supply chains. Whether it is a social engineering attack like the recent Betterment breach or a technical exploit like Reprompt, the defense requires active leadership. You cannot simply buy a tool to solve these problems. You must verify your AI settings, manage your hardware assets, and understand your regulatory footprint. The cost of inaction, measured in data loss and regulatory fines, is far higher than the cost of governance.&nbsp;<a href="https://www.betterment.com/customer-update">22</a>&nbsp;<a href="https://www.securityweek.com/robo-advisor-betterment-discloses-data-breach/">23</a></p><p></p><p>P.S. Tool of the Week Shout out to <strong>Sane Box</strong></p><p><strong>A Cluttered Inbox is a Security Risk.</strong> When you are drowning in email, you are more likely to make mistakes&#8212;like clicking that one malicious link hidden in the noise. <strong>SaneBox</strong> uses AI to filter out the distractions, leaving you with only what matters. It&#8217;s not just a productivity tool; it&#8217;s a way to reduce your cognitive attack surface. &#128073; <strong>Clean Up Your Inbox: </strong><a href="https://try.sanebox.com/cpfcoaching">https://try.sanebox.com/cpfcoaching</a></p><p></p>]]></content:encoded></item></channel></rss>