<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Strategy Layer]]></title><description><![CDATA[The Strategy Layer cuts through operational noise to help CISOs and cybersecurity leaders drive business results. Articles, insights, and conversations focused on smarter strategy, sharper alignment, and leadership that endures.]]></description><link>https://www.strategylayer.com</link><image><url>https://substackcdn.com/image/fetch/$s_!QgOt!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8648a4bf-8dca-4279-a23a-100da89643b8_820x820.png</url><title>The Strategy Layer</title><link>https://www.strategylayer.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 14:50:02 GMT</lastBuildDate><atom:link href="https://www.strategylayer.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Steve Tout]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thestrategylayer@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thestrategylayer@substack.com]]></itunes:email><itunes:name><![CDATA[Steve Tout]]></itunes:name></itunes:owner><itunes:author><![CDATA[Steve Tout]]></itunes:author><googleplay:owner><![CDATA[thestrategylayer@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thestrategylayer@substack.com]]></googleplay:email><googleplay:author><![CDATA[Steve Tout]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[When AI Outpaces Governance: Lessons from the Front Lines]]></title><description><![CDATA[The fintech industry's AI confidence is high. Its control maturity is not. Here's what that gap looks like up close.]]></description><link>https://www.strategylayer.com/p/when-ai-outpaces-governance-lessons</link><guid isPermaLink="false">https://www.strategylayer.com/p/when-ai-outpaces-governance-lessons</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Mon, 30 Mar 2026 17:32:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Epww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Gap No One Talks About</h2><p>Here is a pattern we see over and over again. A company is smart. The engineering team is strong. AI adoption is moving fast. And leadership is confident they have it under control.</p><p>Then someone looks under the hood.</p><p>That is what happened when we ran an AI Security and Risk Assessment for a fintech firm in a regulated market. The company had strong instincts &#8212; early AI adoption, skilled teams, and a growing set of use cases. What they lacked was a way to see, govern, or defend how AI was really being used.</p><p>They are not alone. After walking the show floor at RSA Conference 2026, one thing is clear: the industry knows this is a problem. <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Andy Ellis&quot;,&quot;id&quot;:10408119,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!5lth!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fcceb4e-948f-451a-83de-41f5150686a9_2480x3306.jpeg&quot;,&quot;uuid&quot;:&quot;0f080730-195e-4fa5-be25-8532c077a048&quot;}" data-component-name="MentionToDOM"></span>&#8217;s <a href="https://www.duha.co/reports/state-of-security-vendors-rsac-2026/">post-RSAC vendor report </a>found that 37% of booths mentioned AI. Identity, governance, and security operations led the way. But here is the hard truth behind the buzz &#8212; most firms are still figuring out how to close the gap between AI power and AI control.</p><p>That gap is where the real risk lives.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Epww!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Epww!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Epww!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Epww!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Epww!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Epww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3280826,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/192633964?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Epww!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Epww!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Epww!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Epww!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7220afcb-2d2b-45bd-b5f3-ad70c2bd6a68_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Clarity scales control&#8212;digital twins turn AI risk into confident decisions.</figcaption></figure></div><h2>What We Found</h2><p>The assessment covered eight domains and included interviews across leadership, engineering, and business teams. The results told a clear story.</p><ul><li><p>Upwards of 100 risks identified across governance, security, data, and infrastructure</p></li><li><p>The heaviest concentration was in governance and compliance &#8212; with over a dozen rated high or critical</p></li><li><p>Security and trust risks followed close behind, with the majority rated high severity</p></li><li><p>Data and AI platform risks rounded out the picture, including several high-priority findings</p></li></ul><p>The risks were not scattered. They were concentrated in three areas: governance, security, and data. That pattern points to structural gaps, not one-off problems.</p><p>Three challenges stood out above the rest.</p><p><strong>Governance without enforcement.</strong> Policies existed. Intent was there. But there was no defined ownership, no enforcement mechanism, and no audit trail. Governance was informal and hard to defend.</p><p><strong>Identity and access gaps in AI systems.</strong> AI agents and services had no steady identity. Access was too broad. Nothing was centrally managed. This is the kind of risk that builds quietly &#8212; until it does not.</p><p><strong>Uncontrolled AI use case growth.</strong> AI was being developed across business units, deployed without formal approval, and extended into customer-facing workflows. Governance simply could not keep pace with adoption.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2></h2><h2>Why This Matters Right Now</h2><p><a href="https://www.finra.org/rules-guidance/guidance/reports/2026-finra-annual-regulatory-oversight-report">FINRA&#8217;s 2026 guidance</a> makes the stakes clear. AI is no longer treated as a test. It is part of the firm&#8217;s control environment. That means oversight of AI-driven processes, data quality and tracing, logging of AI outputs, and close attention to the risks of agentic AI &#8212; autonomy, scope, and the ability to audit.</p><p>The shift is simple but significant. If AI touches decisions that affect customers, markets, or compliance, it must be governed like any other control.</p><p>Ellis&#8217;s RSA report backs this up from the vendor side. The categories with the most booths &#8212; identity, app security, and security operations &#8212; are the same areas where this assessment found the deepest gaps. The market is building answers. But most firms have not yet mapped the problems those answers are meant to solve.</p><h2>What Changed</h2><p>After the assessment, the organization had something it did not have before: clarity.</p><ul><li><p>A full view of AI-related risks and where they are concentrated</p></li><li><p>A prioritized list of what matters most &#8212; and what can wait</p></li><li><p>Leadership aligned around AI as a governance challenge, not just a growth play</p></li><li><p>A structured path from experimentation to governed execution</p></li></ul><p>Identient also delivered a digital twin of the assessment itself. Instead of leaving findings locked in a static report, a conversational agent makes risk insights easy to query, explore, and apply in real time. Leaders can ask questions, revisit findings, and act on insights as things change.</p><p>This is the shift we described in our earlier <a href="https://www.identient.com/blog/digital-twins-change-everything/">post on Verified Digital Twins</a>. Risk management cannot be a point-in-time exercise. It has to become a continuous, intelligence-driven function.</p><h2>The Bottom Line</h2><p>This firm is not behind. They are at a turning point &#8212; and they had the sense to act before the gap became a crisis.</p><blockquote><p>The firms that win with AI will not be the fastest to deploy. They will be the ones that can trust, control, and defend the choices AI makes on their behalf.</p></blockquote><p>That requires three things: structured governance, <a href="https://www.identient.com/blog/from-ai-to-verified-intelligence/">verified data</a>, and disciplined execution.</p><h2>Ready to See What You&#8217;re Missing?</h2><p>Experience how Identient reveals the signals behind your strategy &#8212; from real-time insight to board-level clarity. Move beyond assumptions, align execution to what matters, and lead with confidence.</p><p><strong><a href="https://www.identient.com/start">Schedule a Discovery Call &#8594;</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Two Birds, One Podcast: AI, Governance, and the Road Ahead]]></title><description><![CDATA[Richard Bird joins The Strategy Layer Live to discuss AI, cybercrime, governance, and leadership&#8212;plus a first-ever appearance by his digital twin.]]></description><link>https://www.strategylayer.com/p/two-birds-one-podcast-ai-governance</link><guid isPermaLink="false">https://www.strategylayer.com/p/two-birds-one-podcast-ai-governance</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 17 Dec 2025 22:21:50 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/181932575/8a4e2837435e0df648bec019d96dd22e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Episode Overview</strong></p><p>In this episode of <em>The Strategy Layer Live</em>, Steve  sits down with <strong>Richard Bird</strong>&#8212;multi-time CISO, former Chief Customer Information Officer at Ping Identity, author, and current Chief Security Officer at <strong>Singulr</strong>&#8212;for a conversation that pushes beyond conventional cybersecurity narratives.</p><p>For the first time on the podcast, an <strong>AI digital twin takes an active speaking role</strong>, opening the episode with a blunt assessment of where cybersecurity thinking has already fallen behind. From there, the discussion moves into the strategic implications of AI across cybercrime, governance, leadership, and careers.</p><p>This episode explores how AI is reshaping the threat landscape faster than most organizations are prepared for, why governance failures are increasingly systemic rather than technical, and what leadership looks like when machines operate at scale and speed. The conversation also turns personal, with reflections on Richard&#8217;s book <em><a href="https://a.co/d/ebJoZvA">Famous With 12 People</a></em> and the legacy he hopes to leave behind.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div id="youtube2-r9_VgvKxtFU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;r9_VgvKxtFU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/r9_VgvKxtFU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Prefer to listen?</strong></p><p><a href="https://podcasts.apple.com/us/podcast/two-birds-one-podcast-ai-governance-and-the-road-ahead/id1785305825?i=1000741763489">Apple Podcasts</a></p><p><a href="https://open.spotify.com/episode/1kDaLzm4wxT7Y8SlVNcUcf?si=e6a1a5ea2b754082">Spotify</a></p><p><strong>Key Topics Discussed</strong></p><p><strong>AI Digital Twins in Leadership Conversations</strong><br>What it means when AI systems don&#8217;t just assist&#8212;but actively participate in strategic dialogue.</p><p><strong>AI and the Acceleration of Cybercrime</strong><br>How attackers are using AI as force multiplication while many organizations reduce human defenders.</p><p><strong>Shadow AI and Unfinished Security Work</strong><br>Why decades of unfinished IT and security projects created the conditions for today&#8217;s AI risk.</p><p><strong>Governance Failures Are Systemic, Not Technical</strong><br>How leadership blind spots&#8212;not tooling&#8212;are driving AI governance gaps.</p><p><strong>Identity, Access, and Ownership in an AI World</strong><br>Why diffuse responsibility leads to no accountability when AI systems act at scale.</p><p><strong>The Future of Consulting and Verified Intelligence</strong><br>How AI is reshaping advisory work and exposing performative expertise.</p><p><strong>Career Strategy and Influence</strong><br>Insights from <em>Famous With 12 People</em> on building impact through depth, clarity, and relevance.</p><p><strong>Legacy and Leadership</strong><br>Richard&#8217;s reflections on service, contribution, and what comes next beyond titles and roles.</p><p><strong>Insightful Takeaways</strong></p><p><strong>AI rewards preparedness, not optimism.</strong><br>Attackers are using AI to move faster and more efficiently; organizations that fail to adapt governance and defenses will see the results in loss curves.</p><p><strong>Shadow AI is a leadership problem before it&#8217;s a technology problem.</strong><br>Uncontrolled AI use is the predictable outcome of years of tolerated sprawl and unfinished security work.</p><p><strong>Cutting people while attackers scale with AI is a dangerous asymmetry.</strong><br>AI augments those who use it strategically&#8212;and penalizes those who remove human judgment from critical systems.</p><p><strong>Governance must evolve from policy to ownership.</strong><br>When everyone owns identity, risk, or AI outcomes, accountability disappears.</p><p><strong>Impact comes from depth, not scale.</strong><br>Leadership, influence, and career growth are built by being meaningful to a few&#8212;not visible to everyone.</p><p><strong>Legacy is defined by service, not status.</strong><br>The most durable contribution comes from helping others move forward&#8212;especially in moments of uncertainty and change.</p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a0f731ae4cd31e148e3de408e&quot;,&quot;title&quot;:&quot;Two Birds, One Podcast: AI, Governance, and the Road Ahead&quot;,&quot;subtitle&quot;:&quot;Steve Tout&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/1kDaLzm4wxT7Y8SlVNcUcf&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/1kDaLzm4wxT7Y8SlVNcUcf" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><p>Quote of the show:</p><blockquote><p>&#8220;Has it been proven to you that you don&#8217;t suck at security?&#8221; &#8212;Richard Bird</p></blockquote><p>Links:</p><p>Richard Bird on LinkedIn: <a href="https://www.linkedin.com/in/rbird/">https://www.linkedin.com/in/rbird/ </a></p><p>Digital twins aren&#8217;t a concept&#8212;they&#8217;re already being used.<br>Try Richard Bird&#8217;s digital twin or learn how to create one for the marketplace at <strong><a href="https://www.identient.com">Identient.com</a></strong><a href="https://www.identient.com">.</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lN5_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lN5_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!lN5_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!lN5_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!lN5_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lN5_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2258365,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/181932575?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lN5_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!lN5_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!lN5_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!lN5_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2bb3e55-472e-44b2-b289-1f8646964975_1456x1048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Quiet Choices We’re Making with AI]]></title><description><![CDATA[How strategic AI choices influence leadership impact, clarity, and performance.]]></description><link>https://www.strategylayer.com/p/the-quiet-choices-were-making-with</link><guid isPermaLink="false">https://www.strategylayer.com/p/the-quiet-choices-were-making-with</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Mon, 15 Dec 2025 18:20:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZuLE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-audio-embed" data-component-name="AudioPlaceholder" data-attrs="{&quot;label&quot;:null,&quot;mediaUploadId&quot;:&quot;c9655243-bb1c-49aa-ab2e-0aa3c103f1cc&quot;,&quot;duration&quot;:640.86206,&quot;downloadable&quot;:false,&quot;isEditorNode&quot;:true}"></div><p>As the year comes to a close, many leaders are taking stock of what AI has changed inside their organizations. The gains are real. Work moves faster. Information is easier to digest. Communication feels smoother. For many teams, AI has become part of the daily rhythm of getting things done.</p><p>But beneath these visible improvements, something quieter and more consequential is happening. AI is beginning to shape how leaders see their organizations, how they interpret signals, and how they decide where to focus next. Those effects are harder to measure, but they will matter far more in the long run.</p><p>Earlier this year, MIT Sloan Review made the case that &#8220;philosophy is eating AI,&#8221; arguing that beneath the models and metrics, AI increasingly reflects how we define knowledge, reality, and purpose (MIT Sloan Review, 2025)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>. That framing may sound abstract, but the implication for leaders is very practical. AI systems inevitably reflect how we think the system works. Over time, they reinforce that view, whether it remains accurate or not.</p><p>This is why AI&#8217;s greatest impact will not be on output volume. It will be on leadership impact.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>AI Reflects How Leaders See the World</h2><p>AI does not start with data alone. It starts with choices about what data matters, which signals are trusted, and what outcomes are worth optimizing. Those choices are often implicit. They live inside models, dashboards, prompts, and workflows that feel neutral because they are technical.