<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Hipster CISO’s Substack]]></title><description><![CDATA[How CISOs Reclaim Authority Through Data, Design, and Discipline.]]></description><link>https://www.thehipsterciso.com</link><image><url>https://substackcdn.com/image/fetch/$s_!afbO!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F774c8a31-0421-421e-979a-63fc5942e994_278x278.png</url><title>The Hipster CISO’s Substack</title><link>https://www.thehipsterciso.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 09 May 2026 05:27:24 GMT</lastBuildDate><atom:link href="https://www.thehipsterciso.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Hipster CISO]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thehipsterciso@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thehipsterciso@substack.com]]></itunes:email><itunes:name><![CDATA[Thomas Jones]]></itunes:name></itunes:owner><itunes:author><![CDATA[Thomas Jones]]></itunes:author><googleplay:owner><![CDATA[thehipsterciso@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thehipsterciso@substack.com]]></googleplay:email><googleplay:author><![CDATA[Thomas Jones]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[What Happens When Your Board Asks Who Authorized That Agent?]]></title><description><![CDATA[78% of organizations have no answer. Yours might be one of them.]]></description><link>https://www.thehipsterciso.com/p/what-happens-when-your-board-asks</link><guid isPermaLink="false">https://www.thehipsterciso.com/p/what-happens-when-your-board-asks</guid><dc:creator><![CDATA[Thomas Jones]]></dc:creator><pubDate>Tue, 24 Mar 2026 16:15:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gp0s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The teams furthest ahead on agentic AI security right now are not the ones with the most sophisticated models or the largest security budgets &#8212; they are the ones that treated agent governance as an architecture decision made before deployment, not a cleanup project started after the first incident.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gp0s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gp0s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 424w, https://substackcdn.com/image/fetch/$s_!Gp0s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 848w, https://substackcdn.com/image/fetch/$s_!Gp0s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 1272w, https://substackcdn.com/image/fetch/$s_!Gp0s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gp0s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic" width="1456" height="582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:30381,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/191993519?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gp0s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 424w, https://substackcdn.com/image/fetch/$s_!Gp0s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 848w, https://substackcdn.com/image/fetch/$s_!Gp0s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 1272w, https://substackcdn.com/image/fetch/$s_!Gp0s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d8eb7ac-ddf8-460a-9e78-f744eed84edf_1500x600.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What that looks like in practice is a specific question asked before any agent goes into production: when this agent acts outside its intended scope, how will we know, and what stops it? Most teams cannot answer that question for the agents already running in their environment, not because they are careless but because <strong>the deployment happened under pressure and the governance conversation happened AFTER, if it happened at all.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!clCJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!clCJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!clCJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!clCJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!clCJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!clCJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:35435,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/191993519?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!clCJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!clCJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!clCJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!clCJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12abb035-fb41-4fed-a9c3-9b8e51ff6f39_1080x1080.heic 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>The Gravitee State of AI Agent Security report, published in February 2026 and drawing on 919 executives and practitioners, found that only 21.9% of organizations treat AI agents as independent, identity-bearing entities within their security model.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> The agents in the other 78.1% are authenticated through shared API keys and generic service accounts &#8212; persistent, unmonitored access pathways running continuously across production systems. The same research found that 88% of organizations had confirmed or suspected an AI agent security incident in the prior year.</p></blockquote><p>When something goes wrong in that environment, the question the board asks is not whether the model was safe. The question is <strong>who authorized the agent</strong>, <strong>what did it have access to</strong>, <strong>what did it actually do</strong>, and <strong>where is the audit trail</strong> &#8212; and those are very difficult questions to answer when the governance architecture was never built.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wfR1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wfR1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!wfR1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!wfR1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!wfR1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wfR1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32943,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/191993519?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wfR1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 424w, https://substackcdn.com/image/fetch/$s_!wfR1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 848w, https://substackcdn.com/image/fetch/$s_!wfR1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 1272w, https://substackcdn.com/image/fetch/$s_!wfR1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4535afcc-998d-451a-9c06-843aa0a98a40_1080x1080.heic 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The agents are in production. Whether your organization can answer those four questions right now is worth knowing before you need to.</em></p><div><hr></div><p>UPDATE 1: What I am now thinking as I write this though, is more questions I haven&#8217;t seen most formally work through yet. </p><ul><li><p><em>If you were to actually threat model this problem &#8212; not conceptually, but rigorously, the way a serious security architecture exercise gets done &#8212; what portions of the enterprise are genuinely at risk?</em> </p></li><li><p><em>Which business processes are now touching agent access pathways they didn&#8217;t have six months ago? </em></p></li><li><p><em>What does the revenue-at-risk calculation look like when you map agent permissions against your most critical systems? </em></p></li><li><p><em>And what does the tail look like &#8212; not the median incident, but the scenario where an unmonitored agent with shared credentials and no audit trail gets manipulated in exactly the wrong way at exactly the wrong time?