ORDER Digital Guardians: Stories from the Front Lines of Cybersecurity and meet the zookeeper who spots insider threats like a tiger watching its territory. The meteorologist who forecasts digital risks like incoming storms. The airplane inspector who secures the digital supply chain with the same precision as a pre-flight checklist. And the ballet master who treats compliance like choreography, where every step matters.
Cybersecurity isn’t just about code, firewalls, or encryption. It’s about people. It’s about decisions—who makes them, who controls them, and how they shape our world.
This book takes you beyond technical jargon and into the practical application of cybersecurity principles. Through engaging, memorable stories, you’ll see how security concepts appear in everyday life, from protecting businesses and securing networks to safeguarding personal information.
Whether you're an IT professional refining your skills, a student preparing for Security+, CEH, CGRC, or any other cybersecurity certification, or someone curious about the field, this book makes complex topics easy to grasp and apply. Risk management, encryption, insider threats, and digital resilience aren’t just theories—they’re part of the stories that bring cybersecurity to life.
Understanding cybersecurity changes the way you see technology and the choices you make.
Start your journey today through the power of storytelling.
Generative AI, like ChatGPT, is a powerful tool—but it’s NOT a creator. It’s a maker. While it can take existing information and offer new perspectives or ways to use it, it cannot replace your creativity, ideas, or originality. AI is here to support the creative process, not take it over.
To address this dynamic, I developed the CRAFTED Framework (Creator-Retained Authentic Framework for Technology-Enhanced Design)—an original process that helps writers and artists like me answer a critical question:
How can I maintain my creativity, integrity, and authenticity while leveraging generative AI?
This framework emerged from my personal need to ensure that my readers consistently hear my voice in my writing, even when I use tools like ChatGPT or Claude.ai. Writing is not just a task for me; it’s an act of creativity and expression, one that I deeply enjoy. For this reason, when I write, AI is a tool—an editor, proofreader, or thoughtful collaborator—but never a replacement for my ideas or unique voice.
Here’s how the CRAFTED Framework works:
Create: This "brain dump" stage respects my raw creativity and unique voice—just as a human editor would wait to see my original ideas before suggesting improvements.
Refine: Here, AI functions like a human editor or research assistant, working to clarify ideas, enhance readability, or suggest improvements—all while keeping my voice intact.
Analyze: Similar to a second opinion from a trusted reader, AI helps me dissect and explore my ideas for angles or blind spots I may have missed.
Focus: Here, AI, guided by my input, ensures suggestions align with my intent.
Test: AI here becomes a fact-checker or validation partner—cross-checking ideas, logic, or style, but I remain in full control of the final decisions.
Evolve: Like working with a trusted human collaborator over time, AI can help track patterns, tools, and strategies that work best for me.
Develop: This process ensures that AI remains supportive—like a skilled editor or advisor—without encroaching on my creativity or ownership.
I am contracted by Creatives on Call, to write interactive cybersecurity content the Cybersecurity Career Path on Salesforce's Trailhead learning platform. I leverage eclectic and practical experiences and insights to support the Trailhead team in creating blog posts and educational modules that make complex cybersecurity topics accessible, engaging, and relevant for Salesforce's employees, partners and a broad global audience.
I executed and recorded this password-cracking activity to INCREASE MY AWARENESS of what's possible when UNAUTHORIZED Individuals attempt to assume control of my network.
My Medium Blog is a space where I share my unique perspectives and thought-provoking ideas on cybersecurity. Here, I explore unconventional approaches, challenge industry norms, and offer practical insights that inspire readers to think differently about cyberspace, and cybersecurity i Below are some of the articles I’ve written, each reflecting my passion for reimagining cybersecurity:
Simplifying the Sh*t Out of Subnetting (From Someone Who Hates Math)
Demystifying Security Controls
The Earth is Flat & Other Interesting Ideas Cyberprofessionals Should Consider
Unmasking Cyberspace – The Grand Illusion We’ve All Agreed To
The Operation Was a Success But the Patient Died: How Progress Holds Us Back
Learn to Code by Blowing a Sheepdog Whistle
Infographic: Incident Response for Your Mom
The Direct Path to Cybersecurity Experience
An Enlightened Look at Cybersecurity
Security in the Black is my podcast and where I dare to go beyond conventional cybersecurity narratives. I explore what it truly means to be secure in a digital world, challenging the traditional focus on defense and fear. From dissecting the ethics of hacking to confronting biases in technology, you'll hear me bravely dive into the real-world implications of cybersecurity on our freedom to live, work, and connect safely.