</p><p>Yet these systems shape what feels clear and what feels urgent. They influence which risks rise to the surface and which fade into the background. In subtle ways, they guide attention, and attention drives action.</p><p>When leaders say AI helps them &#8220;see the business more clearly,&#8221; that clarity is always relative to the assumptions encoded in the system. What gets measured is what gets discussed. What gets summarized is what gets remembered. What gets optimized is what gets rewarded.</p><p>None of this is malicious or careless. It is simply how systems work. Over time, AI becomes a reflection of how leaders understand the organization and what they believe is important.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZuLE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZuLE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ZuLE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ZuLE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ZuLE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZuLE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2926948,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/181698327?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZuLE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ZuLE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ZuLE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ZuLE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2c2e6ca-6b03-4fc6-b2c9-89e6de256a21_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">When the noise fades, the signal gets louder.</figcaption></figure></div><h2>Why Trust in AI Is Complicated, and Rightly So</h2><p>Given this dynamic, it should not be surprising that many organizations struggle with trust when it comes to AI. A recent Fast Company article noted that mistrust in AI is often well placed, especially when systems feel disconnected from the realities leaders care about most (Fast Company, 2025)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>. Trust does not come from transparency alone. It comes from alignment.</p><p>Leaders are right to be cautious when AI confidently produces answers without making clear which assumptions are driving those answers. When systems feel generic or detached from domain expertise, skepticism is a rational response.</p><p>Trust grows when AI is purpose-built, grounded in expertise, and designed to reflect the real tensions leaders face. In other words, when AI helps leaders reason better, not just faster.</p><h2>When Assumptions Begin to Compound</h2><p>The stakes rise as AI systems become more autonomous and self-reinforcing. Researchers and practitioners have begun to ask hard questions about what happens when AI increasingly trains itself, refining its behavior through feedback loops that may drift from original intent (The Guardian, 2025)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>.</p><p>From a leadership perspective, this is less about losing control and more about losing intentionality. Systems that continuously reinforce existing patterns can quietly lock in outdated assumptions. Decisions feel easier. Outputs feel confident. Meanwhile, misalignment grows harder to detect.</p><p>This is how complexity compounds. Not through sudden failure, but through small, accumulated shifts that go unnoticed because everything still appears to be working.</p><p>In these moments, AI functions as a mirror. It reflects how leaders believe the organization operates. Over time, it may reveal gaps between that belief and lived reality.</p><h2>Disagreement Is a Feature, Not a Bug</h2><p>One of the more interesting developments in AI this year has been the rise of multi-agent systems. As observers have noted, AI agents are increasingly interacting with one another, and they do not always agree (Wondering About AI, 2025)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a>. That disagreement can feel uncomfortable, especially in environments that prize alignment and consistency.</p><p>But disagreement is often where insight emerges.</p><p>Research on multi-agent debate shows that structured disagreement, particularly when identity signals are reduced or anonymized, can improve outcomes and reduce bias (Zhang et al., 2025)<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a>. In organizational terms, this mirrors what strong leadership teams already know. Healthy systems surface tension early. Weak systems suppress it until it becomes unavoidable.</p><p>AI that merely reinforces consensus may feel reassuring, but it rarely improves judgment. AI that surfaces competing perspectives, patterns, and tradeoffs helps leaders see the system more fully.</p><h2>From Productivity to Leadership Impact</h2><p>None of this diminishes the value of everyday AI use cases. Tools that summarize meetings, draft communications, and speed up analysis are genuinely useful. They reduce friction and free up time.</p><p>The difference is that productivity gains alone do not guarantee better leadership outcomes.</p><p>Leadership impact comes from making better decisions under complexity. It comes from seeing patterns before they become problems. It comes from distinguishing signal from noise and momentum from progress.</p><div class="pullquote"><p><strong>Generic AI accelerates activity; verified intelligence amplifies leadership.</strong></p></div><p>AI that improves leadership impact does not simply accelerate existing narratives. It helps leaders test them. It introduces productive tension. It highlights where confidence may be outrunning evidence.</p><p>This is where the strategic choice of which AI to deploy becomes critical. Generic tools optimize for convenience and volume. Purpose-built systems, grounded in verified intelligence, optimize for clarity and judgment. In short, Generic AI accelerates activity; verified intelligence amplifies leadership.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-quiet-choices-were-making-with?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-quiet-choices-were-making-with?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/the-quiet-choices-were-making-with?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Rethinking AI Governance</h2><p>These dynamics have important implications for AI governance. Much of today&#8217;s governance conversation focuses on guardrails, policies, and model risk. Those are necessary foundations. But they are not sufficient.</p><p>Effective AI governance must also protect leadership effectiveness over time. It must account for drift, compounding effects, and the way AI-informed decisions accumulate across the organization. Governance should help leaders understand not just what AI is allowed to do, but how it is shaping priorities, incentives, and attention.</p><p>When governance focuses only on deployment, it misses the harder question of impact. When it focuses only on control, it risks constraining learning.</p><p>Do you agree? </p><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/thestrategylayer/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;thestrategylayer&quot;,&quot;pub&quot;:{&quot;id&quot;:4536793,&quot;name&quot;:&quot;The Strategy Layer&quot;,&quot;author_name&quot;:&quot;Steve Tout&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yd1b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b6d5e43-40d4-4888-b269-ee71bfd89b89_716x716.jpeg&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div><p>The most effective governance frameworks treat AI as part of the leadership system itself. They emphasize evidence, feedback loops, and the ability to course-correct as conditions change.</p><h2>Verified Intelligence and Strategic Clarity</h2><p>This is where verified intelligence becomes a meaningful differentiator. Systems designed to observe trends over time, grounded in domain expertise, help leaders cut through complexity rather than add to it.</p><p>At Identient, this perspective informs how we approach AI-enabled analysis across identity and cybersecurity. Tools like <a href="https://www.identient.ai/demo/">SPI 360</a> focus on trend analysis across strategy, governance, people, and technology, helping leaders distinguish isolated issues from systemic patterns and short-term noise from meaningful change.</p><p>The goal is not more dashboards or more activity. It is clearer insight that supports better prioritization and more confident leadership decisions.</p><h2>Digital Models as Tools for Clarity</h2><p>Digital models and digital twins amplify both the promise and the risk of AI. By formalizing how an organization understands itself, they make assumptions visible. That visibility is powerful.</p><p>But models are not oracles. They do not eliminate uncertainty. They shape how uncertainty is perceived.</p><p>Used well, digital models help leaders see complexity more clearly and ask better questions. Used poorly, they can create a false sense of certainty that obscures emerging risks.</p><p>The difference lies in how intentionally they are designed and governed, and whether they are treated as tools for inquiry rather than answers in themselves.</p><h2>Choosing Leadership Impact Over Activity</h2><p>As leaders look ahead to the next planning cycle, the temptation will be to measure AI success by scale. More deployments. More use cases. More output.</p><p>A better measure is impact.</p><div class="pullquote"><p><strong>AI will either sharpen leadership impact or multiply activity without direction.</strong></p></div><p>AI will either sharpen leadership impact or multiply activity without direction. The difference lies in which intelligence leaders choose to deploy and which they choose not to.</p><p>The quiet choices made today about trust, assumptions, and governance will shape how leaders see their organizations tomorrow. In a world of increasing complexity, clarity is not a nice-to-have. It is the foundation of meaningful performance.</p><p>And that is where AI&#8217;s real value will be found.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-quiet-choices-were-making-with/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/the-quiet-choices-were-making-with/comments"><span>Leave a comment</span></a></p><h1>Footnotes</h1><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>MIT Sloan Management Review. (2025). <em>Philosophy eats AI.</em> <a href="https://sloanreview.mit.edu/article/philosophy-eats-ai/">https://sloanreview.mit.edu/article/philosophy-eats-ai/</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Fast Company. (2025). <em>Does your organization have trust issues with AI?</em> <a href="https://www.fastcompany.com/91446330/does-your-organization-have-trust-issues-with-ai">https://www.fastcompany.com/91446330/does-your-organization-have-trust-issues-with-ai</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>The Guardian. (2025, December 2). <em>Allowing AI to train itself: The biggest decision yet.</em> <a href="https://www.theguardian.com/technology/ng-interactive/2025/dec/02/jared-kaplan-artificial-intelligence-train-itself">https://www.theguardian.com/technology/ng-interactive/2025/dec/02/jared-kaplan-artificial-intelligence-train-itself</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Wondering About AI. (2025). <em>AI agents are talking to each other&#8230;and they don&#8217;t always agree.</em> </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:179301897,&quot;url&quot;:&quot;https://wonderingaboutai.substack.com/p/ai-agents-are-talking-to-each-otherand&quot;,&quot;publication_id&quot;:5597038,&quot;publication_name&quot;:&quot;Wondering About AI&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!B3X6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F721dac90-0e32-4c6d-a6bc-172d3fab26e6_1080x1080.png&quot;,&quot;title&quot;:&quot;AI agents are talking to each other...and they don't always agree&quot;,&quot;truncated_body_text&quot;:&quot;Disclosure: This post is based on the results of a topical analysis conducted in Future Scan, a trend discovery tool for AI/ML research. I wrote the initial draft, but used Claude Sonnet 4.5 to help me translate scientific jargon and (mostly) eradicate awkwardness.&quot;,&quot;date&quot;:&quot;2025-11-19T00:40:37.712Z&quot;,&quot;like_count&quot;:56,&quot;comment_count&quot;:26,&quot;bylines&quot;:[{&quot;id&quot;:363410124,&quot;name&quot;:&quot;Karen Spinner&quot;,&quot;handle&quot;:&quot;karenspinner1&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!kLy3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28ad1170-99e0-4cb6-8a1d-f4f60c4465ef_591x591.jpeg&quot;,&quot;bio&quot;:&quot;Writer, agency owner, and casual developer with mixed feelings about AI. Creator of Future Scan, a tool that spots trends in AI/ML research. &quot;,&quot;profile_set_up_at&quot;:&quot;2025-07-09T18:29:24.248Z&quot;,&quot;reader_installed_at&quot;:&quot;2025-07-11T00:10:13.073Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:5709228,&quot;user_id&quot;:363410124,&quot;publication_id&quot;:5597038,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:5597038,&quot;name&quot;:&quot;Wondering About AI&quot;,&quot;subdomain&quot;:&quot;wonderingaboutai&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Real-life experiments with AI plus insights based on the latest research. No hype zone.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/721dac90-0e32-4c6d-a6bc-172d3fab26e6_1080x1080.png&quot;,&quot;author_id&quot;:363410124,&quot;primary_user_id&quot;:363410124,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-07-09T18:32:47.601Z&quot;,&quot;email_from_name&quot;:&quot;Karen from Wondering About AI&quot;,&quot;copyright&quot;:&quot;Karen Spinner&quot;,&quot;founding_plan_name&quot;:&quot;Founding Member&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://wonderingaboutai.substack.com/p/ai-agents-are-talking-to-each-otherand?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!B3X6!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F721dac90-0e32-4c6d-a6bc-172d3fab26e6_1080x1080.png" loading="lazy"><span class="embedded-post-publication-name">Wondering About AI</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">AI agents are talking to each other...and they don't always agree</div></div><div class="embedded-post-body">Disclosure: This post is based on the results of a topical analysis conducted in Future Scan, a trend discovery tool for AI/ML research. I wrote the initial draft, but used Claude Sonnet 4.5 to help me translate scientific jargon and (mostly) eradicate awkwardness&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">6 months ago &#183; 56 likes &#183; 26 comments &#183; Karen Spinner</div></a></div></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Zhang, Y., et al. (2025). <em>Measuring and mitigating identity bias in multi-agent debate via anonymization.</em> arXiv. <a href="https://arxiv.org/abs/2510.07517">https://arxiv.org/abs/2510.07517</a></p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Running Toward Impact: Lessons In Leadership with Bill Kehoe]]></title><description><![CDATA[ashington State CIO Bill Kehoe discusses CIO-CISO partnership, cybersecurity accountability, digital equity, and modernizing government at scale.]]></description><link>https://www.strategylayer.com/p/running-toward-impact-lessons-in</link><guid isPermaLink="false">https://www.strategylayer.com/p/running-toward-impact-lessons-in</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Thu, 04 Dec 2025 00:33:48 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/180652639/4b26f14c51cd21cdfb91997faab2f5b7.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>The Strategy Layer Live</em>, Steve sits down with Bill Kehoe, Chief Information Officer for Washington State, for a rare in-person conversation that spans three decades of lessons from state, county, and local government. Bill reflects on the turning points that shaped his leadership&#8212;from transforming the DMV experience in the early 2000s, to consolidating IT at King County, to guiding Washington toward a more connected, equitable digital future.</p><p>He shares how running and coaching informed his approach to developing people, why modernization must be incremental and human-centered, and what it really looks like when a CIO steps fully into cybersecurity accountability alongside their CISO.</p><p>Bill&#8217;s insights offer a grounded, practical masterclass in leading with purpose, navigating complexity, and building public trust in the digital age.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div id="youtube2-zL15tYG_xnM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;zL15tYG_xnM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/zL15tYG_xnM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>Prefer to listen?