</em></p></li></ul><p>I honestly don&#8217;t think most organizations have run that exercise. I&#8217;m not sure most understand they have the instrumentation to run it today &#8212; the <a href="https://github.com/thehipsterciso/hc-enterprise-kg">rapid knowledge graph module</a> built by your&#8217;s truly. But the gap between &#8220;<em>we have agents in production</em>&#8221; and &#8220;<em>we understand our exposure</em>&#8221; is where the next significant incidents are going to come from &#8212; and the organizations that close it proactively are going to look very different from the ones that close it reactively.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Gravitee, <em>State of AI Agent Security 2026</em>, February 2026 &#8212; <a href="http://gravitee.io/state-of-ai-agent-security">gravitee.io/state-of-ai-agent-security</a></p></div></div>]]></content:encoded></item><item><title><![CDATA[The First Test in Carnegie Mellon's Data & AI Executive Program]]></title><description><![CDATA[...And Why 73% of AI Initiatives Fail Before Models Ever Run]]></description><link>https://www.thehipsterciso.com/p/the-first-test-in-carnegie-mellons</link><guid isPermaLink="false">https://www.thehipsterciso.com/p/the-first-test-in-carnegie-mellons</guid><dc:creator><![CDATA[Thomas Jones]]></dc:creator><pubDate>Thu, 12 Feb 2026 21:35:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_Van!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p><em>TJ: If you are confronting epistemic governance problems in your organization where different people trust different versions of truth based on whose political interests the data supports, I would be genuinely interested in hearing what patterns you are seeing.</em></p></div><p>I am six weeks into <a href="https://www.heinz.cmu.edu/programs/executive-education/chief-data-ai-officer-certificate">Carnegie Mellon&#8217;s Chief Data &amp; AI Officer</a> executive program, and my team just received our first deliverable assignment&#8212;a fifteen-page project plan documenting company research, industry analysis, stakeholder mapping, and our approach to developing an enterprise data and AI strategy roadmap for the organization we selected.</p><p>The program is explicitly demanding rigor, which is appropriate given what these foundational assessments are meant to support. What I have learned across twenty years as a security leader, though, is that rigor requires more than thorough research execution&#8212;it requires <strong>constitutional governance</strong> over how truth gets established, how that truth gets tested adversarially, and how uncertainty gets preserved through synthesis instead of being systematically laundered into false confidence.</p><p>I have watched the same pattern destroy value mechanically in every organization I have worked with over the years. Let&#8217;s consider a few instances:</p><ul><li><p>Your analysts discover through careful financial mapping that the largest customer segment generates genuinely negative unit economics. The CFO explains it fluently as strategic investment in market share that will deliver profitability at scale, and your analysis documents this as <em>growth opportunity with margin expansion potential</em>.</p></li><li><p>The same team identifies that sixty percent of revenue sits behind customer agreements containing change-of-control provisions. Business development assures everyone these clauses rarely trigger in practice, and your assessment codes this as <em>customer concentration risk, manageable</em>.</p></li><li><p>Technical diligence reveals the core platform requires fifty million dollars and eighteen months to migrate off the current hyperscaler. The CTO positions this as cloud-native architectural sophistication, and your deliverable describes it as <em>strong technical foundation</em>.</p></li></ul><p>Structural fragility somehow became strategic positioning. <em>Nobody fabricated data, but the analytical framework did exactly what it was designed to do: </em>systematically remove uncertainty until observable constraints transformed into narrative elements supporting whatever direction leadership was already inclined to pursue.</p><blockquote><p>The ever-present pattern where findings get shaped to support whatever narrative leadership already committed to, instead of letting the evidence determine which strategic options actually survive contact with reality.</p></blockquote><p><em>This happens mechanically rather than through individual analytical failure. </em><strong>The problem is architectural.</strong></p><h3><strong>When Feedback Loops Are Brutal and Compressed</strong></h3><p>My background and career track has forced me to develop different instincts because cybersecurity creates feedback loops that are both brutal and compressed. <em>(TJ: My cardiologist and wife can both attest to this to no end.)</em> When your threat model fundamentally mischaracterizes risk or your controls prove ineffective, breaches happen on timelines you do not control, production stops, and regulators arrive with enforcement authority that does not care about your explanations. You develop discipline around uncomfortable truths because the alternative is professional extinction.</p><p>I am expanding breadth and influence now through data and AI strategy frameworks where feedback loops stretch across quarters or years instead of weeks. Bad security architecture surfaces in breach reports that create immediate forcing functions for accountability. Bad epistemic governance in foundational strategic assessments hides inside multi-year transformation programs where it compounds through every subsequent decision until the accumulated analytical errors become visible as destroyed enterprise value that nobody can trace back to the initial assessment work that set everything on the wrong trajectory.</p><p>Think about what happens when you build data strategy recommendations on stakeholder interviews where different executives trust different data sources selectively based on which reports support their existing positions, and your framework provides no mechanism for resolving those conflicts beyond documenting that perspectives vary. The technical work proceeds exactly as planned, but your entire strategic foundation rests on politically contested epistemological ground that will collapse the moment implementation requires someone to definitively lose an argument about whose version of reality governs investment decisions.</p><h3><strong>Six Controls That Make the Work Harder On Purpose</strong></h3><p>Before we touched company research or begins competitive analysis, i proposed to build a Stage 0&#8212;a constitutional layer that locks in before our substantive work began. Six controls that make our work measurably harder, because difficulty is how you know constitutional governance is actually functioning. These six controls are laid out directly below:</p><div><hr></div><p><strong>0.1 Strategic intent lock</strong> declares what our analysis is permitted to conclude and what it is forbidden to do. Company assessment only&#8212;no strategy recommendations embedded in findings, no transformation roadmaps implied through selective emphasis. If readers could interpret our findings as containing implicit recommendations, the lock failed. </p><pre><code>ROLE:
You are acting as the Diligence Director (authoritative).

