Technology and Management Solutions  
October 2025
 
In the October 2025 Newsletter
  Security Innovation with AI (Part 6) / Events / Book Theresa

New to receiving this newsletter? You can subscribe or unsubscribe anytime.

HMG Cyber Panelists
Moderator and Panelists at the CIO Executive Leadership Summit.

Cyber threats and data breaches continue to grow. Did you know that cybercrime costs the world over $10 trillion every year? That's why security must be our number one priority.

Why is Security a Top Priority?

Because nearly every aspect of modern life depends on digital systems, and those systems are constantly under attack. Without a safe and secure digital environment, businesses and governments cannot function. Critical services can be disrupted, putting public safety and even national security at risk.

Data breaches not only break laws — they break trust, damage reputation, and destroy brand loyalty. And as we integrate artificial intelligence, the attack surface expands. AI can make cyber threats faster, smarter, and much harder to detect.

How Do Organizations Strengthen Security?

Innovate. This is what great leaders do best. They innovate. Through continuous security innovation, we can turn cybersecurity from a defensive necessity into an offensive strategic competitive advantage.

Here are important Security Innovations messages from the panel I moderated at the HMG Strategy CIO Summit in Denver in October 2025.

In my newsletters over the past six months about AI, I have provided an overview, real-world case studies, and practical take-aways to help you and your organization survive, thrive, and produce ROI.

Security Innovation Examples

DALE DREW, CISO, 5G Dish / Echostar. We implemented a Customer Zero Program. We tell the business seeking security improvements to adopt the products we sell to our customers. We want to be the beta for what our customers use. We want to integrate value-added services from a security perspective. This approach resulted in 16 patented innovations in the 5G security space.
EMILY CELLAR, VP of IT Security and Infrastructure, iFIT. As an educational tool, we created a deep-fake video of the CEO offering iFIT memberships for all for free. It showed the need to train the CEO and all executives on these kinds of security scams. We then talked to all employees about establishing "Code Words" at home as a family. If we have strong cyber security at home, these habits come to work.
CRAIG BUESING, CISO, Gates Corporation. We established a phishing honeypot which takes an attacker and puts them into a sandbox with no doors. This is a deceptive system designed to attract, detect, and analyze phishing attacks. The idea is not to trap attackers legally, but to observe and study their tactics. Gates has the goal to make this honeypot shareable and free to the community.
ANDREW BLACKMON, CIO, United Launch Alliance. We are working to improve capabilities across all seven areas of the "cyber kill chain." That chain describes the stages of a cyberattack from initial reconnaissance to achieving the attacker's ultimate goal. We strive to move away from niche products that work independently to a suite of products that work collaboratively and use intelligence to dynamically respond to threat actors in the environment.

How AI is helping Cybersecurity

DALE DREW. We are bullish on AI. In addition to using third-party LLMs (large language models), we are developing our own with Claude and Anthropic. We are taking threat data from vendors and our firm. We use the right prompt to compare the threat data with our security framework and analyze it daily. This gives our vulnerability team direction on where to prioritize our defenses. We added maturity to our controls by implementing a maturity feedback loop. We added a prompt to start analyzing all the tools the bad guys were using over time, and to predict what the next evolution would be. The training has become so good that we can learn what to expect in one month and what to expect in six months.
EMILY CELLAR. We are creating the needed AI infrastructure by building it in-house. Our cloud spend was going up so much that we are bringing processing back on-premises.
CRAIG BUESING. We are building out our own LLM as well. Attackers are using AI. We must also use AI and knock down the noise.
THERESA. My own research includes talking to a CISO from a large energy company. They are using AI to do Cyber Ticket Enrichment in parallel for 1000s of tickets per day. This AI approach is better than manually having many offshore people doing a fraction of the enrichment. The result is better security in less time at a lower cost with more satisfied employees.

How to Build a Security Innovation Culture

Have an appreciation for the need to steward the company's data. This means IT and the entire organization. Security is everyone's job.
Introduce new tools. People like to learn how to use them.
Give people room to be creative.
Discern Innovation as a core value of the organization. Include it in your vision and mission statements. Establish innovation related goals. Hire innovative people. Track the impact of innovation and measure the results. Learn more from Theresa's article, Six Steps to a More Innovative Government.

Summary

Innovation is critical to proactively pivot yourself and be able to forecast the future. (DREW)
Give your team the space to be creative. (CELLAR)
Security engineers are nerds. Let them play. (BUESING)
Know why you are doing things. It's to deliver for the customer. Think that the bad actors want your data. (BLACKMON)
Strive to create a security innovation culture. (THERESA)

News to Better Help You

I consult with organizations to help them innovate and successfully implement AI. I just completed the "AI in 5" certificate from the GenAI.Academy hosted by Professor Tom Yeh, Larissa Schwartz, and Sam Cummings through the University of Colorado.

Selected Events

November 7, 2025. "Serving up Hope" with Meetings Industry of Colorado. 11:00 AM - 2:00 PM MT at the Hilton Denver City Center. Join Theresa for an unforgettable luncheon of connection, compassion, and culinary creativity, all benefiting the Food Bank of the Rockies. Learn more and register.

November 13, 2025. Join Theresa at the Private Directors Association - Colorado meeting on "The Board's Responsibility in the Execution of Strategies for Growth and Innovation." 4:00 PM - 6:00 PM MT. Prospective and New member orientation at 4:00 PM. First Western Trust, 1900 16th St, Denver. Learn more and register.

November 27 - December 1, 2025. Theresa is in the Chicago area. Please reach out if you can get together.

Book Theresa to Coach, Speak, Facilitate, Consult, and Serve on Boards

See Theresa in action. Theresa's engaging presence, original stories, actionable insights, humor, wide ranging experiences, and practical pointers have earned her top speaker, coach, board member, and consultant rankings at many events and with a wide-range of business clients. Let "The Catalyst for Extraordinary Results" help you and your organization grow profit, productivity, and passion. Learn more at TMSworld.com and see a sample of Theresa's speaking programs.

 
Emily Jarvis at GovLoop said, "Of all the keynoters I've worked with, Theresa is among the best."
A conference participant who is the CIO of a large, public hospitality / travel company, said, "Theresa is a fabulous facilitator. She makes the discussion flow naturally."
Deana Rich, co-founder of Infinicept said, "I highly recommend Theresa to any executive looking for a coach who brings both structure and flexibility, strategy and empathy, and most importantly, real-world experience that translates into meaningful growth."

Theresa M. Szczurek, Ph.D.
C-Level Executive, Certified Corporate Director, Certified Management Consultant®, Executive Coach, Speaker, and Colorado CIO of the Year

Pass it on. Feel free to share this newsletter, using my name and copyright declaration, with your colleagues.

   

Subscribe to this newsletter

Theresa M. Szczurek, Ph.D.

Technology and Management Solutions

303.443.8674 Phone
303.496.0088 Fax
tms@tmsworld.com

 

Learn More

TMSworld

Introducing the Book

YouTube Channel

Podcasts

Newsletters

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Subscribe to this newsletter

© Copyright 2025,
Theresa Szczurek.
All rights reserved.