</strong></p><p><a href="https://podcasts.apple.com/us/podcast/running-toward-impact-lessons-in-leadership-with-bill/id1785305825?i=1000739591743">Apple Podcasts</a></p><p><a href="https://open.spotify.com/episode/1jQfc0wh98XVMUmU0zm626?si=c007cc2ca7754d15">Spotify</a></p><h2>What We Cover in This Episode</h2><ul><li><p>Bill&#8217;s early path into public service and what has kept him committed for decades</p></li><li><p>The turning-point projects that shaped his leadership philosophy</p></li><li><p>Lessons from running and coaching &#8212; discipline, strategy, and individual development</p></li><li><p>The bold vision behind digital equity and the Resident Portal</p></li><li><p>Modernization without fear: incremental change, customer experience, and agile delivery</p></li><li><p>The Resident Portal Challenge and the future of procurement innovation</p></li><li><p>Multi-vendor collaboration and why competition can create better outcomes</p></li><li><p>The CIO&#8211;CISO partnership and shared responsibility for cybersecurity</p></li><li><p>Leading through complexity with calm, clarity, and trust</p></li><li><p>Bill&#8217;s reflections on legacy, public service, and the next generation of leaders</p></li><li><p>How AI is reshaping responsibility, decision-making, and efficiency in government</p></li></ul><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a71339cc0ca8aac19c41a9dd3&quot;,&quot;title&quot;:&quot;Running Toward Impact: Lessons In Leadership with Bill Kehoe&quot;,&quot;subtitle&quot;:&quot;Steve Tout&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/1jQfc0wh98XVMUmU0zm626&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/1jQfc0wh98XVMUmU0zm626" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><p>Quote of the Show:</p><ul><li><p>&#8220;<em>I&#8217;m the front lines for everything that happens &#8212; good or bad &#8212; and I consider myself accountable and responsible for everything that goes on in my agency and in technology in the state.</em>&#8221; - Bill Kehoe</p></li></ul><p>Links:</p><ul><li><p><a href="https://watech.wa.gov/">https://watech.wa.gov/</a></p></li><li><p><a href="https://www.linkedin.com/in/william-kehoe-a37a0714b/">https://www.linkedin.com/in/william-kehoe-a37a0714b/</a> </p></li></ul><p>#CybersecurityLeadership #CIO #CISOPartnership #GovernmentTechnology #PublicSectorLeadership #DigitalGovernment #StrategyLayerLive</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/running-toward-impact-lessons-in?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/running-toward-impact-lessons-in?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/running-toward-impact-lessons-in?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ERzY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ERzY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!ERzY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!ERzY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!ERzY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ERzY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6672666-b296-4882-b4b9-a66430dfee56_1200x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:835834,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/180652639?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ERzY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 424w, https://substackcdn.com/image/fetch/$s_!ERzY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 848w, https://substackcdn.com/image/fetch/$s_!ERzY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 1272w, https://substackcdn.com/image/fetch/$s_!ERzY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6672666-b296-4882-b4b9-a66430dfee56_1200x630.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The LLM Bubble Is Bursting — Provenance Will Define the Next Decade of AI]]></title><description><![CDATA[Smart leaders are shifting from black-box models to verifiable, expert-grounded intelligence.]]></description><link>https://www.strategylayer.com/p/the-llm-bubble-is-bursting-provenance</link><guid isPermaLink="false">https://www.strategylayer.com/p/the-llm-bubble-is-bursting-provenance</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Sun, 23 Nov 2025 17:28:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9AjY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the past two years, the hype around artificial intelligence has reached a fever pitch. Yet the signal cutting through the noise is becoming unmistakable: <strong>we are not in an AI bubble &#8212; we are in an LLM bubble</strong>. Even the CEO of Hugging Face said as much recently when discussing the overheated market dynamics around large models, compared to the broader field of AI innovation.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>That distinction matters for one simple reason: the future will not be defined by &#8220;bigger models.&#8221; It will be defined by <strong>transparent, verifiable, provenance-rich intelligence</strong> that leaders can trust &#8212; and defend.</p><p>This shift isn&#8217;t theoretical. It&#8217;s happening right now.<br>And the smartest public and private sector organizations are already aligning with it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9AjY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9AjY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9AjY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9AjY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9AjY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9AjY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1234465,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/179732700?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9AjY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9AjY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9AjY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9AjY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1afec594-df26-466f-914e-cbe31bdcc96e_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Trust isn&#8217;t built on outputs &#8212; it&#8217;s built on transparency. Credit: My GPT:)</figcaption></figure></div><h2><strong>Opaque Intelligence Is the Real Risk &#8212; Not AI Itself</strong></h2><p>I&#8217;ve spent years working across cybersecurity, IAM,  and now AI and verified intelligence. And one pattern is becoming clear: as organizations begin laying the foundations of their AI strategy, the choices they make in 2026 will have long-term consequences. Many are exploring GenAI and LLM tools without fully understanding the short- and long-term risks these systems can introduce to their P&amp;L, operational resilience, and decision quality.</p><p>This is the moment where leaders must decide whether to build on opaque, probabilistic tools&#8212;or on transparent, verifiable intelligence they can trust, audit, and defend. The organizations who pause to consider provenance, lineage, and accountability now will avoid painful redesign later and position themselves for durable, compounding productivity gains.</p><p>A human in the loop doesn&#8217;t fix this.<br>You can&#8217;t &#8220;review&#8221; what you can&#8217;t see.</p><p>If the system cannot show:</p><ul><li><p>Its reasoning path</p></li><li><p>Its underlying sources</p></li><li><p>Its version footprint</p></li><li><p>Its inference chain</p></li><li><p>Or whether it hallucinated</p></li></ul><p>&#8230;then you own the outcome but you <strong>don&#8217;t</strong> own the evidence.</p><p>Opaque AI becomes a governance liability.<br>And regulators are beginning to say so out loud.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-llm-bubble-is-bursting-provenance?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-llm-bubble-is-bursting-provenance?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/the-llm-bubble-is-bursting-provenance?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2><strong>The Regulatory Wave Has Begun &#8212; Transparency Is Becoming Law</strong></h2><p>A growing set of U.S. states are taking decisive steps toward transparency, documentation, and proof of AI influence.</p><h3><strong>Washington&#8217;s HB 1170 &#8212; A Major Leap Forward in Transparency</strong></h3><p>As I wrote in <em><a href="https://www.strategylayer.com/p/ai-transparency-20-why-washington">AI Transparency 2.0: Why Washington Must Go Beyond Deepfakes to Decision Provenance</a></em>, Washington State&#8217;s HB 1170 puts real stakes in the ground: citizens must be informed when AI influences decisions, and organizations must maintain records of how that intelligence was used.</p><p>This mirrors the same foundation seen in California&#8217;s early AI Transparency Act  &#8212; and signals where nationwide policy is headed.</p><h3><strong>Colorado&#8217;s SB 24-205 &#8212; The Strongest AI Governance Law to Date</strong></h3><p>Colorado&#8217;s SB 24-205, enacted in 2024, establishes mandatory risk assessments, notices, governance controls, and documentation requirements for &#8220;high-risk&#8221; AI systems.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><p>This is the most comprehensive state-level AI law in the country, and it&#8217;s already influencing other states&#8217; drafts.</p><h3><strong>Illinois HB 3773 &#8212; You Can&#8217;t Hide AI in Hiring Decisions</strong></h3><p>Illinois took a direct aim at algorithmic opacity by requiring disclosures and fairness documentation for any AI used in employment decisions starting in 2026.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> </p><p>Illinois&#8217; HB 3773 amends the state&#8217;s Human Rights Act to regulate the use of AI in employment decisions, prohibiting its use if it has a discriminatory effect based on protected classes and requiring employers to notify employees when AI is used in hiring, promotion, or other employment decisions. The law takes effect January 1, 2026, and also prohibits the use of zip codes as a proxy for protected classes in employment contexts.</p><p>The era of black-box algorithmic hiring is ending.</p><h3><strong>California&#8217;s AI Transparency Act &#8212; A Modern Benchmark for Disclosure</strong></h3><p>California&#8217;s new <strong>AI Transparency Act</strong><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> sets one of the clearest expectations in the country: organizations must disclose when AI is used in customer-facing or citizen-facing interactions, and they must maintain documentation that explains how automated decisions are generated. The Act goes beyond simple labeling&#8212;it requires organizations to preserve <strong>evidence of AI influence</strong>, enabling regulators and affected individuals to understand <em>how</em> and <em>why</em> an automated outcome occurred.</p><p>It signals a broader trend: transparency is no longer optional. It is fast becoming the baseline requirement for any organization deploying AI in high-impact contexts.</p><p>New York, Connecticut, and Massachusetts are following similar paths with draft frameworks focused on transparency and algorithmic accountability.</p><p>The direction is unified:</p><blockquote><p><strong>AI cannot be used for autonomous decision-making unless it operates with full transparency, provenance, and explainability.</strong></p></blockquote><p>This is no longer an abstract ethical debate.<br>It is becoming a regulatory and operational reality.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2><strong>There Is No AI Bubble &#8212; The LLM Bubble Is What&#8217;s Bursting</strong></h2><p>The market is now recognizing what many of us working on verified intelligence have known for years:</p><ul><li><p>The bigger the model, the bigger the opacity</p></li><li><p>The bigger the opacity, the bigger the liability</p></li><li><p>And the bigger the liability, the smaller the strategic value</p></li></ul><p>Look across industries: leaders are no longer asking &#8220;How do we get more AI?&#8221;<br>They&#8217;re asking:<br><strong>&#8220;How do we trust what we&#8217;re using?&#8221;</strong></p><p>Large language models aren&#8217;t dying &#8212; but their <strong>unverifiable</strong> use cases are.</p><p>As the Hugging Face CEO noted, the bubble is around LLMs specifically &#8212; not the broader field of AI innovation where transparency, interpretability, and provenance are core requirements.</p><p>That&#8217;s where the future is heading.<br>Quickly.</p><h2><strong>Verified Intelligence: What Comes After the LLM Bubble</strong></h2><p>I believe the next decade of AI will be defined by a new standard:</p><h3><strong>AI systems must be able to answer four questions with absolute clarity:</strong></h3><ol><li><p><em>Where did this intelligence come from?</em></p></li><li><p><em>Whose expertise, data, and boundaries informed it?</em></p></li><li><p><em>What reasoning steps produced the answer?</em></p></li><li><p><em>Can we recreate the decision and prove its integrity?</em></p></li></ol><p>Generic LLMs can answer none of these.<br>Verified intelligence systems can answer all of them.</p><p>This is why we built Identient&#8217;s marketplace around <strong>provenance, data lineage, identity-attached digital twins, and full auditability</strong>.<br>Because trust doesn&#8217;t come from bigger models &#8212; it comes from <strong>verifiable ones</strong>.</p><p>And it turns out that when you remove ambiguity, a second benefit emerges:</p><h3>The Strategic Advantage:</h3><p><strong>10X Faster Alignment With 1/10th the Effort</strong></p><p>Once you eliminate the ambiguity created by black-box systems, something remarkable happens:</p><ul><li><p>Alignment accelerates</p></li><li><p>Decision cycles shrink</p></li><li><p>Rework disappears</p></li><li><p>Shadow expertise consolidates</p></li><li><p>Dependency on expensive consultants is minimized</p></li><li><p>And the organization begins operating with shared clarity</p></li></ul><p>Verified intelligence doesn&#8217;t just reduce risk &#8212; it creates leverage.<br>It allows leaders to move faster because they can <strong>prove</strong> the integrity of their decisions.</p><p>This is what separates the companies that are merely adopting AI from those that will define the next decade.</p><h2>Next Steps</h2><p><strong>If you&#8217;re interested in provenance, lineage, and transparency &#8212; Let&#8217;s Talk</strong></p><p>At Identient, we love partnering with organizations who understand where the world is heading.<br>Companies building AI with:</p><ul><li><p>Traceability</p></li><li><p>Transparency</p></li><li><p>Verifiable expertise</p></li><li><p>Auditability</p></li><li><p>And human-owned intelligence</p></li></ul><p>Those are the leaders who will outperform the rest of the market &#8212; not because they &#8220;used more AI,&#8221; but because they used <strong>trusted AI</strong>.</p><p>If that&#8217;s you, let&#8217;s chat.<br>We&#8217;d love to build the future with you.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Lorang, K. (2025, November 18). <em>Hugging Face CEO says we&#8217;re in an &#8220;LLM bubble,&#8221; not an AI bubble.</em> TechCrunch. https://techcrunch.com/2025/11/18/hugging-face-ceo-says-were-in-an-llm-bubble-not-an-ai-bubble/</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Colorado General Assembly. (2024). <em>SB 24-205: Consumer Protections for Artificial Intelligence Systems. https://leg.colorado.gov/bills/sb24-205</em></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>State of Illinois. (2024). <em>HB 3773: Amendments to the Illinois Human Rights Act for AI in Employment Decisions. https://www.ilga.gov/Legislation/BillStatus?GAID=17&amp;DocNum=3773&amp;DocTypeID=HB&amp;LegId=0&amp;SessionID=112</em></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>California Office of the Governor. (2025, September 29). <em>Governor Newsom signs SB-53, advancing California&#8217;s world-leading artificial intelligence industry</em>. <a href="https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/">https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/</a></p></div></div>]]></content:encoded></item><item><title><![CDATA[AI Transparency 2.0: Why Washington Must Go Beyond Deepfakes to Decision Provenance]]></title><description><![CDATA[HB 1170 is a strong start&#8212;but the Digital Government Summit made clear that Washington needs transparency not just for synthetic media, but for the AI shaping public decisions.]]></description><link>https://www.strategylayer.com/p/ai-transparency-20-why-washington</link><guid isPermaLink="false">https://www.strategylayer.com/p/ai-transparency-20-why-washington</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 14 Nov 2025 07:50:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!s3pg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Washington&#8217;s <a href="https://app.leg.wa.gov/billsummary?BillNumber=1170&amp;Initiative=false&amp;Year=2025">HB 1170</a> is an important step forward. Like <a href="https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/">California&#8217;s AI Transparency Act</a>, it focuses on labeling AI-generated and AI-altered content, embedding latent disclosures, and providing public detection tools. These measures matter. As Tom Kemp <a href="https://www.tomkemp.ai/blog/2025/1/20/state-of-washington-looks-to-make-ai-more-transparent">has documented</a>, states that anchor AI policy in transparency, traceability, and consumer protection gain bipartisan traction and avoid unworkable or overbroad AI legislation.</p><p>But as I argued recently in <em><a href="https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive">AI is Cheap. Trust is Expensive.</a></em>, transparency for content is only half of the equation. What residents need is trust in the systems that inform decisions about them. And today&#8217;s <strong><a href="https://events.govtech.com/Washington-Digital-Government-Summit">Washington Digital Government Summit</a></strong> made that clearer than ever.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>AI in government is no longer primarily about generating images or text. It is augmenting decisions, routing cases, prioritizing inspections, assisting in contracting, and shaping how residents interact with the state. Deepfakes aren&#8217;t the only risk. Opaque intelligence is, too.</p><p>Washington now needs <strong>AI Transparency 2.0</strong>: a model that provides provenance not just for synthetic media, but for AI-assisted decisions.</p><h1><strong>What HB 1170 Gets Right</strong></h1><p>HB 1170 focuses on media transparency:</p><ul><li><p>Clear labeling of AI-generated or AI-altered content</p></li><li><p>Latent and manifest disclosures</p></li><li><p>Publicly accessible detection tools with APIs</p></li><li><p>Limits on retention of user-submitted content</p></li><li><p>Alignment with C2PA-style provenance principles and NIST AI RMF concepts of traceability</p></li></ul><p>This is the right foundation. Synthetic media harms are real. Election security, misinformation prevention, and public trust all benefit from strong provenance requirements.