MISSION (NON-NEGOTIABLE):
Define what this diligence is allowed to decide &#8212; and what it is explicitly forbidden to do.
This exists to prevent strategy creep, solution bias, and retrofitted conclusions.

ANALYTICAL BURDEN:
You MUST:
&#8226; Declare the exact decision classes this diligence supports
&#8226; Explicitly prohibit strategy design, roadmaps, and recommendations
&#8226; Lock the lens to discovery, not prescription
&#8226; Define the consumer(s) of truth (e.g., IC, board, CDAIO, acquirer)

MANDATORY ADVERSARIAL TESTS:
You MUST explicitly answer:
&#8226; What would constitute misuse of these outputs?
&#8226; What decisions should NOT be made from this work?
&#8226; What incentives exist to overstep these boundaries?
&#8226; Who benefits if these boundaries blur?</code></pre><div><hr></div><p><strong>0.2 Evidence hierarchy</strong> defines what constitutes legitimate evidence and how we resolve conflicts. SEC filings outrank earnings calls because filings carry legal liability. Audited financials outrank investor presentations because one has independent verification. Every material assertion traces to source documents through transparent lineage.</p><pre><code>ROLE:
You are acting as the Evidence &amp; Methodology Authority.

MISSION:
Define what counts as evidence, how it is weighted, and how conflicts are resolved.
This is the line between diligence and opinion.

ANALYTICAL BURDEN:
You MUST:
&#8226; Define primary vs secondary vs inferential evidence
&#8226; Establish a trust hierarchy:
  REGULATORY &gt; AUDITED &gt; CONTRACTUAL &gt; ISSUER &gt; THIRD-PARTY &gt; MEDIA
&#8226; Define how stale, contradictory, or partial evidence is handled
&#8226; Define minimum citation requirements per claim type

MANDATORY ADVERSARIAL TESTS:
You MUST explicitly answer:
&#8226; What evidence would NOT be sufficient?
&#8226; When is inference allowed &#8212; and when is it forbidden?
&#8226; How are analyst echo chambers avoided?
&#8226; How is availability bias prevented?</code></pre><div><hr></div><p><strong>0.3 Mandatory falsification</strong> requires documented searches for disconfirming evidence before we claim any hypothesis has support. The most valuable finding is often we expected X but evidence indicates not-X, except institutional patterns reward confidence so contradictory evidence gets buried as areas requiring additional investigation.</p><pre><code>ROLE:
You are acting as the Red Team Lead.

MISSION:
Ensure every major line of inquiry attempts to prove itself wrong.
No hypothesis survives unchallenged.

ANALYTICAL BURDEN:
You MUST:
&#8226; Require explicit hypotheses for each stage
&#8226; Mandate disconfirming evidence searches
&#8226; Track hypothesis survival or collapse
&#8226; Prevent hypothesis drift into assumption

MANDATORY ADVERSARIAL TESTS:
You MUST explicitly answer:
&#8226; What would disprove each hypothesis?
&#8226; What evidence was sought but not found?
&#8226; Where did confidence decrease?
&#8226; Which hypotheses collapsed &#8212; and why?</code></pre><div><hr></div><p><strong>0.4 Uncertainty preservation</strong> distinguishes between things not yet verified and things that cannot be verified with available information. We attach confidence levels to every significant claim. When stakeholder interviews contradict financial filings, we document that contradiction rather than averaging it into comfortable middle positions that obscure the fact we cannot determine ground truth.</p><pre><code>ROLE:
You are acting as the Epistemic Risk Analyst.

MISSION:
Prevent uncertainty from being smoothed, hidden, or laundered.
Uncertainty must be classified, bounded, and preserved.

ANALYTICAL BURDEN:
You MUST:
&#8226; Distinguish UNKNOWN from UNKNOWABLE
&#8226; Require confidence levels on all claims
&#8226; Prevent aggregation from erasing variance
&#8226; Force explicit statements of confidence decay

MANDATORY ADVERSARIAL TESTS:
You MUST explicitly answer:
&#8226; What do we not know?
&#8226; What cannot be known from public sources?
&#8226; Where does uncertainty materially affect decisions?
&#8226; Where would false certainty be dangerous?</code></pre><div><hr></div><p><strong>0.5 Independent enforcement</strong> establishes red-team review where at least one team member challenges every major finding with authority to force complete rework regardless of schedule pressure. Without this, all other controls become performance theater.</p><pre><code>ROLE:
You are acting as the Independent QA &amp; Red Team Authority.

MISSION:
Ensure no stage self-certifies rigor.
All stages must be challengeable, reversible, and auditable.

ANALYTICAL BURDEN:
You MUST:
&#8226; Define cross-stage QA checks
&#8226; Require red-team review for synthesis stages
&#8226; Establish fail / redo authority
&#8226; Prevent schedule or convenience pressure from overriding rigor

MANDATORY ADVERSARIAL TESTS:
You MUST explicitly answer:
&#8226; Who can force a redo?
&#8226; What triggers escalation?
&#8226; How are weak stages detected?
&#8226; How is dissent preserved?</code></pre><div><hr></div><p><strong>0.6 Output integrity</strong> structures our deliverable so uncertainty bounds cannot be stripped out by readers who only engage with executive summaries. Confidence qualifiers embed directly with claims rather than living in footnotes that disappear during excerpting.</p><pre><code>ROLE:
You are acting as the Output Integrity &amp; Risk Analyst.

MISSION:
Ensure outputs cannot be stripped of context, caveats, or uncertainty.
This exists to prevent downstream misuse.

ANALYTICAL BURDEN:
You MUST:
&#8226; Require claim &#8594; evidence traceability
&#8226; Embed caveats and confidence with outputs
&#8226; Prevent selective excerpting
&#8226; Define how summaries must reference full analysis