Each episode provides fresh insights and inspired discussion aimed at redefining how we think about security—not just as protection from threats but as the freedom to thrive in a connected world.
In this section, I present some of my unique and often unconventional ideas about the current and future state of cybersecurity. These perspectives challenge traditional thinking and aim to spark conversations that push the boundaries of what we believe is possible in the digital world. Feel free to explore new ways of thinking about freedom, human rights, cybersecurity, innovation, and our digital lives.
I was super excited to present to the Nigeria Association of Computing, where I shared some new cybersecurity ideas and best practices for international organizations.
I talked about how global companies can keep up with changing threats by considering different viewpoints and using cultural understanding in their security plans. It was a great opportunity to exchange ideas and emphasize the importance of creative thinking and teamwork to keep our connected world safe.
This original Threat Opportunity Matrix is a work in progress. I created it because, where we typically ONLY give attention to cybersecurity threats and negative risks, this project provides a structured framework for navigating both cybersecurity risks and opportunities. It maps out the conditions necessary for unplanned changes that can impact organizations and the potential change agents—whether human or non-human—that can act on these conditions.
By applying this matrix, I’ve developed strategies that go beyond traditional risk management. For instance, this matrix outlines five proactive risk responses: Amplify, Diffuse, Exploit, Prevent, and Innovate, each targeting different elements to disrupt potential threats or leverage opportunities. This approach not only mitigates risks but also actively seeks to create value by turning challenges into opportunities for innovation and growth.
The goal is to encourage a shift from merely avoiding or transferring risks to creatively exploiting opportunities that align with an organization's strengths, ultimately fostering a more resilient and adaptive security posture. Since I created this the MITRE Engage Framework has been released so my next update will complete the model and add content from this defense framework.
In this video, I’m redefining the cybersecurity lexicon, moving beyond traditional definitions and offering a radical shift in perspective. This is an invitation to rethink the language and concepts that shape our approach to cybersecurity.
Join me as I explore questions like “What is vulnerability for?” We’ll discuss the current state of cybersecurity according to the DoD, the idea of cyberspace as the 5th domain of war, and what’s truly helping us win this so called "war".
I’ll also challenge our current FRAME of cybersecurity and how design thinking applies to vulnerability. We’ll cover the evolved security problem, debate whether security is even necessary, and consider how vulnerability itself can be a powerful security control.
If you’re ready to question the status quo and embrace a new way of thinking about cybersecurity, this video is for you.
At the BIC Winter Conference, I explored the concept of mental models and their impact on cybersecurity. I delved into how our perceptions shape our responses to cyber threats and the importance of challenging conventional thinking. The talk emphasized the need to rethink our approaches to cybersecurity by understanding the underlying cognitive frameworks that guide our actions and decisions.
In this 15 minute "Lightening Talk" I urge listeners to consider cybersecurity as a dynamic and adaptive process that evolves alongside technology and human behavior, and to envision a future where cybersecurity enables freedom and innovation.
I regularly contribute to online magazines where I share my insights and thought leadership on various cybersecurity topics, bringing fresh perspectives to the field. I love writing so I really enjoy contributing.
I’m also frequently invited to participate in interviews and panel discussions, where I delve into the complexities of cybersecurity and explore the human factors that influence our digital safety.
These opportunities allow me to engage with a diverse audience, sparking meaningful conversations and encouraging a deeper understanding of the issues that shape our cyber landscape.
In this request to share my story of changing careers from Human Resources to Cybersecurity, I share all the fears, failures and fortunate encounters that brought me to my space in cybersecurity.
A refreshing and enlightening look at how we teach, learn and practice cybersecurity. It's a great resource for instructors looking to evolve their teaching methods and for learners who want better ways to re-discover, understand, and use their powerful learning abilities.
The book is all about releasing everyone to understand security in our digital world in a more profound way. Coming Summer or Fall 2025!!!