</p><p>But the bill only addresses <em>outputs</em> that look like media. It does not address AI systems used for <em>decision support</em>, which is where the public sector is already moving.</p><p>Today&#8217;s Summit demonstrated that gap clearly.</p><h1><strong>What Washington&#8217;s Leaders Said Today</strong></h1><p>At the <strong>Washington Digital Government Summit</strong>, three themes emerged across the closing panel on &#8220;AI Governance and Digital Equity in Washington Government.&#8221;</p><h2>Bill Kehoe, State CIO</h2><p><em>&#8220;AI innovation must be risk-averse and transparent.&#8221;</em><br>Kehoe emphasized strong data foundations, privacy, security, and clear disclosures. He highlighted the modern wa.gov resident portal as an example of how structured data and personalization can enhance services, while noting that transparency and opt-outs are mandatory for public trust.</p><h2>Jake Hammock, CISO, City of Seattle</h2><p><em>&#8220;Seattle is adopting human-centered AI with humans in the loop &#8212; not displacement, but augmentation.&#8221;</em><br>Seattle is hiring a City AI Officer and implementing its Responsible AI plan across public safety, permitting, and customer-service operations. Hammock stressed equity, accessibility, language translation, and correct labeling of AI outputs.</p><h2>Stephen Hurd, Acting CIO, King County</h2><p><em>&#8220;Generative AI for decision-making remains tricky &#8212; human oversight is essential.&#8221;</em><br>Hurd emphasized productivity and capacity gains, but made it clear: any decision that affects residents must retain human review. King County&#8217;s upcoming AI policy is grounded in oversight, transparency, and digital equity.</p><p>Across all three leaders, one message was consistent:<br><strong>Government needs innovation, but it must remain cautious, transparent, and accountable.</strong></p><p>That requires more than content labeling.<br>It requires <strong>decision provenance</strong>.</p><h1><strong>The Gap in HB 1170: Transparency for Media but Not Decisions</strong></h1><p>HB 1170 does not apply to:</p><ul><li><p>Case prioritization</p></li><li><p>Eligibility determination</p></li><li><p>Contract routing</p></li><li><p>Public safety triage</p></li><li><p>Fraud detection</p></li><li><p>Resource allocation</p></li><li><p>Workforce augmentation</p></li><li><p>Constituent-service recommendations</p></li></ul><p>None of these produce synthetic media.<br>All of them influence residents&#8217; lives.</p><p>As the National Conference of State Legislatures puts it, governments nationwide are expanding their use of AI to &#8220;improve efficiency, decision-making, and the delivery of government services.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> Today&#8217;s Summit speakers described the same reality in Washington.</p><p>We need transparency for more than images and content.<br>We need transparency for how AI contributes to decisions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WRK4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WRK4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!WRK4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!WRK4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!WRK4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WRK4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2096625,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/178864747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WRK4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!WRK4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!WRK4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!WRK4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee7c7d5-6390-498b-a4ce-05863189680c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Better decisions come from visible thinking, not black-box guesses. Credit: ChatGPT</figcaption></figure></div><h1><strong>A Three-Layer Provenance Model for Washington</strong></h1><p>Drawing from both HB 1170 and the guidance of Washington&#8217;s technology leaders, Washington can adopt a forward-looking model of AI provenance:</p><h2>1. Content Provenance</h2><p>This is the domain of HB 1170:<br>Labeling, watermarking, and detection of AI-generated or altered media.</p><h2>2. System Provenance</h2><p>Which model generated the output?<br>What version?<br>What training, tuning, and guardrails?<br>What data quality and risks were known?</p><p>This aligns with Kehoe&#8217;s emphasis on <strong>data foundations</strong>, Hammock&#8217;s focus on <strong>governance</strong>, and Hurd&#8217;s insistence on <strong>transparency</strong>.</p><h2>3. Decision Provenance</h2><p>When AI informs or influences a decision, residents deserve to know:</p><ul><li><p>Who or what made the recommendation</p></li><li><p>What signals, data, or models informed it</p></li><li><p>How the reasoning chain was constructed</p></li><li><p>Which human reviewed or approved it</p></li><li><p>What alternatives were considered</p></li></ul><p>This is where policy needs to evolve.<br>If content provenance protects residents from deception, <strong>decision provenance protects them from misgovernance, AI hallucinations, or worse</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s3pg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s3pg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!s3pg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!s3pg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!s3pg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s3pg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1833941,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/178864747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s3pg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!s3pg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!s3pg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!s3pg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89f66ff0-c8ba-4e30-a758-84680b232575_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Transparency is the difference between trusted AI and blind automation. Credit: ChatGPT</figcaption></figure></div><h1><strong>How Washington Can Lead Nationally</strong></h1><p>To build on HB 1170 and match the future of public-sector AI use, Washington policymakers can consider the following:</p><h2>1. Clarify provenance in legislative intent</h2><p>Acknowledge <strong>content</strong>, <strong>system</strong>, and <strong>decision</strong> provenance even if only the first is mandated today.</p><h2>2. Align with government-grade standards</h2><p>NIST AI RMF<br>NIST Data Lifecycle guidance<br>C2PA for content provenance<br>OCIO Policy 188 updates<br>Seattle&#8217;s Responsible AI Framework</p><h2>3. Require disclosures for AI-assisted decisions</h2><p>Not bans. Not burdens.<br>Just clear notification, human review, and documented reasoning.</p><h2>4. Support innovation funding</h2><p>Kehoe&#8217;s call for agile modernization funds is critical for safe experimentation.</p><h2>5. Encourage public-private collaboration</h2><p>Seattle and King County are building their own frameworks.<br>The state can accelerate their progress by providing structure without over-prescription.</p><p>Washington can become a national leader by expanding transparency from <strong>media</strong> to <strong>the decisions that shape public outcomes</strong>.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/ai-transparency-20-why-washington?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/ai-transparency-20-why-washington?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/ai-transparency-20-why-washington?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h1><strong>Toward Trusted Intelligence in Government</strong></h1><p>The conversations at the Summit revealed something important:<br>Public-sector leaders aren&#8217;t asking for more automation. They&#8217;re asking for <strong>clarity</strong>, <strong>consistency</strong>, and <strong>confidence</strong> in the intelligence they rely on.</p><p>They want to know who &#8212; or what &#8212; they&#8217;re listening to.<br>They want to understand why a recommendation was made.<br>They want a traceable line from advice to authentic expertise.</p><p>They want AI that behaves less like a black box and more like a <strong>trusted colleague</strong>.</p><p>This is where the next generation of AI will evolve: toward systems that don&#8217;t just generate content, but embody <strong>verifiable expertise</strong>, maintain <strong>consistent reasoning</strong>, and operate with <strong>provenance by design</strong>. Systems where the source of insight is clear, the chain-of-custody is intact, and decision-makers can see why a certain answer was produced.</p><p>Because ultimately, as I wrote in <em><a href="https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive">AI is Cheap. Trust is Expensive</a>.</em>, the future of AI isn&#8217;t about scaling intelligence &#8212; it&#8217;s about scaling <strong>trustworthy intelligence</strong>. And trust doesn&#8217;t come from speed or capacity. It comes from <strong>knowing what &#8212; and who &#8212; is behind the answers.</strong></p><h1><strong>Conclusion</strong></h1><p>HB 1170 is the right starting point.<br>Transparency for synthetic media is essential.</p><p>But today&#8217;s Washington Digital Government Summit made clear that the real frontier is <strong>AI-informed decisions</strong>, not just AI-generated images.</p><p>Washington has an opportunity to lead the nation by expanding transparency to <strong>content, systems, and decisions</strong> &#8212; building a governance model that supports innovation while protecting residents.</p><p>AI transparency must move past detecting deepfakes.<br>It must ensure <strong>accountability for the intelligence we rely on.</strong></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>National Conference of State Legislatures, &#8220;Artificial Intelligence in Government: The Federal and State Landscape,&#8221; 2024.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[AI Is Cheap. Trust Is Expensive.]]></title><description><![CDATA[Why the next wave of enterprise AI isn&#8217;t about generating more&#8212;it&#8217;s about generating what&#8217;s true.]]></description><link>https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive</link><guid isPermaLink="false">https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Sun, 09 Nov 2025 22:42:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XVD2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Generative AI is everywhere, and it&#8217;s getting cheaper by the day. But as models multiply and content floods every corner of the enterprise, one truth is becoming clear: intelligence may be abundant, but trust is scarce.</p><p>This piece explores why provenance, verified expertise, and digital twins will define the next decade of AI&#8212;and why organizations that ignore trust will pay for it twice.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>The Illusion of Cheap AI</strong></h2><p>Anyone can buy ChatGPT Plus for $20. But you can&#8217;t buy trust.</p><p>That&#8217;s the quiet truth behind today&#8217;s AI gold rush. Models get cheaper, faster, and more accessible by the month. Yet the leaders who can actually <em>trust</em> the intelligence they&#8217;re building their strategies on&#8212;that&#8217;s still a rare privilege.</p><p>We&#8217;ve entered an era where the price of information is plummeting, but the cost of certainty is rising.</p><p>The question is no longer <em>Can AI think?</em> It&#8217;s <em>Can we trust what it thinks for us?</em></p><p>Because while AI may help us go faster, it often sends us racing confidently in the wrong direction.</p><blockquote><p><strong>&#8220;You can&#8217;t automate trust&#8212;but you can model it.&#8221;</strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XVD2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XVD2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!XVD2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!XVD2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!XVD2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XVD2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1908144,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/178450427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XVD2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!XVD2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!XVD2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!XVD2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1ad641c-acfc-4826-b82a-71e0003a9210_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Everyone&#8217;s mining for intelligence. Few are minting trust.</figcaption></figure></div><h2><strong>The Problem with Cheap AI</strong></h2><p><em>Why &#8220;good enough&#8221; AI isn&#8217;t good enough for enterprise strategy.</em></p><p>Generative AI, for all its brilliance, is a master of mimicry. It&#8217;s a regurgitation engine&#8212;reshaping the web&#8217;s collective past into a polished, probabilistic reflection of the present. Ask it for a strategy, and it will give you the <em>average</em> of a thousand other strategies. Ask it for insight, and it will offer what sounds smart, not what <em>is</em> smart.</p><p>That&#8217;s fine for brainstorming. But it&#8217;s a liability for leadership.</p><p>When you rely on GenAI to solve strategic problems, you often become a <strong>context engineer</strong>&#8212;constantly rewriting prompts, rewording queries, and correcting hallucinations to chase precision that never quite arrives.</p><p>Meanwhile, hours disappear. Teams feel productive because words appear. But the signal-to-noise ratio drops. Leaders spend <strong>2&#8211;10x more time</strong> iterating on outputs that lead to dead ends&#8212;or worse, elegant nonsense.</p><p>And then there&#8217;s the hidden cost: <strong>AI laundering.</strong></p><p>Like money laundering, it&#8217;s the process of taking someone else&#8217;s intellectual capital, washing it through a model, and reissuing it as your own. Except this time, the currency being diluted isn&#8217;t cash&#8212;it&#8217;s <em>credibility.</em></p><p>Authenticity becomes a liability on your balance sheet. Original thinking erodes. And in a world now governed by emerging AI transparency laws&#8212;like California&#8217;s <strong>AI Transparency Act 2.0<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></strong>, which mandates provenance and labeling&#8212;what was once clever repurposing is becoming a compliance and reputation risk.</p><p>The bottom line: cheap AI produces expensive confusion.</p><blockquote><p><strong>&#8220;Generative AI creates content. Verified expertise creates conviction.&#8221;</strong></p></blockquote><h2><strong>The Trust Crisis in Enterprise AI</strong></h2><p><em>When everyone&#8217;s AI looks the same, trust becomes your competitive advantage.</em></p><p>Trust has always been the currency of business. But in an AI-saturated world, it&#8217;s becoming the <strong>exchange rate</strong> for strategy itself.</p><p>Yes, you can buy a $20 chatbot. But it won&#8217;t buy you executive alignment, investor confidence, or measurable impact on your P&amp;L.</p><p>At the enterprise level, the real question isn&#8217;t <em>&#8220;How do we use AI?&#8221;</em> but <em>&#8220;How do we trust what it tells us enough to act on it?&#8221;</em></p><p>Because <em>enterprise-scale trust</em>&#8212;the kind that drives seven- and eight-figure impact&#8212;requires more than model performance metrics. It requires <strong>verified expertise</strong>. A lineage of knowledge that can be traced, cited, and believed.</p><p>When AI outputs come from nowhere, trust goes nowhere.</p><p>That creates a new class of corporate risk: <strong>strategic opacity.</strong></p><p>Decisions built on synthetic knowledge&#8212;unverified, unattributed, context-free&#8212;create cracks in the foundation of leadership. You don&#8217;t just risk making bad calls; you risk eroding the confidence that fuels innovation.</p><p>When you can&#8217;t trace the origin of your insights, you&#8217;ve already lost control of the narrative.</p><blockquote><p><strong>&#8220;The real moat in AI isn&#8217;t data. It&#8217;s provenance.&#8221;</strong></p></blockquote><h2><strong>Leadership Without Trust Is Just Noise</strong></h2><p><em>Why the C-suite alignment problem is human, not technical.</em></p><p>Getting the C-suite on the same page has never been easy. Ego, politics, and miscommunication quietly drain millions in strategic waste every quarter. The most brilliant minds in the room often talk past each other, armed with their own truths.</p><p>And while AI was supposed to fix this, it often amplifies it.</p><p>When every executive can generate their own &#8220;strategic analysis&#8221; from a model trained on the internet, alignment doesn&#8217;t improve&#8212;it fractures. Each leader arrives armed with a different AI narrative, polished by different prompts, reflecting different biases.</p><p>You can&#8217;t automate alignment.</p><p>You have to build it&#8212;through trust, shared context, and a common source of truth.</p><p>That&#8217;s where <strong>verified digital twins</strong> enter the picture. Not fictional avatars, but faithful digital representations of executives, domain experts, and peer networks&#8212;trained on verified expertise, not scraped data.