MANDATORY ADVERSARIAL TESTS:
You MUST explicitly answer:
&#8226; How could these outputs be misused?
&#8226; How is overconfidence prevented?
&#8226; What context must never be removed?
&#8226; What warnings must travel with outputs?</code></pre><p>These controls make our deliverable harder to produce. <em>That difficulty is the entire point of constitutional governance. </em>I provide the prompt in its entirety at the end of the article.</p><h3><strong>Why 73% of AI Initiatives Collapse Before Models Run</strong></h3><p>The conventional wisdom about AI failure is well-documented and widely accepted across industry research. </p><blockquote><p><a href="https://mlq.ai/media/quarterly_decks/v0.1_State_of_AI_in_Business_2025_Report.pdf">MIT&#8217;s 2025 study</a> shows ninety-five percent of enterprise AI pilots deliver zero measurable return, <a href="https://www.ciodive.com/news/AI-project-fail-data-SPGlobal/742590/">S&amp;P Global Market Intelligence reports</a> forty-two percent of companies abandoned most AI initiatives in 2025 up from seventeen percent the year before, and <a href="https://www.informatica.com/about-us/news/news-releases/2025/01/20250128-global-data-leaders-seek-to-harness-the-power-of-genai-for-ai-driven-success.html">Informatica&#8217;s CDO Insights survey</a> identifies the primary culprits as data quality and readiness at forty-three percent, lack of technical maturity at forty-three percent, and shortage of skills at thirty-five percent. </p></blockquote><p>The diagnosis has become remarkably consistent: fix data quality through governance, align stakeholders through communication, clarify use cases through business discipline, and invest in organizational capabilities through training. To be clear, I completely agree that data quality must be paramount.</p><p>I have watched organizations follow that exact playbook, spending millions on data quality initiatives and governance frameworks. <em>Has the failure rate stayed constant because the conventional diagnosis treats symptoms as root causes? </em>Let&#8217;s see.</p><p>Here is what the industry analysis consistently misses: data quality problems are real, but organizations discover them only after committing strategic direction based on foundational assessments that mistook management narrative for enterprise reality. Read that again. They then launch expensive governance initiatives to fix quality issues in systems they should never have selected, for use cases they never properly validated, supporting business models they never stress-tested against contradictory evidence that was available during assessment.</p><p>I use CISO disciplines to protect the enterprise and I am building CDAIO capabilities to drive enterprise growth, and that combination is unusual enough that it changes what you can see when you look at organizational failures and where you have leverage to force change before patterns become irreversible. Both roles operate in domains where failure stays completely invisible until it becomes catastrophic enough to force response, where truth is frequently politically inconvenient in ways that create real career risk for people who insist on it. <strong>Where institutional incentives systematically reward narrative comfort over analytical accuracy because comfortable narratives enable action while uncomfortable truths force confrontation with constraints leadership would prefer to ignore.</strong> </p><p>The difference between these domains is timing rather than fundamental challenge. Security failures surface on attacker timelines you cannot control or negotiate&#8212;hours or days or weeks that force immediate accountability because external threat actors do not wait for your strategic planning cycle to complete. Bad epistemic governance in foundational strategic assessments hides inside multi-year transformation programs where compounding analytical errors take quarters or years to become visible as destroyed enterprise value that nobody can trace definitively back to the initial assessment work that set everything on the wrong trajectory at the very beginning when course correction would have been relatively inexpensive.</p><p>Organizations do not fail at AI implementation because they chose the wrong technology platforms or because their data quality turned out to be insufficient for the models they wanted to deploy. They fail because their foundational assessments&#8212;the exact work this first deliverable requires us to produce&#8212;systematically mistake management narrative for enterprise reality, and every subsequent recommendation inherits that distortion, compounds it through additional layers of analysis that treat the initial assessment as settled truth, and amplifies it into strategic direction that destroys value at scale. The data quality issues surface later as symptoms because the foundational assessment never properly tested whether proposed use cases could actually be supported by available data, whether the business model is economically viable when you account for actual unit economics, or whether stakeholders claiming alignment actually agree on what constitutes authoritative information when positions conflict during implementation.</p><p>My belief is that you cannot fix this pattern by executing harder or by investing more capital in data quality remediation after flawed strategic direction has already been set. <em>The failure is architectural and requires constitutional governance operating at the assessment design level, before anyone commits resources to directions that were never properly validated against evidence.</em></p><h3><strong>Nine Stages of Constraint Discovery</strong></h3><p>This starts a series walking through nine stages of progressive constraint discovery, each designed to surface truths that standard assessments routinely smooth away. Corporate structure and legal constraints. Business model mechanics and value flows. Market forces and competitive dynamics. Organizational execution reality. Financial behavior under stress. Technology constraints and platform dependencies. Information flows and epistemic authority. Risk boundaries and regulatory constraints. Resilience under shock.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_Van!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Van!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 424w, https://substackcdn.com/image/fetch/$s_!_Van!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 848w, https://substackcdn.com/image/fetch/$s_!_Van!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 1272w, https://substackcdn.com/image/fetch/$s_!_Van!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Van!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png" width="1456" height="512" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/acf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:601142,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/187791303?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Van!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 424w, https://substackcdn.com/image/fetch/$s_!_Van!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 848w, https://substackcdn.com/image/fetch/$s_!_Van!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 1272w, https://substackcdn.com/image/fetch/$s_!_Van!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facf3c658-ca26-44a3-baba-d96508eb58cc_2656x934.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The goal is never comprehensive analysis&#8212;that is a comfortable fiction. The goal is accurate discovery of what actually constrains outcomes, preserved with uncertainty bounds intact, structured to resist reinterpretation by people who never read the underlying evidence.</p><p>Next piece covers Stage 1 and why standard assessments systematically confuse organizational charts with actual power structures, why legal entities map poorly to operational reality, and why formal corporate structure tells you almost nothing about where authority actually lives in practice. Cheers!