Chris Foulon's Avatar

Chris Foulon

@cpfcoaching.bsky.social

Accepting vCISO Clients for 2025 | Helping SMBs Grow by Enabling Business-Driven Cybersecurity | Fractional vCISO & Cyber Advisory Services | Empowering Secure Growth Through Risk Management Https://www.cpf-coaching.com

41 Followers  |  28 Following  |  698 Posts  |  Joined: 17.11.2024  |  1.6203

Latest posts by cpfcoaching.bsky.social on Bluesky

Register | Airia

I took the demo and deployed my own models to check out the security, governance, and billing features that make tracking your AI projects much less complicated, down to transaction visibility.

Check it out for yourself
try.airia.com/CPF-coaching

25.10.2025 18:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

That's when I found Airia’s Enterprise AI Orchestration Platform, a neutral platform that supports any cloud, offering security, compliance, and governance for your AI journey.

25.10.2025 18:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Since everyone has been experimenting with building agents and agentic flows, I've been wondering how we can establish governance and safeguards around them, while still making it simple for the business to develop and for security to maintain visibility and oversight.

25.10.2025 18:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Breaking into Cybersecurity: An In-Depth Conversation with Eric Stride πŸš€ Excited to share the latest episode of "Breaking into Cybersecurity" featuring Eric Stride from Huntress! πŸŽ™οΈ Join us as Eric dives into his fascinating journey from the Air Force to becoming a cyber...

Eric emphasizes the importance of continuous learning in cybersecurity. With technologies and threats constantly evolving, professionals must stay informed about the latest tradecraft and techniques.

open.substack.com/pub/cpfcoach...

18.10.2025 20:20 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Eric’s journey into cybersecurity is not only inspiring but also enlightening for anyone looking to enter this ever-evolving field. With over two decades of experience in the military and private sectors, Eric shares his insights on career development, leadership, and the future of cybersecurity.

17.10.2025 23:08 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

In the latest episode of β€œBreaking into Cybersecurity,” host Chris Foulon sits down with Eric Stride, the Chief Security Officer at Huntress.
open.substack.com/pub/cpfcoach...

17.10.2025 23:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
A Leader’s Guide to Quantum Computing Unlock the strategic implications of Quantum Computing. This executive guide demystifies qubits, superposition, and entanglement, revealing the immense opportunities for business innovation and the ur...

This article provides a clear explanation of:
πŸ’‘ The power of qubits and superposition.
πŸ’‘ Its Importance for your business strategy & security.
πŸ’‘ A simple, jargon-free understanding.

Gain the knowledge to join informed discussions without a physics degree.

open.substack.com/pub/cpfcoach...

08.10.2025 16:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
A Leader’s Guide to Quantum Computing Unlock the strategic implications of Quantum Computing. This executive guide demystifies qubits, superposition, and entanglement, revealing the immense opportunities for business innovation and the ur...

What Is Quantum Computing, Really? A Plain-English Explanation for Tech Leaders Without the Hype.

Feeling overwhelmed by quantum computing jargon? You're not alone. It's a game-changer, but often shrouded in complexity.

08.10.2025 16:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Admissions for Hacker University 2025 are open – Apply Now!

We have a Special offer for 25% off use code HackerU2025

www.bsidesnova.org

We will host career-focused and technical talks, including sessions on AI.
#HiringManagers, #recruiters, and #SubjectMatterExperts will be available for speed mentoring, interviews, and resume reviews.
#Cybersecurity

07.10.2025 12:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

If you are in the DMV (DC/Maryland/Virginia), why not come join me at Security BSides Northern Virginia on October 11, 2025? I will be hosting a career-focused panel called "Voices from the Field."

This year's theme is Hacker U, where curiosity becomes capability.

#cybersecurity #career #hiring

07.10.2025 12:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

We are excited to invite you to engaging workshop sessions on October 10, 2025! The main event on the 11th will feature inspiring talks, insightful panels, and valuable networking opportunities with fellow professionals and industry leaders. Don't miss it! #Workshop2025 #Networking #IndustryLeaders

28.09.2025 23:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
2025 SPONSORS |

Shout out to all the Sponsors for the upcoming BsidesNOVA Security Conference www.bsidesnova.org/2025-sponsors/

28.09.2025 23:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Beyond the Checklist: A Strategic Framework for Assessing and Maturing Your Security Posture Master cybersecurity maturity. Explore our multi-layered security assessment covering NIST CSF, CIS Controls, Zero Trust, IAM, vulnerability management, and SSRM. Get your custom System Security Plan ...

In the contemporary business environment organizations are relentlessly pushed to innovate, adopt cloud technologies, leverage data analytics, and create seamless digital experiences for their customers.

open.substack.com/pub/cpfcoach...

22.09.2025 12:51 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Scalable Security Playbook: A CISO & CIO Partnership Guide Discover how to test, refine, and replicate a standardized set of security controls for a resilient, enterprise-wide defense.

How your CIO and CISO should collaborate to develop a scalable security playbook for your organization. They don't need to operate in separate silos or be at odds with each other.

open.substack.com/pub/cpfcoach...

20.09.2025 01:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Beyond the Bank Account: Phishing as a Tool for Espionage Why Impersonation is a Powerful Tool for State-Sponsored Espionage

Phishing and impersonation are often linked to scams that target bank accounts and credit cards. However, these tactics also serve a more sinister purpose in geopolitics, as they are increasingly used for espionage and manipulation to gain an advantage.
open.substack.com/pub/cpfcoach...