</p><p>These twins don&#8217;t replace leaders; they <em>reflect</em> them. They create a space where collaboration can happen without ego, where ideas can be tested, refined, and aligned before they ever reach production.</p><p>Imagine your leadership team rehearsing decisions with their digital counterparts&#8212;testing scenarios, surfacing blind spots, and converging on clarity without the friction of personality or politics.</p><p>That&#8217;s not science fiction. It&#8217;s a new kind of organizational psychology powered by verified intelligence.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0qUg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0qUg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0qUg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0qUg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0qUg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0qUg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1943156,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/178450427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0qUg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0qUg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0qUg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0qUg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bbf493d-a2e3-41d4-ab71-5ad67f157770_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Somewhere between the human and the algorithm lies the truth about leadership in the age of AI.</figcaption></figure></div><h2><strong>From Generative to Verified</strong></h2><p><em>The rise of digital twins and the return of provenance.</em></p><p>The next era of AI isn&#8217;t about <em>generating</em> more content. It&#8217;s about <em>verifying</em> the intelligence that drives decisions.</p><p><strong>Large Language Models (LLMs)</strong> are broad but shallow&#8212;they know something about everything, but not enough about <em>you.</em><br><strong>Small Language Models (SLMs)</strong>&#8212;trained on specific, verified data&#8212;are the inverse. They know less, but what they know is <em>true, trusted, and contextual.</em></p><p>It&#8217;s the difference between reading Wikipedia and calling a mentor who&#8217;s been there.</p><p>Verified digital twins combine these SLMs with authenticated sources of expertise&#8212;creating a chain of provenance from <em>human knowledge &#8594; verified data &#8594; explainable output.</em></p><p>This mirrors what&#8217;s happened in supply chains, finance, and media: <strong>provenance is the new quality.</strong></p><p>For organizations, this is more than technical evolution. It&#8217;s philosophical.</p><p>When you can <em>trust your intelligence</em>, you no longer need to over-engineer control. You can move faster with less oversight because the system itself embeds integrity.</p><p>That&#8217;s what it means to <strong>execute 10x faster with 1/10th the effort.</strong></p><p>Speed doesn&#8217;t come from automation&#8212;it comes from alignment.<br>And alignment starts with trust.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/ai-is-cheap-trust-is-expensive?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2><strong>The Real Cost of Trust</strong></h2><p><em>Now is the time to put trust back at the center of AI.</em></p><p>AI is cheap. Trust is expensive.</p><p>But if you think trust is expensive, try operating without it.</p><p>The cost shows up in misaligned strategy meetings, delayed decisions, duplicated work, and stalled innovation. It&#8217;s the silent tax of distrust&#8212;paid daily by organizations that confuse speed with progress.</p><p>The companies that will win the next decade aren&#8217;t the ones deploying the most AI. They&#8217;re the ones deploying the most <strong>trusted intelligence</strong>&#8212;systems that integrate verified expertise, ethical provenance, and transparent reasoning.</p><p>Trust is not a soft concept. It&#8217;s a hard asset. It determines whether a CISO can sign off on a risk model, whether a CEO can act on a market signal, whether an investor believes your AI has defensible value.</p><p>As California&#8217;s AI Transparency Act signals, the market is demanding proof, not promises.</p><p>And that&#8217;s where the opportunity lies.</p><p>The leaders who invest now in verified digital twins&#8212;who create AI systems rooted in authenticity, attribution, and trust&#8212;won&#8217;t just comply with the future. They&#8217;ll <em>define</em> it.</p><p>Because the next phase of AI isn&#8217;t about bigger models. It&#8217;s about <strong>better mirrors</strong>&#8212;digital counterparts that reflect what&#8217;s real, credible, and uniquely yours.</p><p>The question isn&#8217;t whether you&#8217;ll build one.<br>The question is <em>when.</em></p><h3><strong>Final Reflection</strong></h3><p>AI is no longer the differentiator. Everyone has it.<br>What will separate tomorrow&#8217;s market leaders is whether anyone believes what <em>their</em> AI says.</p><p>The companies that invest in verified expertise, transparency, and trust won&#8217;t just build better technology&#8212;they&#8217;ll build the credibility to lead.</p><p>And in a world where everyone&#8217;s shouting through machines, credibility might just be the last human advantage.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Governor of California. (2025, September 29). <em>Governor Newsom signs SB 53, advancing California&#8217;s world-leading artificial intelligence industry</em>. <a href="https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/">https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/</a> (<a href="https://www.gov.ca.gov/2025/09/29/governor-newsom-signs-sb-53-advancing-californias-world-leading-artificial-intelligence-industry/">gov.ca.gov</a>)</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[The Two Faces of ROI]]></title><description><![CDATA[ROI lives in two worlds: the forecast and the proof. The best leaders use it to price the future&#8212;and verify it over time.]]></description><link>https://www.strategylayer.com/p/the-two-faces-of-roi</link><guid isPermaLink="false">https://www.strategylayer.com/p/the-two-faces-of-roi</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Mon, 27 Oct 2025 19:59:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ij4F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few weeks ago, I wrote <em><a href="https://www.strategylayer.com/p/playing-a-winnable-game-why-cybersecurity">Playing a Winnable Game: Why Cybersecurity Leaders Must Master Strategic Finance</a> </em>&#8212; about treating cybersecurity as capital allocation, not cost control. It&#8217;s a good primer for what I&#8217;m seeing surface again right now.</p><p>As we head into <strong>budget planning season</strong> for the next calendar year, one theme keeps showing up in every conversation: <strong>ROI</strong>.</p><p>Executives love certainty. Boards demand it. Vendors try to simulate it.<br>And somewhere in that tension lives the great illusion of modern enterprise finance&#8212;the illusion of <em>pre-proven ROI</em>.</p><p>ROI isn&#8217;t an oracle. It&#8217;s a model. It doesn&#8217;t predict the future; it helps you price it.<br>And in that sense, it functions much like <strong>Net Present Value (NPV)</strong> or the <strong>time value of money</strong>: both are forecasts that rely on real data, reasonable assumptions, and continuous refinement.</p><p>When leaders expect &#8220;proven ROI&#8221; before an engagement begins, what they&#8217;re really asking for is a <strong>forecast without inputs</strong>.<br>That&#8217;s not rigor&#8212;it&#8217;s wishful thinking dressed as discipline.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>ROI as Forecast, Not Faith</h2><p>ROI forecasting is not a sales tactic; it&#8217;s a <strong>financial instrument</strong>.<br>In finance, investors don&#8217;t demand proof of return before deploying capital. They model <strong>expected return</strong> using known variables: capital costs, cash flows, discount rates, and risk-adjusted assumptions.</p><p>Cybersecurity investments should be treated the same way.<br>Potential ROI is calculated through <strong>financial modeling</strong>, not conjecture. The process applies economic principles to project the <em>present value of future benefits</em> relative to the <em>present value of future costs.</em></p><p>The key distinction is that ROI modeling is <strong>forecastable</strong>, not <strong>hypothetical</strong>.<br>It&#8217;s a legitimate form of decision analysis that provides directional confidence&#8212;not false precision.</p><h2>The Discipline of Cost-Benefit Analysis</h2><p>A well-constructed <strong>Cost-Benefit Analysis (CBA)</strong> is the backbone of ROI modeling.<br>It&#8217;s not about storytelling&#8212;it&#8217;s an <em>exercise in economics.</em></p><p>The data required isn&#8217;t secret; it&#8217;s just often unavailable to external partners. It includes:</p><ul><li><p>Capital costs</p></li><li><p>Operational costs</p></li><li><p>Cost reductions</p></li><li><p>Reduction of manual effort</p></li><li><p>Efficiency gains</p></li><li><p>Financial impact on the P&amp;L</p></li></ul><p>Each of these inputs connects directly to real financial systems&#8212;your ledger, your labor data, your operational reports. Without those inputs, external ROI projections are like calculating NPV with blank cells.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WIH7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WIH7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!WIH7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!WIH7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!WIH7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WIH7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:99938,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/177303365?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WIH7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!WIH7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!WIH7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!WIH7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F215e9d33-78db-4ed7-afef-8a150a99f3e0_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cost-benefit analysis isn&#8217;t hypothetical&#8212;it&#8217;s applied economics. When modeled with real data, everything becomes measurable: time, money, and efficiency.</figcaption></figure></div><p>As shown in the example:</p><p>Alternative Total Costs Total Benefits Benefit-Cost Ratio A $100,000 $120,000 1.20 B $150,000 $190,000 <strong>1.27</strong> C $200,000 $230,000 1.15</p><p>The <strong>Benefit-Cost Ratio (BCR)</strong> is calculated as:</p><p><strong>BCR = &#931; Present Value of Total Future Benefits / &#931; Present Value of Total Future Costs</strong></p><p>A ratio above 1.0 means benefits outweigh costs; the higher the number, the greater the return on investment.<br>But the value of the analysis isn&#8217;t in the number&#8212;it&#8217;s in the <em>inputs</em>.</p><p>Everything in cost-benefit analysis is measurable, but nothing is meaningful until the data reflects the realities of your environment.</p><h2>The Time Value of Money: ROI&#8217;s Silent Variable</h2><p>Every executive understands the <strong>time value of money</strong>&#8212;a dollar today is worth more than a dollar next year.<br>But in cybersecurity and operations, this truth is often forgotten.</p><p>When projects stall in pursuit of pre-proven ROI, the organization quietly accrues what economists call the <strong>Cost of Delay</strong>.<br>Security risks persist. Operational inefficiencies linger. Opportunity costs compound.</p><p>Time is a variable in every ROI equation.<br>Real ROI, therefore, is a function of <strong>time, money, and resources</strong>&#8212;not just savings. It recognizes that the longer a system remains inefficient, the smaller the present value of future benefits becomes.</p><p>Waiting for proof before acting is, in financial terms, a <strong>negative-yield strategy</strong>.</p><h2>Forecasting with Real Data</h2><p>To transform ROI from abstraction into strategy, organizations must model it like they would any other investment&#8212;using financial data grounded in reality.</p><p>The process typically includes:</p><ol><li><p><strong>Establishing Baselines</strong> &#8211; Gather financial and operational metrics that describe the current state: time spent, headcount, system costs, and performance indicators.</p></li><li><p><strong>Modeling Scenarios</strong> &#8211; Use those baselines to model potential future states under different investment scenarios.</p></li><li><p><strong>Applying Discount Rates</strong> &#8211; Adjust for the time value of money to calculate the present value of future benefits.</p></li><li><p><strong>Analyzing Sensitivity</strong> &#8211; Identify which variables most affect outcomes; this drives smarter decisions and better risk management.</p></li></ol><p>This process isn&#8217;t theoretical&#8212;it&#8217;s how mature organizations make capital budgeting decisions every day.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ij4F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ij4F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Ij4F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Ij4F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Ij4F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ij4F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1874033,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/177303365?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ij4F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Ij4F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Ij4F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Ij4F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87916996-eae5-42bb-be6d-36bc436b70c5_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Where foresight meets evidence &#8212; the moment ROI transforms from modeled potential to measurable impact.</figcaption></figure></div><h2>ROI as a Strategic Instrument</h2><p>Once leaders accept that ROI is forecastable, not provable, the question shifts from &#8220;What&#8217;s the number?&#8221; to &#8220;What&#8217;s the <em>model</em>?&#8221;</p><p>A credible ROI model is a <em>strategic instrument</em> for prioritization. It helps leaders allocate capital across competing priorities based on expected value creation, not gut feel.</p><p>For example:</p><ul><li><p>An IAM modernization initiative might reduce operational cost and incident response time, improving both financial efficiency and enterprise resilience.</p></li><li><p>A workflow automation platform might reduce manual effort, reallocating skilled labor to higher-value work.</p></li><li><p>A governance dashboard might shorten reporting cycles, directly improving decision velocity and cost of coordination.</p></li></ul><p>In each case, ROI isn&#8217;t <em>proven</em> in advance&#8212;it&#8217;s <strong>priced</strong> in advance and <strong>measured</strong> afterward.<br>That&#8217;s the discipline of real finance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JoT4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JoT4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 424w, https://substackcdn.com/image/fetch/$s_!JoT4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 848w, https://substackcdn.com/image/fetch/$s_!JoT4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 1272w, https://substackcdn.com/image/fetch/$s_!JoT4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JoT4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png" width="1456" height="717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:717,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:352576,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/177303365?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JoT4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 424w, https://substackcdn.com/image/fetch/$s_!JoT4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 848w, https://substackcdn.com/image/fetch/$s_!JoT4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 1272w, https://substackcdn.com/image/fetch/$s_!JoT4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85cc1fc6-c9d0-46e3-86ae-3f90794ff152_3023x1489.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Board Reporting Kit &#8211; Premium (Strategic Multiplier Tools): Modeling efficiency, trade-offs, and the real cost of delay to reveal ROI in motion. (Click to enlarge)</figcaption></figure></div><h2>The Misunderstanding of &#8220;Proof&#8221;</h2><p>Executives sometimes conflate <strong>forecasting</strong> with <strong>guaranteeing</strong>, but they&#8217;re fundamentally different.</p><p>Forecasting acknowledges uncertainty and quantifies it.<br>Guaranteeing denies it.</p><p>Demanding proof of ROI before engagement collapses the learning cycle that real innovation depends on.<br>The goal isn&#8217;t to eliminate uncertainty&#8212;it&#8217;s to make uncertainty <em>investable</em>.</p><p>That&#8217;s what separates a <strong>finance function</strong> from a <strong>procurement function.</strong></p><p>Finance models potential return across a time horizon, adjusting for risk and delay.<br>Procurement demands certainty in a system that, by design, never offers it.</p><p>The strategic leader understands that you can&#8217;t measure ROI before you create the conditions for it to exist.</p><h2>The Benefit of Shared Measurement</h2><p>When both sides&#8212;provider and customer&#8212;commit to shared data, baselines, and transparency, ROI becomes not a point of contention but a <strong>system of continuous learning.</strong></p><p>That&#8217;s why at Identient, our Strategic Performance Intelligence (SPI 360) framework builds ROI tracking into the engagement itself.