</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Diligence Constitution Stage0 Techref</div><div class="file-embed-details-h2">238KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.thehipsterciso.com/api/v1/file/2fecf1e1-6c51-4919-a4ba-3efa7ba21252.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.thehipsterciso.com/api/v1/file/2fecf1e1-6c51-4919-a4ba-3efa7ba21252.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p> </p>]]></content:encoded></item><item><title><![CDATA[How Today’s Cybersecurity Measurements Cannot Support Decisions]]></title><description><![CDATA[continuing a case for measurable cybersecurity]]></description><link>https://www.thehipsterciso.com/p/how-todays-cybersecurity-measurements</link><guid isPermaLink="false">https://www.thehipsterciso.com/p/how-todays-cybersecurity-measurements</guid><dc:creator><![CDATA[Thomas Jones]]></dc:creator><pubDate>Tue, 27 Jan 2026 16:12:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!afbO!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F774c8a31-0421-421e-979a-63fc5942e994_278x278.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the <a href="https://www.thehipsterciso.com/p/why-cybersecurity-measurement-fails">initial post in this series</a>, I argued that cybersecurity measurement fails when it does not reduce uncertainty at the moment a decision must be made. That failure persists even when organizations invest heavily, expand tool coverage, and report continuously on activity and progress. When governance is required to choose among options&#8212;accept, reduce, transfer, or avoid risk&#8212;the information provided does not materially change how that decision is evaluated. There is no evidence that clearly favors one option over another.</p><p><strong>What matters now is not whether this gap exists, but why it persists even after it is recognized.</strong> Most organizations see the problem, acknowledge it <em>(often reluctantly)</em>, and attempt to close it by refining metrics, adding dashboards, or aligning more closely to frameworks. And yet, the outcome rarely changes.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Hipster CISO&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>From a data leadership perspective, this pattern is all too familiar. When decision support fails consistently, the root cause is almost never the metrics themselves. It is the absence of an underlying data architecture designed to support the decision being asked.</p><div><hr></div><h3><strong>The Structural Cause, Reframed as a Data Problem</strong></h3><p>I would offer that any Chief Data Officer would not describe most cybersecurity measurement environments as immature because they lack data. They would however describe them as immature because the data has no defined analytical purpose.</p><p>In a data-driven enterprise, measurement begins with a decision context. Data is treated as an asset whose value depends on its ability to inform a specific choice. Governance starts by identifying the decision, the consumer, and the consequence of uncertainty. Only then are data sources identified, quality expectations defined, and metrics selected. This is the core logic of enterprise data management and analytics maturity.</p><p><em>Cybersecurity measurement does not follow this pattern. Unfortunately.</em></p><p>Security data is generated opportunistically as a byproduct of technology execution. Controls emit signals. Tools generate telemetry. Processes produce artifacts. I would even go so far as to state that it also is a byproduct of security vendor marketing. <em>Let me know your opinion on this one. </em>Measurement is layered on top to summarize what exists, what ran, and what was completed. From a data governance standpoint, this is unmanaged exhaust or noise. It is data without a declared consumer, without an explicit analytical model, and without accountability for decision impact.</p><p>There is no formal decision schema that defines how cybersecurity data should be organized to support governance. There is no clear articulation of which uncertainties matter to executive leadership and which do not. As a result, cybersecurity metrics are governed for completeness, consistency, and external expectation rather than for decision relevance. They simply exist because they can be produced.</p><p>A data leader would recognize this immediately. It is the same failure mode seen in early enterprise analytics efforts across other domains: abundant data, increasingly sophisticated reporting, and a persistent inability to translate information into action.</p><div><hr></div><h3><strong>Why Metrics Cannot Repair an Architectural Gap</strong></h3><p>In analytically mature organizations, measurement is derived from an explicit understanding of what must be explained, predicted, or optimized. Data is collected to support that model. Indicators are retained because they reduce uncertainty for a specific decision. Metrics that do not do this are discarded, regardless of how easy they are to collect or how familiar they appear.</p><p>Cybersecurity measurement inverts this logic. Data is collected because it exists. Metrics are defined because they are easy to find. Governance is expected to infer meaning after the fact. When that inference fails, the response is to add more metrics rather than to question whether an analytical model of value exists at all.</p><p><strong>From a data maturity standpoint, this guarantees failure. </strong>Without an explicit model linking security activity to risk outcomes, metrics cannot be evaluated for usefulness. The system rewards accumulation rather than business value.</p><p>This is why cybersecurity measurement environments grow wider but not deeper. Dashboards expand. Domains multiply. Confidence inside the function increases&#8212;often without justification. But the analytical capability required to reason about exposure, tradeoffs, and residual risk never materializes, because it was never designed.</p><p><em>I have been able to explain what every cyber metric represents and still be unable to explain what the dataset allows governance to conclude. </em>That is not a communication problem. It is what happens when data was never designed to support decisions.</p><div><hr></div><h3><strong>Cybersecurity as a Failed Data Product</strong></h3><p>Modern data organizations do not think in terms of reports. They think in terms of data products. A data product has a defined consumer, a defined use case, and a measurable contribution to a business outcome. Its value lies in changing a decision or enabling an action.</p><p>Viewed through this lens, cybersecurity measurement is not a data product. It has consumers, but no agreed-upon use case. It produces outputs, but no defined decision impact. It generates activity, but no accountable outcome.</p><p>From a Chief Data Officer&#8217;s perspective, this is the core failure. Cybersecurity&#8212;often reinforced by vendor-driven reporting&#8212;has built pipelines and mistaken them for analytical products. Organizations invest in data generation and visualization, but not in modeling, hypothesis testing, or uncertainty reduction. Measurement is delivered, but value is assumed rather than demonstrated.</p><p>This is why cybersecurity measurement struggles to show business value in the same way other data initiatives do. There is no value proposition defined at the outset. There is no articulation of how improved measurement should change capital allocation, risk acceptance, or operational constraints. Without that linkage, measurement cannot be evaluated as an asset. It can only be maintained as a cost.