12.09.2025 19:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Join us live today at 1 PM EST for the full episode!

12.09.2025 11:50 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Breaking into Cybersecurity - Motti Tal
YouTube video by Breaking Into Cybersecurity Breaking into Cybersecurity - Motti Tal

In this episode of 'Breaking Into Cybersecurity,' Motti Tal from Tel Aviv shares his journey from his father's work with mainframes to software development in the Israeli Navy. He highlights the importance of hands-on experience, mentorship, and ethics for a successful career.
youtu.be/JFcPaDP0tq0

12.09.2025 11:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
CISO Desk Reference Guide Executive Primer: The Executive’s Guide to Security Programs: Bonney, Bill, Hayslip, Gary, Stamper, Matt: 9781955976060: Amazon.com: Books CISO Desk Reference Guide Executive Primer: The Executive’s Guide to Security Programs [Bonney, Bill, Hayslip, Gary, Stamper, Matt] on Amazon.com. *FREE* shipping on qualifying offers. CISO Desk Refer...

CISO Desk Reference Guide Executive Primer a.co/d/5s89AmE

04.09.2025 11:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Next on my recommendations for resources for tech and cyber executives:

CISO Desk Reference Guide Executive Primer: The Executive’s Guide to Security Programs

03.09.2025 22:44 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
How to Build a Security Culture with Data-Driven Reporting Foster a true security-first culture by mastering effective cloud security reporting. Learn to translate technical risk into business impact for leadership and technical teams using tools like Microso...

How to Build a Security Culture with Data-Driven Reporting.

Anything else that you would add?

open.substack.com/pub/cpfcoach...

02.09.2025 00:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

In this episode, learn about navigating technological risks, the evolving landscape of AI, and how to prepare for the next wave of innovation. A must-listen for anyone in the tech field! 🎧 #Cybersecurity #Innovation #AILeadership #TechTrends

29.08.2025 12:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Breaking Into Cybersecurity with William (Bill) Welser IV: Tips, Challenges, and the Future
YouTube video by Breaking Into Cybersecurity Breaking Into Cybersecurity with William (Bill) Welser IV: Tips, Challenges, and the Future

Join us for an eye-opening conversation with William (Bill) Welser IV, a trailblazer in cybersecurity and AI. As the CEO/CTO & Cofounder of Lotic.ai, Inc., Bill explores the intersection of behavioral science and advanced technology.

youtu.be/pGUSP4_aSqU

29.08.2025 12:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Vulnerability Management Metrics: 15 KPIs to Measure & Mature Your Program Measure, Monitor, and Mature Your Program with Actionable Metrics: Use data-driven KPIs to track progress, demonstrate value, and guide continuous improvement.

"You can't improve what you don't measure." This holds especially true for vulnerability management. πŸ€” Our new blog post explores actionable metrics and KPIs to help you track progress, identify bottlenecks, and drive continuous improvement in your security posture
open.substack.com/pub/cpfcoach...

26.08.2025 01:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AI can crack your passwords. Here’s how Keeper can help. Learn what AI is, what password cracking is, how cybercriminals are using AI to crack passwords and how Keeper can keep you safe from AI password cracking.

Check out this blog from Keeper Security, Inc. on How AI can crack passwords and why passwords managers can be helpful in generating strong credentials and keeping them safe

keepersecurity.partnerlinks.io/t3wa0yv9h7es...

25.08.2025 00:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

He has since founded numerous innovative cybersecurity companies, making this episode a must-listen for anyone interested in the field!

23.08.2025 20:03 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Breaking into Cybersecurity: Sinan Eren's Inspiring Journey from Red Teaming to Startup Success
YouTube video by Breaking Into Cybersecurity Breaking into Cybersecurity: Sinan Eren's Inspiring Journey from Red Teaming to Startup Success

Be sure to catch the latest episode of "Breaking into Cybersecurity," featuring the inspiring Sinan Eren! With decades of experience, Sinan shares his remarkable journey, starting in the late '90s as a red teamer and penetration tester.
youtu.be/ateZK68voD0

23.08.2025 20:03 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Highlight Reel of Breaking into Cybersecurity - Sinan Eren
YouTube video by Breaking Into Cybersecurity Highlight Reel of Breaking into Cybersecurity - Sinan Eren

Highlight Reel of Breaking into Cybersecurity - Sinan Eren
youtu.be/lt2TJGlUpbM

23.08.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Breaking into Cybersecurity - Sinan Eren
YouTube video by Breaking Into Cybersecurity Breaking into Cybersecurity - Sinan Eren

Breaking into Cybersecurity - Sinan Eren

Sinan Eren is a pioneering figure in cybersecurity. He began as a hacker in the late 90s and has since become a leader in red teaming and penetration testing, while also making strides as an entrepreneur.

youtu.be/JjbLl0cgQmY

23.08.2025 01:15 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Thank you

21.08.2025 01:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack Unmasking the "low and slow" identity attacks where threat actors lie in wait within your cloud accounts, and how to fight back before they strike.

Is there a ghost in your cloud? πŸ‘» Traditional security looks for a smash-and-grab, but modern attackers are playing the long game. They get in, stay quiet, and strike later. #Cybersecurity #CloudSecurity #SocialEngineering #InfoSec

open.substack.com/pub/cpfcoach...

20.08.2025 22:45 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1

@cpfcoaching is following 18 prominent accounts