<br>We don&#8217;t claim hypothetical returns. We create the environment to <strong>measure</strong> them&#8212;continuously, in real time.</p><p>This allows leadership teams to track <strong>Benefit-Cost Ratios</strong> dynamically, as projects mature and efficiency gains are realized. It replaces &#8220;proof&#8221; with <em>visibility</em>.</p><h2>Beyond ROI: Real Options and Adaptive Value</h2><p>Sophisticated financial modeling doesn&#8217;t stop at ROI or NPV&#8212;it extends into <strong>real options analysis</strong>, a method for valuing flexibility under uncertainty.</p><p>In cybersecurity, every investment creates <em>future optionality</em>&#8212;the ability to pivot faster, integrate more effectively, or scale without friction.<br>These are tangible financial benefits, even if they&#8217;re not reflected on a quarterly report.</p><p>Real options thinking transforms ROI from a static retrospective metric into a <strong>strategic forecast of adaptability</strong>.<br>It asks: &#8220;What is the value of keeping our options open?&#8221;<br>That&#8217;s a far more powerful question than, &#8220;What&#8217;s the ROI today?&#8221;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>From Reporting to Strategy</h2><p>When ROI is treated as proof, it becomes a rearview mirror.<br>When it&#8217;s treated as a forecast, it becomes a steering wheel.</p><p>Executives who understand this use ROI to inform <em>where to steer next</em>, not to justify where they&#8217;ve been.</p><p>This is where cybersecurity leaders can elevate their role&#8212;from cost managers to strategic investors in enterprise resilience.<br>By adopting cost-benefit analysis, time-value modeling, and real options frameworks, they move beyond budget defense into capital strategy.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-two-faces-of-roi?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/the-two-faces-of-roi?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/the-two-faces-of-roi?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Closing Thought</h2><p>ROI isn&#8217;t something to <em>prove</em>; it&#8217;s something to <em>build</em>.</p><p>The discipline lies not in the pitch deck or the spreadsheet, but in the partnership that enables access to real data, shared baselines, and measurable outcomes over time.</p><p>In finance, as in cybersecurity, the most valuable returns compound quietly&#8212;through systems that learn, models that evolve, and leaders who understand that proving value starts by creating the conditions for it.</p><p><strong>Closing Call to Action:</strong><br>If you found this valuable and want to go deeper into how leaders make ROI real&#8212;balancing foresight, proof, and strategic execution&#8212;pick up my book, <em><a href="https://www.stevetout.com/book/">The CISO on the Razor&#8217;s Edge</a></em>, available now on <strong>Amazon</strong> and <strong>Barnes &amp; Noble</strong>.</p><p>If you&#8217;ve already purchased the book and want the companion<strong> Guide to Building a Business Case</strong>, just message me with a copy of your receipt&#8212;I&#8217;ll send you a private link to access it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.stevetout.com/book/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b4yO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 424w, https://substackcdn.com/image/fetch/$s_!b4yO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 848w, https://substackcdn.com/image/fetch/$s_!b4yO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 1272w, https://substackcdn.com/image/fetch/$s_!b4yO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b4yO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png" width="466" height="742.2074175824176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2319,&quot;width&quot;:1456,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:2281043,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.stevetout.com/book/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/177303365?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b4yO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 424w, https://substackcdn.com/image/fetch/$s_!b4yO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 848w, https://substackcdn.com/image/fetch/$s_!b4yO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 1272w, https://substackcdn.com/image/fetch/$s_!b4yO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b39ca5e-b708-4855-be8d-82b423ea42bb_1554x2475.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">From forecasting value to proving it&#8212;this is the playbook for CISOs leading on the razor&#8217;s edge.</figcaption></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[When Growth Becomes the Enemy: The Neuroscience of Change Fatigue]]></title><description><![CDATA[Why &#8220;more, faster, now&#8221; backfires&#8212;and how next-gen leaders recalibrate for sustainable performance.]]></description><link>https://www.strategylayer.com/p/when-growth-becomes-the-enemy-the</link><guid isPermaLink="false">https://www.strategylayer.com/p/when-growth-becomes-the-enemy-the</guid><dc:creator><![CDATA[Nicolette Sulaiman]]></dc:creator><pubDate>Sat, 04 Oct 2025 18:16:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QZL-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I invited my friend and colleague <strong>Nicolette Sulaiman</strong> to write a guest post for <em>The Strategy Layer</em> because her work in change management and adult learning gets to the heart of what drives real transformation &#8212; people. You can&#8217;t build performance or resilience without understanding and managing the human element.</p><p>I love how she connects neuroscience, learning, and leadership in this piece. I hope you enjoy it as much as I did &#8212; and be sure to <strong>follow her on LinkedIn</strong> (links below).</p><p>&#8212; <em>Steve</em></p><div><hr></div><p>In the Fall of 2019, the supply chain and logistics firm I&#8217;d worked at adopted a new proprietary system across the entire worldwide firm. Fast-forward to Spring of 2020 and I&#8217;m a subject matter expert converting my branch to the new system; designing and delivering trainings to enable learning of the new system, skill development and behavioral change. While determining what level of support and guidance each member of my branch required to successfully adopt the new system, I considered factors like exposure to the system, length of tenure and each employee&#8217;s duty to their book of business. I considered the employee&#8217;s relationship to the <em>business</em>. Hindsight is 2020, so in retrospect I would have considered the sheer impact of change&#8212;not just on the functional or emotional capacities of my colleagues&#8212;but the physiological impact that change has on the brain and our learning capabilities.</p><p>At this year&#8217;s Association of Chang Management Professionals (ACMP) Chicago conference co-author of <em>Neuroscience for Change at Work</em>, Tibisay Vera, introduced many of us to a neural experience called maladaptive plasticity. <strong>It&#8217;s the phenomenon of our brains&#8217; protective adaptation to constant change which left unsupported can show up as burnout, cynicism, withdrawal, disengagement and resistance to the change at hand.</strong> Vera presented on the PEPE model, a supportive framework for handling change that considers the natural reactions of our brains under transition duress. Woven throughout Vera&#8217;s PEPE methodology is not just an understanding but an acceptance of our natural brain functionality under change. Understanding maladaptive plasticity and its symptoms is paramount for change practitioners&#8212;particularly adult learning enablers.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QZL-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QZL-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 424w, https://substackcdn.com/image/fetch/$s_!QZL-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 848w, https://substackcdn.com/image/fetch/$s_!QZL-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 1272w, https://substackcdn.com/image/fetch/$s_!QZL-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QZL-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png" width="947" height="870" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6804ce33-e484-4149-af37-056a5860256e_947x870.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:870,&quot;width&quot;:947,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1374732,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/175284463?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QZL-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 424w, https://substackcdn.com/image/fetch/$s_!QZL-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 848w, https://substackcdn.com/image/fetch/$s_!QZL-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 1272w, https://substackcdn.com/image/fetch/$s_!QZL-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6804ce33-e484-4149-af37-056a5860256e_947x870.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>The Adaptive Mind: Where Human Limits Meet System Intelligence (credit: my GPT:)</em></figcaption></figure></div><p>Learning a new skill or behavior is one of the most vulnerable experiences consistent across all of humanity. I&#8217;m not sure if there&#8217;s a person reading this that hasn&#8217;t felt the anxiety of absorbing new information&#8212;the hesitancy in one&#8217;s mind and body that manifests as mental rigidity and physical stiffness as we practice new ways of thinking and new movements. <strong>As a change practitioner, think critically about the pressure of change on top of the vulnerability of learning</strong>. Think about the symptoms of burnout, cynicism, withdrawal and consider the sheer amount of might and dedication a learner must apply to absorb new information despite their disengagement.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Last year, the Society for Human Resource Management (SHRM) reported that <strong><a href="https://www.shrm.org/topics-tools/news/inclusion-diversity/burnout-shrm-research-2024">44% percent</a> of their 1000+ surveyed American employees are experiencing burnout. </strong>SHRM cited that workers experiencing burnout are three times more likely to be actively job searching and are significantly less likely to go above and beyond in the role where they&#8217;re experiencing the burnout symptoms. The repulsion from the environment that causes symptoms of maladaptive plasticity on top of the drive toward relief is enough to stifle any business&#8217; growth and innovation. The insight that burnout is nearly half the workforce&#8217;s experience should be enough to alarm any executive leader into action. Afterall, organizations&#8217; greatest assets are its people. Time and time again, I&#8217;ve heard <em>and said</em> that change management focuses on the people side of innovation. If we don&#8217;t consider the whole human, <em>we are not doing our jobs</em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PK-7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PK-7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PK-7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PK-7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PK-7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PK-7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg" width="1254" height="836" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:836,&quot;width&quot;:1254,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:561217,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/175284463?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PK-7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PK-7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PK-7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PK-7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0496a99-3fd1-41ac-bb52-677538044248_1254x836.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">When the system supports the human, performance becomes natural.</figcaption></figure></div><p>Here&#8217;s what it looks like to lead learning while considering maladaptive plasticity through a transition:</p><ul><li><p>Breaks in lessons are not spared.</p></li><li><p>Self-care during the transition, such as taking breaks for walks, are required and taken into consideration of employee performance.</p></li><li><p>Methodologies that incorporate support for individuals with ADHD, Autism, chronic anxiety and other neurodivergent experiences.</p></li></ul><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/when-growth-becomes-the-enemy-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/p/when-growth-becomes-the-enemy-the?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/p/when-growth-becomes-the-enemy-the?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p>As a change practitioner, adult learning enabler, and, at my core, a person who learns differently, I think about accessibility of education through transitions. I apply a plethora of tactics to engage various learners and learning styles at once. My goals are simple: to be successful in the full realization of the benefits of the change. <strong>When we consider the impact of transitions on the brain and imbed specific support into lesson planning and strategic behavioral change, we approach learning enablement with equity.</strong> This is critical. It shouldn&#8217;t be an option to leave behind folks who are experiencing maladaptive plasticity or who learn differently. After all, that would be a willing submission to a subpar return on change investment. That simply won&#8217;t do.</p><p>Learning enablement isn&#8217;t whole without equity. We facilitate an equitable learning experience by:</p><ul><li><p>Assessing how enterprise transitions uniquely impact various job functions.</p></li><li><p>Monitoring the symptoms of maladaptive plasticity in people and implementing symptom alleviation strategies.</p></li></ul><div class="pullquote"><p>As change practitioners and adult learning enablers, we must consider the whole human both internally (neurologically) and externally (how they experience the world.) </p></div><p>As change practitioners and adult learning enablers, we must consider the whole human both internally (neurologically) and externally (how they experience the world.) This is how we approach learning enablement with equity in mind under the stress of ever-present change. In a world where change is rapidly increasing; where unlimited growth is pined after and ultimately unsustainable, we need to take care of one another. As business leaders and chief executives, the holistic wellness of your business&#8217; greatest asset (its people) cannot be overstated. Failure to administer preventative burnout care is an acceptance of subpar returns on innovations investments. Secure your investments by:</p><ul><li><p>Factoring in maladaptive plasticity to enterprise change return and adoption rates</p></li><li><p>Level-setting shareholders&#8217; expectations of investment returns considering the statistical facts of neurological impact of change on the brain</p></li></ul><h2>Resources</h2><p><em>Are you ready to envision a growth strategy that not only accepts but makes the most of the human condition?</em></p><p>Learn more about maladaptive plasticity and the <a href="https://pepeneuroscience.com/about/">PEPE model</a>.</p><p>Learn more about <a href="https://www.linkedin.com/in/tibisayvera/">Tibisay Vera, MBA, MSc</a>.</p><p>See the SHRM article <a href="https://www.shrm.org/topics-tools/news/inclusion-diversity/burnout-shrm-research-2024">Here&#8217;s How Bad Burnout Has Become at Work</a>.</p><h2>About Nicolette</h2><p>Tomilola &#8220;Nic&#8221; Sulaiman is a Prosci Certified Change Practitioner that hails from Houston, TX who has spent the last eight years living and working in Chicago, IL. Nic earned her stripes doing change work across both public and private industries such as Mergers + Acquisitions, ERP implementations, Health Care IT, Financial Technology, Supply Chain/3PL Freight forwarding, and Food + Beverage. She&#8217;s cut her teeth as a change manager, adult learning enabler and communications strategist embedding diversity, equity and inclusion practices in her delivery. Nic is an active member of her small midwestern community, lover and proprietor of local art, and champion of radical self-love and community care.</p><p>Follow Nic on LinkedIn <a href="https://www.linkedin.com/in/tnsulaimanhr/">HERE</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V59W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V59W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!V59W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!V59W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!V59W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V59W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg" width="290" height="386.6666666666667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:480,&quot;resizeWidth&quot;:290,&quot;bytes&quot;:70426,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/175284463?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!V59W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!V59W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!V59W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!V59W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b390186-c20e-44e4-92c1-109e6a5e8a9a_640x480.