</p><div><hr></div><h3><strong>Why This Becomes a Governance and Data Leadership Problem</strong></h3><p>As long as cybersecurity measurement is treated as internal reporting, these shortcomings are survivable. Reporting does not require causal models or quantified uncertainty. It requires consistency and coverage&#8212;areas where most CISOs already excel.</p><p>BUT boards are accountable for cyber risk outcomes. Regulatory scrutiny increasingly expects evidence that decisions were informed and deliberate. Insurance, audit, and executive oversight converge at the point where risk must be explicitly accepted, reduced, transferred, or avoided.</p><p>From a data leadership standpoint, this is precisely the type of environment that demands structured data, explicit models, and disciplined analytics. When those do not exist, governance still has to act. Decisions are made using judgment, external benchmarks, or precedent. The absence of decision-grade data is masked by the presence of abundant reporting.</p><p>This creates a fundamental mismatch. Leadership is accountable for outcomes, but the data systems supporting cybersecurity were never designed to inform the choices leadership is now expected to justify. From an enterprise data governance perspective, this is not a cybersecurity failure. It is an organizational failure to treat cyber risk as a governed analytical domain.</p><div><hr></div><h3><strong>The Governance Obligation We Have Not Met</strong></h3><p>At this point, the unresolved issue is not whether cybersecurity measurement should support governance decisions. That premise is already accepted. <strong>The unresolved issue is whether we have built the data architecture necessary for that support to exist at all.</strong></p><p>Decision-grade measurement requires more than dashboards and indicators. It requires a system that defines the decision, models uncertainty, encodes assumptions, and translates operational data into evidence that can be evaluated and compared. Without that foundation, metrics will continue to proliferate without producing insight.</p><p>In the final post of this series, I will describe what a decision-centered cybersecurity measurement architecture looks like when approached as a data problem first. Not as a framework, and not as a compliance exercise, but as an analytical system designed to support governance decisions under uncertainty.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Hipster CISO&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Security to Data and AI Governance]]></title><description><![CDATA[on accountability, measurement, and enterprise decision support]]></description><link>https://www.thehipsterciso.com/p/from-security-to-data-and-ai-governance</link><guid isPermaLink="false">https://www.thehipsterciso.com/p/from-security-to-data-and-ai-governance</guid><dc:creator><![CDATA[Thomas Jones]]></dc:creator><pubDate>Fri, 16 Jan 2026 16:25:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6Mu_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My career began in electrical engineering and expanded into the CISO role as accountability moved from systems to enterprise risk, regulatory exposure, and operational resilience. The work naturally shifted toward governance, measurement, and board-level decision support.</p><p>As a CISO, my accountability centered around data protection. Risk quantification, compliance, third-party oversight, and incident response depended on how data was classified, governed, measured, and trusted across the enterprise.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Hipster CISO&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I have been writing a standard/book for two years now(whew &#128530;) to formalize a proper cyber metrics reality and extend it. It focuses on building enterprise data models, metrics, and measurement frameworks that convert technical and operational complexity into proper decision-grade insight. The objective is accountability: enabling leadership to govern risk, allocate capital, and evaluate outcomes based on evidence as analytics and automation scale. The same governance and measurement mechanics apply to AI, where model behavior, training data, and operational impact require defined guardrails and executive oversight.</p><p>I am excited to announce that I will be engaging with the prestigious <strong><a href="https://www.linkedin.com/feed/#">Carnegie Mellon University</a></strong>&#8217;s <strong><a href="https://www.heinz.cmu.edu/programs/executive-education/chief-data-ai-officer-certificate">Chief Data and AI Officer (CDAIO) program</a></strong> to deepen this work and formalize the operating models required to govern data and AI at enterprise scale. &#127913; &#128640;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Mu_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Mu_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 424w, https://substackcdn.com/image/fetch/$s_!6Mu_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 848w, https://substackcdn.com/image/fetch/$s_!6Mu_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 1272w, https://substackcdn.com/image/fetch/$s_!6Mu_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Mu_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic" width="1456" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:304434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/184784024?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6Mu_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 424w, https://substackcdn.com/image/fetch/$s_!6Mu_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 848w, https://substackcdn.com/image/fetch/$s_!6Mu_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 1272w, https://substackcdn.com/image/fetch/$s_!6Mu_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3748d775-acc0-414a-a100-34f11fdd3c3b_2432x1320.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p> My career has come full circle from securing systems, to governing data, to overseeing how analytics and automation shape enterprise outcomes. Expanding into data and AI leadership broadens the scope and the failure modes are already familiar; the surface area is just a bit larger. That is why it feels so exciting. It calls for continued learning, operational rigor and restraint, and it is work I am ecstatic to step into. </p><p>Wish me luck. Cheers!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Hipster CISO&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why Cybersecurity Measurement Fails Governance Decisions]]></title><description><![CDATA[a case for measurable cybersecurity]]></description><link>https://www.thehipsterciso.com/p/why-cybersecurity-measurement-fails</link><guid isPermaLink="false">https://www.thehipsterciso.com/p/why-cybersecurity-measurement-fails</guid><dc:creator><![CDATA[Thomas Jones]]></dc:creator><pubDate>Thu, 08 Jan 2026 23:40:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2WZV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cybersecurity measurement fails in a fairly predictable and repeatable way, and most of us in the industry have seen it often enough that it now feels routine.</p><p>Our organizations invest heavily in security controls, tooling, and programs, <em>maybe not as much as we would like</em>, but the notion still holds true. We track coverage across our environments, maturity across all domains, and the activity across business functions. All this so that we can produce regular reports, satisfy audit requirements, and demonstrate alignment<em>(for good or worse)</em> to established frameworks. On paper, our programs appear disciplined and increasingly mature. <strong>The important point is this: the failure becomes &#8220;more&#8221; visible when we and our peers try to use the information to make an actual decision</strong>. <em>That is the goal, right?