When I stepped away from Member.buzz, I didn’t expect to end up in cybersecurity leadership. But looking back, it makes perfect sense. That chapter taught me how systems break, how people think, and how much effort it takes to build something resilient. Becoming a CISO wasn’t a career pivot as much as it was the next evolution of what I’d already been doing.
The Pivot
Running Member.buzz gave me a front-row seat to what happens when technology meets the real world. People tried to hack the platform constantly, which forced me to think about security in a practical way. I wasn’t just patching issues; I was learning how to design systems that could handle pressure.
When you’re building a product, it’s easy to get caught up in new features and functionality. Security often gets attention only after something goes wrong. What I learned early on is that it needs to be part of the plan from day one. You have to ask: If this breaks, can we recover? If we lose power, data, or access, what happens next?
Eventually, I realized the skills I had developed as a founder – troubleshooting under pressure, thinking systemically, and balancing idealism with reality – were exactly what companies needed in a security leader. Stepping away from Member.buzz wasn’t a failure. It was a turning point that helped me see where I could make the biggest impact.
The Work
My first CISO engagement dropped me into a company that had little structure around IT or security. There wasn’t even a clear list of what systems were running or who was responsible for them. I started by mapping everything out: business processes, hardware, applications, and data flows.
From there, we began to modernize. We moved systems to the cloud, transitioned the data center to a managed provider, and built redundancy so the business could continue to operate during a disruption. Then came the essentials: penetration testing, backup and recovery, and monitoring.
Over time, it became clear that our gaps were less about control and more about visibility. We had strong systems but no good way to assess risk or track compliance activities across teams. That’s what led me into GRC, where I helped establish automated frameworks using platforms like Vanta. I also led a FedRAMP 20x project, working closely with auditors to get all documentation and testing completed on time. It was detailed, demanding work, but it showed me how structure and process are what make security programs sustainable.
The Lessons
Security is about people as much as it is about technology. You can buy every tool on the market, but without communication and a culture that values it, none of it works.
I also learned that vendor sprawl is a real security risk. Each new tool introduces cost, complexity, and potential exposure. Simplifying your environment isn’t just about saving money; it’s part of a solid security strategy.
The biggest lesson, though, is that good security is about finding the balance between perfect and practical. It takes deep technical knowledge, strong organization, and the ability to communicate clearly with leadership. Those skills don’t always exist in the same person, but the CISO has to live in both worlds.
Looking Forward
These experiences have shaped how I approach technology and business today. Whether I’m building a new framework or helping a company mature its security posture, my goal is the same: to create systems that are strong, scalable, and adaptable.
That mindset is also what led to YGI Solutions. What started as a focus on secure design has grown into a mission to help companies run better, safer, and smarter. Security, compliance, and efficiency aren’t separate priorities. They are all part of building something that lasts.