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Nicolette Sulaiman</figcaption></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[AI Will Not Run IAM for You]]></title><description><![CDATA[Why Faster Answers Don&#8217;t Equal Better Outcomes in IAM]]></description><link>https://www.strategylayer.com/p/ai-will-not-run-iam-for-you</link><guid isPermaLink="false">https://www.strategylayer.com/p/ai-will-not-run-iam-for-you</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Sun, 28 Sep 2025 21:26:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bwLu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Identity and Access Management is not a side project. It is the connective tissue of digital business. When it works, customers log in, employees collaborate, and revenue flows. When it fails, the entire enterprise feels it&#8212;systems grind to a halt, regulators come calling, and trust evaporates overnight.</p><p>That&#8217;s why the current fascination with AI is more than a passing trend, it&#8217;s a strategic risk. Too many leaders are mistaking faster answers for smarter execution. But IAM is not solved by access to information. It is solved by leadership, alignment, and judgment.</p><p>And those are things no algorithm can provide.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bwLu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bwLu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!bwLu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!bwLu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!bwLu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bwLu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2398865,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/174780239?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bwLu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!bwLu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!bwLu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!bwLu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc93e488-5df4-4e32-89f4-444d72760303_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The Architect and the Algorithm</em> (credit: my GPT:)</p><h2>The Temptation of AI in IAM</h2><p>Artificial Intelligence&#8212;particularly Large Language Models (LLMs) like ChatGPT, Claude, and Gemini&#8212;has captivated the business world. From the boardroom to the data center, leaders are asking: <em>If AI can write code, generate board reports, and summarize 300-page analyst studies in seconds, why can&#8217;t it run Identity and Access Management (IAM)?</em></p><p>The question is understandable. IAM has always been a discipline flooded with information&#8212;white papers, analyst notes, vendor briefs, and implementation guides. The dream of instant expertise at the push of a button is alluring. Faster access to insights feels like it should unlock progress.</p><p>But it doesn&#8217;t. Having carried the responsibility for enterprise IAM across industries and sectors for over a decade, I can tell you this: access to information has <em>never</em> been the problem. Fifteen years ago, I had Gartner, KuppingerCole, and Forrester at my disposal. More recently, I&#8217;ve <a href="https://www.strategylayer.com/p/equity-by-design-lessons-from-modernizing">spearheaded CIAM modernization</a> for Washington State with both the benefit of an IT degree, MBA toolkit, and GPT-4 at my side. None of it replaces the judgment, creativity, and leadership of a seasoned consultant or architect.</p><p>Because IAM is not just about <em>knowing</em>&#8212;it is about <em>deciding, aligning, and executing</em>. And that is where AI fails to deliver.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Information Isn&#8217;t Execution</h2><p>Think back to the early 2010s. If I needed to know the recommended maturity model for privileged access management, I could find it in a research note. I could highlight the right quadrant and present it to a steering committee with confidence.</p><p>Today, I can prompt ChatGPT: <em>&#8220;Outline the pillars of a successful IAM program.&#8221;</em> In seconds, I&#8217;ll have a polished summary&#8212;structured, logical, and familiar. Yet the strategic value is unchanged. Faster delivery doesn&#8217;t mean better results.</p><p>Information&#8212;even when attractively packaged&#8212;cannot:</p><ul><li><p>Build a compelling business case for your CFO.</p></li><li><p>Secure executive sponsorship when politics are stacked against you.</p></li><li><p>Balance IAM investments with competing business priorities.</p></li><li><p>Recognize cultural blockers that silently stall adoption.</p></li><li><p>Be accountable at 2:00 AM when SSL certificates expire and customer portals go dark.</p></li></ul><p>In other words, the hard part of IAM has never been the content&#8212;it&#8217;s the <em>context</em>. The art is in navigating people, priorities, and pressure. And context is where AI shows its limitations most clearly.</p><h2>The Illusion of Stochastic Certainty</h2><p>One reason AI is seductive is the fluency of its answers. An LLM can make even shaky reasoning sound confident. But behind the curtain lies stochasticity&#8212;the probabilistic process by which models generate responses.</p><p>Try this simple experiment: prompt your favorite AI chatbot with the request, <em>&#8220;Outline the key pillars and success factors for an enterprise IAM program.&#8221;</em> Do it four times in a row. Each time, you&#8217;ll get a slightly different list. Sometimes &#8220;governance&#8221; comes first, sometimes &#8220;technology.&#8221; One draft emphasizes user experience, another compliance. All are plausible. None are definitive.</p><p>This variability is not a bug; it&#8217;s the design of the system. LLMs are prediction engines, not reasoning engines. They excel at recombining patterns from training data, but they cannot guarantee consistency&#8212;or validity&#8212;over multiple runs.</p><p>For IAM leaders, this presents a serious risk. You cannot build board strategy or security policy on probabilistic outputs that shift with every prompt. This is why skilled professionals are indispensable. Leaders must oversee AI, interpret its outputs, and apply sound judgment. AI can accelerate tasks, but outsourcing critical thinking, strategy, and design work to it is an abdication of responsibility.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share The Strategy Layer&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.strategylayer.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share The Strategy Layer</span></a></p><h2>What AI Still Can&#8217;t Do</h2><p>Even with GPT-5 at my fingertips and the best academic and professional training behind me, I&#8217;ve seen the same recurring limits. AI doesn&#8217;t do the truly human parts of IAM.</p><ul><li><p><strong>Strategic Alignment:</strong> AI can list best practices, but it doesn&#8217;t know whether your organization needs to move fast, cut costs, or restore customer trust first. Alignment is contextual.</p></li><li><p><strong>Business Case Creation:</strong> LLMs generate words, not conviction. Only a human partner can reframe IAM as business protection, growth enablement, or compliance cost avoidance in a way that resonates at the executive table.</p></li><li><p><strong>Stakeholder Engagement:</strong> IAM succeeds only when HR, legal, operations, and IT are on the same page. That&#8217;s not a prompt&#8212;it&#8217;s a negotiation, built on credibility and trust.</p></li><li><p><strong>Gap Analysis in Context:</strong> Every organization has gaps. The question is: which ones matter most right now? That&#8217;s prioritization&#8212;a skill born of judgment, not probability.</p></li><li><p><strong>Hands-On Firefighting:</strong> AI doesn&#8217;t triage outages. It doesn&#8217;t hold the pager. It doesn&#8217;t walk into the executive war room when customers are locked out.</p></li></ul><p>At best, AI gives you a faster baseline. At worst, it convinces you that you don&#8217;t need a baseline built by professionals in the first place.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.identient.ai/success-in-iam-not-a-product-its-strategy/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_r8b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_r8b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_r8b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_r8b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_r8b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg" width="1200" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:126496,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.identient.ai/success-in-iam-not-a-product-its-strategy/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/174780239?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_r8b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_r8b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_r8b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_r8b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9f861b6-10f2-445a-a359-c02f6465bf85_1200x630.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Success in IAM: It&#8217;s Not a Product, It&#8217;s a Strategy</figcaption></figure></div><h2>The Missing Human Dimensions</h2><p>Beyond execution, there are higher-order functions that only people perform well. This is where the real gap lies.</p><ul><li><p><strong>Asking Interesting Questions:</strong> Consultants and architects don&#8217;t just answer questions&#8212;they ask the ones nobody else is bold enough to pose. <em>Why do we grant access this way at all? What if the barrier isn&#8217;t technical but cultural?</em> AI can summarize knowledge, but it rarely provokes insight.</p></li><li><p><strong>Second-Order Effects:</strong> IAM decisions ripple outward. A tighter MFA policy may harden defenses but could also frustrate customers, leading to revenue loss. Humans are better at spotting those unintended consequences.</p></li><li><p><strong>Trade-Offs and Opportunity Cost:</strong> Budgets are finite. Should you invest in CIAM modernization or privileged access management this year? AI can list benefits, but it won&#8217;t balance them against organizational opportunity costs.</p></li><li><p><strong>Political Capital:</strong> IAM is as much politics as it is technology. Timing matters. Allies matter. Sometimes the right answer today is &#8220;not yet.&#8221; AI has no political capital to spend, no favors to call in, no trust to draw on.</p></li></ul><p>These human dimensions are often the difference between a program that survives and one that fails.</p><h2>Analyst Reports vs. AI: Same Song, Faster Tempo</h2><p>In many ways, AI is simply the next iteration of what analyst firms have long provided. When I compare ChatGPT&#8217;s IAM advice to the templates and frameworks I pulled from Forrester or Gartner 15 years ago, the substance is strikingly similar. The difference? It arrives in seconds, not days.</p><p>That speed matters&#8212;but speed without strategy is just faster noise.</p><p>As Forrester puts it: <em>&#8220;The paradox encapsulates one of the most pressing challenges facing enterprises today: the disconnect between ubiquitous AI adoption at the individual level and the absence of transformational business impact at the organizational level.&#8221;</em> (Forrester, 2025)</p><p>Faster doesn&#8217;t mean wiser. And wisdom, not information, is what IAM requires most.</p><h2>The Role of Human Expertise</h2><p>This is why experienced consultants and architects remain irreplaceable. They bring qualities no AI can emulate:</p><ul><li><p><strong>Contextual Understanding:</strong> Recognizing what &#8220;good IAM&#8221; means in your sector, culture, and maturity stage.</p></li><li><p><strong>Cultural Intelligence:</strong> Pacing change so adoption keeps pace with ambition.</p></li><li><p><strong>Pattern Recognition:</strong> Drawing lessons from dozens of prior implementations to spot risks early.</p></li><li><p><strong>Accountability:</strong> Owning outcomes with you&#8212;not just generating words but delivering results.</p></li></ul><p>This fusion of technical skill, cultural sensitivity, and political acumen is what turns IAM from a perpetual struggle into a program that delivers measurable business value.</p><h2>Design Thinking: Where AI Fits, Where It Doesn&#8217;t</h2><p>The right question isn&#8217;t <em>whether</em> to use AI but <em>where</em>. Put your design thinking hat on:</p><ul><li><p><strong>Use AI</strong> to accelerate: drafting RFPs, summarizing vendor documentation, sketching workflows.</p></li><li><p><strong>Don&#8217;t use AI</strong> to decide: choosing priorities, weighing risks, allocating scarce capital.</p></li></ul><p>AI can help your team move faster, but it cannot decide what direction to run. That choice remains squarely in human hands.</p><h2>What&#8217;s Really at Stake</h2><p>IAM is not a playground for experimentation. It&#8217;s the connective tissue of digital business.</p><ul><li><p><strong>Revenue:</strong> Frictionless, secure customer access drives loyalty and retention.</p></li><li><p><strong>Resilience:</strong> Outages tied to identity can grind operations to a halt.</p></li><li><p><strong>Reputation:</strong> Breaches stemming from identity failures can permanently erode trust.</p></li></ul><p>This is too important to entrust to stochastic algorithms or generic templates. IAM is existential&#8212;and existential risks demand human leadership.</p><h2>Why Now Is the Time to Invest in Consulting</h2><p>If your IAM program feels stuck&#8212;or worse, if it feels &#8220;fine&#8221; but unprovable&#8212;this is the moment to bring in outside expertise. A skilled consulting partner can:</p><ul><li><p>Uncover hidden gaps before they metastasize.</p></li><li><p>Translate IAM outcomes into board-level ROI.</p></li><li><p>Build coalitions across siloed business functions.</p></li><li><p>Architect AI systems of action that empower, rather than distract, your team.</p></li></ul><p>Done right, this investment more than pays for itself in avoided rework, reduced audit exposure, and programs that actually stick.</p><h2>Closing Reflection</h2><p>The future will absolutely include AI in IAM products, processes, and programs&#8212;but as an amplifier, not a replacement. The <a href="https://www.strategylayer.com/p/playing-a-winnable-game-why-cybersecurity">leaders who win</a> won&#8217;t be those who blindly outsource to machines. They&#8217;ll be the ones who integrate AI wisely, with judgment and strategy intact.</p><p>At the end of the day, IAM leadership requires more than access to information. It requires the courage to ask better questions, the foresight to weigh trade-offs, and the political capital to make change stick. These are human skills&#8212;and they always will be.</p><p>That&#8217;s why the call you make to a seasoned consultant at 2:00 AM will always matter more than the prompt you type into ChatGPT at 2:00 PM.</p><h2>Let&#8217;s Talk!</h2><p>If you need help <a href="https://www.identient.ai/the-gaps-in-your-iam-program/">spotting the gaps</a> in your IAM program or designing and implementing AI systems of action for your team, let&#8217;s talk. There&#8217;s never been a more important time to balance speed with strategy. The work I do with clients consistently drives <strong>seven- and eight-figure impact</strong>&#8212;unlocking measurable ROI through stronger governance, reduced risk, and IAM programs that finally deliver on their promise.</p><div class="community-chat" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/thestrategylayer/chat?utm_source=chat_embed&quot;,&quot;subdomain&quot;:&quot;thestrategylayer&quot;,&quot;pub&quot;:{&quot;id&quot;:4536793,&quot;name&quot;:&quot;The Strategy Layer&quot;,&quot;author_name&quot;:&quot;Steve Tout&quot;,&quot;author_photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!YxRW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;}}" data-component-name="CommunityChatRenderPlaceholder"></div><p><strong>Reference</strong><br>Giron, Frederic. Forrester, <em>Why AI ROI Remains Elusive Despite Widespread Adoption</em>, July 2025. Retrieved from: <a href="https://www.forrester.com/blogs/why-ai-roi-remains-elusive-despite-widespread-adoption/">https://www.forrester.com/blogs/why-ai-roi-remains-elusive-despite-widespread-adoption/</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Playing a Winnable Game: Why Cybersecurity Leaders Must Master Strategic Finance]]></title><description><![CDATA[Amid tightening budgets, short CISO tenures, and mounting pressures, the difference between burnout and breakthrough is framing cybersecurity as a game worth winning&#8212;grounded in strategic finance.]]></description><link>https://www.strategylayer.com/p/playing-a-winnable-game-why-cybersecurity</link><guid isPermaLink="false">https://www.strategylayer.com/p/playing-a-winnable-game-why-cybersecurity</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Sun, 14 Sep 2025 18:34:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_yRU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>The Unwinnable Game Trap</strong></h2><p>Cybersecurity leadership is starting to look like an unwinnable game. The average CISO tenure of 1.5&#8211;2 years tells us something isn&#8217;t working. Leaders are handed budgets where 75% of spend is locked into technical debt or mandatory controls, leaving only a sliver of discretionary funding to maneuver. Expectations continue to rise while resources stay flat&#8212;or even decline.</p><p>In game theory terms, cybersecurity leaders are being asked to play with fewer moves on the board while the stakes keep climbing.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The outdated &#8220;people, process, technology&#8221; model doesn&#8217;t help much in this new environment. Nor does the familiar cost-avoidance narrative: &#8220;we stopped bad things from happening.