</em></p><p>At that point, the information that we have provided rarely reduces uncertainty in a way that supports real action. Leadership cannot clearly determine how risk has changed, which exposures remain material, or which tradeoffs follow from the data being presented. The discussion shifts toward reassurance rather than resolution, and decisions proceed based on &#8220;judgment&#8221; rather than &#8220;evidence&#8221;.</p><p>This outcome continues to persist even in organizations with experienced teams, a huge amount of telemetry, and strong external validation. And yet, the same failure is constantly/consistently found. So knowing this, we can say that this rules out isolated causes and more than likely points to a structural one. <strong>The underlying issue sits in measurement design. Hard stop.</strong></p><p>Most cybersecurity measurement efforts evolve from what is easy to observe rather than from what leadership needs to decide. Metrics describe activity<em>(most of all)</em>, completeness, or progress within the security function, but they do not explicitly model how those observations change the likelihood or impact of outcomes that our  business cares about. As a result, measurement artifacts accumulate without forming a coherent decision system. Their function becomes presentation rather than decision support. Metric theater.</p><p>Measurement has a single purpose in an executive context. It exists solely to reduce uncertainty so that a decision can be made with greater confidence than would otherwise be possible. That is it. </p><p>When measurement does not alter a decision, narrow the set of plausible options, or materially change confidence in an outcome, it has failed its purpose regardless of how polished or compliant it appears. That is a problem we needed to fix yesterday.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>If this failure feels familiar, the next post will be uncomfortable by design. I&#8217;ll outline what cybersecurity measurement is actually responsible for delivering at the board level&#8212;and why most current programs cannot meet that bar. &#8212; THOMAS JONES</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>the decision failure</h2><p>Let&#8217;s consider a routine governance decision that most boards now face:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2WZV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2WZV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 424w, https://substackcdn.com/image/fetch/$s_!2WZV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 848w, https://substackcdn.com/image/fetch/$s_!2WZV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!2WZV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2WZV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png" width="386" height="391.404" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1014,&quot;width&quot;:1000,&quot;resizeWidth&quot;:386,&quot;bytes&quot;:87538,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/183953097?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2WZV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 424w, https://substackcdn.com/image/fetch/$s_!2WZV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 848w, https://substackcdn.com/image/fetch/$s_!2WZV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!2WZV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1442de-e396-4ded-970d-0737c0b1b3c5_1000x1014.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The board must determine whether to accept, reduce, transfer, or avoid a specific category of cyber risk. Most of us have been through this discussion many times. It influences our capital allocation, our insurance coverage, our contractual commitments, and even our operational constraints. In preparation, the organization points to sustained investment in cybersecurity. Spending has increased year-over-year<em>(yay!)</em>, and the security program reports improved maturity<em>(maybe)</em>, broader control coverage<em>(not likely)</em>, faster response times<em>(probably)</em>, and fewer audit findings<em>(i&#8217;ll leave this one alone)</em>. From an operational standpoint, our program appears to be improving.</p><p>During the discussion, a director asks a straightforward question that aligns directly with the decision at hand:</p><blockquote><p>How did this year&#8217;s security investments change our exposure to a material cyber event?</p></blockquote><p>I respond with information that is accurate and defensible. </p><ol><li><p>New controls were implemented.</p></li><li><p>Known gaps were closed.</p></li><li><p>Programs matured.</p></li><li><p>Metrics improved across several dimensions. </p></li></ol><p>Each statement that I gave reflects real work and real progress by the entire team. <em><strong>However my response does not support the decision the board is trying to make, and that bothers me every time I see it happen, including when I am the one presenting.</strong></em> <em>Sigh.</em></p><p>It does not quantify how our uncertainty changed. It also does not describe whether the likelihood or impact of a relevant loss events moved in a meaningful way. It also does not distinguish which investments mattered more than others. Most importantly, it does not support a clear choice among accepting, reducing, transferring, or avoiding the risk that we had under discussion.</p><p>At this point, the board still has to act. <em>So now what?</em></p><p>When measurement does not support the decision, boards follow a very predictable path. <em>I know you have seen this. </em>They defer the decision pending additional analysis. They rely on qualitative judgment and professional intuition. They substitute external opinion through consultants, insurers, or auditors&#8212;<em>yes, the odd notion that external input is of higher value than internal input&#8212;I don&#8217;t understand that either</em>. </p><p>Each of these responses allows the governance to proceed, but none of them truly reflected a measurement system that performed its intended function: <strong>that a properly functioning measurement system would have reduced uncertainty enough to make one option more defensible than the others.</strong> The absence of that outcome is the failure being examined here.</p><div><hr></div><h2>what measurement actually requires</h2><p>Measurement has never required complete information<em>(I admit that i&#8217;ve made this same mistake so many times)</em>. Finance, operations, and the risk functions regularly rely on partial data that holds up statistically and supports real decisions. It requires enough information to reduce uncertainty for a defined decision. </p><p>In our cybersecurity executive context, measurement earns its value only when it changes how a decision is evaluated. The question is/should never be whether a metric is precise in isolation. The question is whether it meaningfully narrows the range of plausible or realistic outcomes the decision makers are weighing.</p><p>Other disciplines internalized this principle long ago. I provide a case in point:</p><p>Finance measures variance and exposure because capital allocation decisions depend on understanding the downside, volatility, and sensitivity. Operations obviously measures throughput, capacity, and operational constraints because those measures directly inform tradeoffs between cost, speed, and reliability. Our good friends in Safety measure near-miss incident rates and leading indicators because regulatory thresholds and liability decisions depend on them.</p><p>In each case, measurement exists within a clearly defined decision context. Metrics are selected because they influence a choice that must be made, not because they are easy to collect or even widely accepted.</p><p><strong>Unfortunately, cybersecurity measurement rarely follows this pattern.</strong></p><p>Most cybersecurity metrics describe internal activity within the security function rather than external impact on the organization. <em>I encourage you to prove me wrong. </em>They report counts, percentages, maturity scores, and coverage levels. These measures provide visibility into effort and progress, but they do not specify how observed values affect the likelihood or magnitude of loss events that matter to the business. <em>I am looking directly at you, Microsoft Secure Score! What a bunch of BS.</em></p><p>When a metric does not state how a change in value alters risk exposure, it cannot reduce uncertainty for a decision maker. It is really just THAT simple. It can however inform a status discussion, but it cannot support a choice among possible alternatives.</p><p><strong>And knowing all of this, the result is information that is descriptive but not decision-grade or decision-inducing. </strong>It explains what the security organization is doing. It DOES NOT explain what leadership should do differently as a consequence. </p><div><hr></div><h2>what this leaves unanswered</h2><p>Until we answer that question precisely, improvements in our reporting will not translate into better decisions. <em>I feel very strongly about this. </em>We will keep refining dashboards, expanding metrics<em>(because more metrics must mean better understanding&#8212;right?)</em>, and meeting external expectations, while governance <strong>discussions continue to rely on judgment rather than evidence</strong>. In my view, this disconnect is a core reason we continue to see posture failures that ultimately lead to higher impact breaches and incidents. </p><p>In the next post, I will focus on the question that I keep coming back to when I am in front of a board trying to make or defend a decision: what cybersecurity measurement is actually responsible for delivering in that moment to help reduce uncertainty in a way governance can act on.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thehipsterciso.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Judgement Over Noise]]></title><description><![CDATA[Notes from a practicing CISO on risk, restraint, and what actually works]]></description><link>https://www.thehipsterciso.com/p/judgment-over-noise</link><guid isPermaLink="false">https://www.thehipsterciso.com/p/judgment-over-noise</guid><dc:creator><![CDATA[Thomas Jones]]></dc:creator><pubDate>Mon, 22 Dec 2025 16:22:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o5oi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;ll start with the obvious. Yes, the brand name is intentional.</p><p><em>The Hipster CISO</em> isn&#8217;t about style or provocation <em>(or trying to be clever for its own sake)</em>. It&#8217;s simply how I think about the role as a <em>Chief Information Security Officer</em>. I value true judgment over noise, and I&#8217;m far more interested in results that hold up under scrutiny than in activity that just looks good on paper. This Substack is where I put that thinking down, without smoothing the rough edges or pretending everything is neatly resolved. Let&#8217;s be honest, it definitely is not. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Hipster CISO&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I&#8217;m writing for two reasons. First, I needed a space to think and grow <em>(as a leader, and honestly as a person)</em>. Second, cybersecurity has become very good at narrating itself and much less disciplined about asking whether it&#8217;s actually working. Boo. Hiss. We <em>re-produce</em> <em>(yes, that emphasis is intentional)</em> artifacts, maturity language, and broadly agreeable stories, but we spend far less time examining effectiveness, trade-offs, or whether any of this is materially changing enterprise risk. I&#8217;m not particularly interested in preserving that dynamic.</p><h2><strong>Why &#8220;Hipster&#8221; Actually Matters</strong></h2><p>The term fits because it implies intentionality. </p><p>It rejects mass production in favor of precision <em>(and yes, I am looking directly at you, AI-musing-generation experts)</em>. It favors quality over volume. I will question all defaults instead of inheriting them because &#8220;that&#8217;s how it&#8217;s always been done.&#8221; That just feels like nails on a chalkboard just writing it down.</p><p>This won&#8217;t be a feed of hot takes. It&#8217;s going to be a working notebook. Take it or leave it <em>(and that&#8217;s perfectly okay)</em>.</p><p>Some of what shows up here will read like internal strategy memos. Some of it will come from board questions I didn&#8217;t have clean answers to at the time. There will be positions I hold with conviction, and others I&#8217;m still pressure-testing <em>(or actively developing while I&#8217;m writing)</em>. The structure will vary, but the underlying premise won&#8217;t: cybersecurity is a business function of trust, and it should be governed with the same rigor as capital, safety, or strategy.</p><p>I&#8217;m not here to sell tools, validate orthodoxy, or soften conclusions for broader public appeal and discourse <em>(although everyone&#8217;s voice always matters)</em>. If something is widely practiced but simply ineffective, I&#8217;ll call it out. If the data is inconclusive, I won&#8217;t pretend otherwise or shy away from saying so. I like data. I trust it more than most narratives.</p><p>This Substack fits because it reflects how I approach the work, the role, and life in general, to be honest. I&#8217;m selective, intentionally and by design. I care far less about how mature a program sounds than how it performs when something actually breaks.</p><h2><strong>How to Read This All</strong></h2><p>Read this the way you&#8217;d read something written by a peer who has nothing to sell and no interest in oversimplifying the work.</p><p>You don&#8217;t need to agree with everything here. In fact, disagreement is often a sign the writing is doing its job. If what you&#8217;re after is comfort, consensus, or the familiar &#8220;influencer&#8221; calls-to-action that are everywhere today, this may not be the right place. I wish you well regardless.</p><p>If you&#8217;re interested in sharper thinking about cybersecurity as governance, as leadership, and as an enterprise discipline that actually earns its seat at the big kid&#8217;s table, then you&#8217;re exactly who this is for.</p><p>Welcome to <em>The Hipster CISO</em>.</p><p><a href="https://github.com/thehipsterciso/substack/blob/ec9582c6580df39c9aa3af6b8f0f36fc2ffe9252/judgement-over-noise.xml">Github Source</a></p><p><a href="https://github.com/thehipsterciso/substack/blob/ec9582c6580df39c9aa3af6b8f0f36fc2ffe9252/judgement-over-noise.pdf">Canonical Article on Github</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o5oi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o5oi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o5oi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o5oi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o5oi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o5oi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg" width="728" height="381" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:762,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:94976,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thehipsterciso.com/i/182332434?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd97fcc0f-3c00-45a9-a0e4-cfe4ab294973_3658x1908.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!o5oi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 424w, https://substackcdn.com/image/fetch/$s_!o5oi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 848w, https://substackcdn.com/image/fetch/$s_!o5oi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!o5oi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb99867ba-01eb-475a-92b3-60a3bbb8a43a_1785x934.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thehipsterciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Hipster CISO&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>