&#8221; That might have worked a decade ago. Today, boards and CFOs expect security leaders to frame their work in terms of options, trade-offs, and business value. In short, to play a game they can actually win.</p><h2><strong>The Economics of Cybersecurity Leadership</strong></h2><p>If the opening feels like a game rigged against CISOs, the numbers confirm it. The financial headwinds facing security leaders are undeniable. A recent IANS and Artico Search survey of nearly 600 CISOs found that only <strong>47% reported a budget increase in 2025</strong>, down from 62% the year prior (IANS Research &amp; Artico Search, 2025). Meanwhile, <strong>54% are dealing with flat or shrinking budgets</strong>. And for the first time in five years, security&#8217;s slice of IT spending actually <strong>declined&#8212;from 11.9% to 10.9%</strong>&#8212;as dollars were redirected toward AI, cloud, and digital growth priorities (SecureWorld, 2025).</p><p>For many CISOs, these numbers translate into a game where most of the moves are already taken off the board. Fixed costs like technical debt, compliance requirements, and mandatory controls can consume three-quarters of a typical budget, leaving little discretionary funding for innovation or strategic bets. In this environment, cost avoidance alone isn&#8217;t enough to justify spend&#8212;or to ensure career survivability.</p><p>What leaders need instead is a new way to <strong>reframe and navigate financial constraints</strong>. Three starting points:</p><ul><li><p><strong>Map fixed vs. discretionary spend</strong>: know exactly how much of the budget is locked in vs. how much can be maneuvered, and make that visible to the board.</p></li><li><p><strong>Translate dollars into Run / Grow / Transform categories</strong>: adopt a model the CFO already understands, showing whether spend is maintaining the baseline, enabling incremental growth, or transforming the business.</p></li><li><p><strong>Present investments as options and trade-offs</strong>: instead of &#8220;we need this much money,&#8221; offer &#8220;here are three paths forward&#8212;here&#8217;s what we gain, and here&#8217;s what we accept if we don&#8217;t.&#8221;</p></li></ul><p>Each of these reframes gives CISOs more credibility in executive discussions and begins to shift perception&#8212;from tactical risk manager to strategic partner.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_yRU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_yRU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_yRU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_yRU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_yRU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_yRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg" width="644" height="429.9230769230769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:972,&quot;width&quot;:1456,&quot;resizeWidth&quot;:644,&quot;bytes&quot;:1757798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/173591954?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_yRU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!_yRU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!_yRU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!_yRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7673640-12ab-482b-b279-45228775abfa_2119x1414.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Presenting security as options and trade-offs transforms budget talks into strategic business conversations.</figcaption></figure></div><h2><strong>Why the Current Playbook Fails</strong></h2><p>For decades, the dominant framework for cybersecurity management has been the familiar trio of <strong>people, process, and technology</strong>. It served its purpose in an era when the biggest challenge was building controls and maturing basic practices. But in today&#8217;s economic climate, that model feels outdated.</p><p>Boards and CFOs are no longer impressed by a laundry list of controls or by the language of cost avoidance&#8212;&#8220;we stopped bad things from happening.&#8221; That narrative, while true, doesn&#8217;t hold up against competing investments in AI, digital expansion, or customer experience, where executives can see direct returns.</p><p>Worse, the old playbook locks CISOs into reactive cycles&#8212;always responding to the next regulation, audit, or incident&#8212;without a framework for shaping strategy. This undermines their ability to survive in roles where the average tenure is less than two years.</p><p><strong>Three reasons the old playbook is breaking down:</strong></p><ul><li><p><strong>Cost avoidance isn&#8217;t strategy</strong>: Preventing losses matters, but it doesn&#8217;t prove value or growth potential.</p></li><li><p><strong>Controls &#8800; credibility</strong>: Boards expect clarity on business impact, not just technical soundness.</p></li><li><p><strong>Reactive posture shortens careers</strong>: CISOs who only defend and comply rarely get the chance to innovate, which accelerates burnout and turnover.</p></li></ul><p>The implication is clear: <strong>continuing to play by yesterday&#8217;s rules is a losing game.</strong> The question is whether CISOs can adopt a new playbook&#8212;one rooted in finance, strategy, and value creation&#8212;that allows them to compete on equal footing with other executives.</p><h2><strong>Reframing the Role: From Cost Center to Value Creator</strong></h2><p>If the old playbook is failing, what replaces it? The answer lies in shifting the frame&#8212;from security as an unavoidable cost to security as a portfolio of <strong>strategic options</strong> the business can choose to invest in.</p><p>This is more than semantics. In <em><a href="https://a.co/d/2qEihvg">The CISO On The Razor&#8217;s Edge</a></em>, I argued in Chapter 7 (<em>Security Leadership as a Series of Real Options</em>) that CISOs must think less like operators and more like financial strategists. Every initiative&#8212;whether it&#8217;s a new control, a modernization effort, or a cloud migration&#8212;can be presented as an <strong>option with trade-offs</strong>: invest and gain future flexibility, delay and accept defined risks, or decline and carry the exposure. This approach allows the board to see security decisions in the same way they evaluate other capital investments.</p><p>Industry leaders echo this. <strong><a href="https://www.identient.ai/podcast/metrics-as-loaded-weapons-secrets-from-7x-cio/">Mark Settle</a></strong> advises CISOs to &#8220;follow the money&#8221; through budgeting frameworks like Run / Grow / Transform, which reveal whether dollars are being used simply to keep the lights on or to unlock growth and transformation. <strong><a href="https://www.identient.ai/podcast/co-morbid-poisoning-of-the-ciso-role/">Steve Zalewski</a></strong>, drawing on his time as CISO at Levi Strauss &amp; Co., pushes CISOs to ensure that cybersecurity isn&#8217;t just about protection&#8212;it must directly support the mission of the business. As he often says, security has to &#8220;help sell more jeans.&#8221;</p><p>Taken together, these perspectives form a new leadership model: <strong>the financially literate, strategically minded CISO</strong> who frames security not as an overhead cost but as an investment portfolio. And it&#8217;s a model that boards are more likely to respect&#8212;and fund.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qxfr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qxfr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qxfr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qxfr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qxfr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qxfr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg" width="648" height="432.14835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:648,&quot;bytes&quot;:1533898,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/173591954?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qxfr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qxfr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qxfr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qxfr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb472d4a3-b1b8-48e8-93a0-29e9d2ac1e4b_2121x1414.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cybersecurity leadership is a high-stakes game of strategy&#8212;where every financial move shapes survival.</figcaption></figure></div><h2><strong>Tools for Playing a Winnable Game</strong></h2><p>Shifting from cost center to value creator isn&#8217;t just about mindset&#8212;it&#8217;s about using practical tools that reshape how security is discussed in executive conversations. CISOs don&#8217;t need to become CFOs, but they do need to adopt financial frameworks that make their work legible and valuable in business terms.</p><p>Here are four tools that create leverage and credibility:</p><ul><li><p><strong>Budget Mapping</strong>: Break down spend into fixed vs. discretionary categories. Show explicitly how much of the budget is consumed by technical debt and mandatory controls versus what&#8217;s available for strategic investment. Boards respond to clarity.</p></li><li><p><strong>Run / Grow / Transform</strong>: Reclassify spend using a model familiar to CFOs. Demonstrate which investments simply keep operations running, which enable incremental improvements, and which unlock real transformation.</p></li><li><p><strong>Options &amp; Trade-Offs</strong>: Frame every major initiative as a set of choices: <em>If we invest, here&#8217;s the upside. If we don&#8217;t, here&#8217;s the risk we&#8217;re carrying.</em> Boards don&#8217;t want ultimatums&#8212;they want structured options.</p></li><li><p><strong>Value Creation Scenarios</strong>: Move beyond cost avoidance by modeling how security investments can generate value&#8212;faster time to market, higher customer trust, stronger brand resilience, or lower cost of capital through risk reduction.</p></li></ul><p>Each of these tools has the same effect: they reposition security decisions from technical necessities to strategic investments. They give CISOs a way to demonstrate alignment with business goals&#8212;and to survive, and even thrive, in a budget-constrained environment.</p><h2><strong>The Payoff: Confidence, Impact, and Career Resilience</strong></h2><p>Mastering strategic finance is not just about surviving another budget cycle&#8212;it&#8217;s about changing the way the game is played. CISOs who frame investments as options and trade-offs, who can translate dollars into growth and resilience, and who model value creation are no longer trapped in a defensive posture. They step into the role of strategist, gain confidence in boardrooms, and extend their career runway.</p><p>A winnable game is one where:</p><ul><li><p>The board sees clarity, not confusion.</p></li><li><p>The CFO sees alignment, not overhead.</p></li><li><p>The CISO sees a path forward, not burnout.</p></li></ul><p>That&#8217;s the future of cybersecurity leadership&#8212;and it&#8217;s within reach.</p><p>The urgency is real: only <strong>47% of CISOs reported budget increases in 2025</strong>, while security&#8217;s share of IT spending actually fell for the first time in five years. The game is tightening. Now is the moment to master the skills that make it winnable.</p><p>If you want to sharpen these skills and apply them in your own organization, join us on <strong>Tuesday, September 16th</strong> for the webinar <em><a href="https://www.linkedin.com/events/strategicfinanceforcybersecurit7369022272361144322/">Strategic Finance for Cybersecurity Leaders</a></em>. We&#8217;ll dive deeper into how CISOs can reframe budgets, speak the language of the business, and make smarter strategic bets in the year ahead.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/events/strategicfinanceforcybersecurit7369022272361144322/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g-aV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!g-aV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!g-aV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!g-aV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g-aV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png" width="506" height="506" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:506,&quot;bytes&quot;:757747,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/events/strategicfinanceforcybersecurit7369022272361144322/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/173591954?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g-aV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!g-aV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!g-aV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!g-aV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0bf1326-d736-4408-8c84-5078f1074240_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>And if you&#8217;d like a companion to guide you even further, pick up a copy of <em><a href="https://a.co/d/fWFFb0U">The CISO On The Razor&#8217;s Edge</a></em>, especially Chapter 7: <em>Security Leadership as a Series of Real Options</em>. It will help you increase your odds of surviving&#8212;and thriving&#8212;in the game you&#8217;re already playing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.stevetout.com/book" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_SQb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 424w, https://substackcdn.com/image/fetch/$s_!_SQb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 848w, https://substackcdn.com/image/fetch/$s_!_SQb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 1272w, https://substackcdn.com/image/fetch/$s_!_SQb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_SQb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png" width="439" height="699.2039835164835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2319,&quot;width&quot;:1456,&quot;resizeWidth&quot;:439,&quot;bytes&quot;:2281043,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.stevetout.com/book&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/173591954?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_SQb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 424w, https://substackcdn.com/image/fetch/$s_!_SQb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 848w, https://substackcdn.com/image/fetch/$s_!_SQb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 1272w, https://substackcdn.com/image/fetch/$s_!_SQb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27a0fef1-a6ec-4bea-9296-75713e38e9f1_1554x2475.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>References</h1><p>IANS Research &amp; Artico Search. (2025, August 5). <em>Security budgets under pressure: How CISOs can navigate tight budget constraints.</em> IANS Research. Retrieved from <a href="https://www.iansresearch.com/resources/all-blogs/post/security-blog/2025/08/05/security-budgets-under-pressure--how-cisos-can-navigate-tight-budget-constraints?utm_source=chatgpt.com">https://www.iansresearch.com/resources/all-blogs/post/security-blog/2025/08/05/security-budgets-under-pressure--how-cisos-can-navigate-tight-budget-constraints</a></p><p>SecureWorld. (2025, July 24). <em>CISO budget squeeze: Security growth slows as IT priorities shift.</em> SecureWorld. Retrieved from <a href="https://www.secureworld.io/industry-news/cisos-budget-squeeze-security-growth-slows">https://www.secureworld.io/industry-news/cisos-budget-squeeze-security-growth-slows</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Data Protection to AI Security Posture Management: What I’ve Learned as an Early Advisor to TrustLogix]]></title><description><![CDATA[Why CIOs and CISOs Must Treat AI Security Posture Management as the Next Strategic Imperative for Data Governance and Enterprise Resilience]]></description><link>https://www.strategylayer.com/p/from-data-protection-to-ai-security</link><guid isPermaLink="false">https://www.strategylayer.com/p/from-data-protection-to-ai-security</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Tue, 09 Sep 2025 00:37:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sCcS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I first joined TrustLogix as one of its early board advisors, the challenge we were tackling felt deceptively narrow: securing data in use for CI/CD pipelines. It was about ensuring that sensitive customer and enterprise data wasn&#8217;t misused or left vulnerable during the development process. At the time, this was a bold move&#8212;shifting the industry conversation from static data-at-rest protections toward the live, moving, constantly changing streams of data that powered modern engineering.</p><p>Fast forward a few years, and the landscape looks very different. What began as a fight to control developer pipelines has evolved into a much larger, more urgent problem: safeguarding data privacy, security, and governance in the age of generative AI. Today, that evolution is crystallizing into a new strategic discipline: <strong>AI Security Posture Management (AI-SPM).</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Inflection Point for CxOs</h2><p>The adoption of generative AI and large language models (LLMs) is not optional anymore. McKinsey estimates that generative AI could deliver up to <strong>$4.4 trillion annually in economic value</strong> across industries. A Salesforce study shows that <strong>61% of employees are eager to leverage generative AI</strong>, yet most lack the knowledge or skills to use it securely.</p><p>That tension&#8212;between enthusiasm and operational readiness&#8212;is where risk breeds. On one hand, boards and executive teams see AI as a lever for efficiency and competitive advantage. On the other, CISOs and CIOs are already grappling with a new class of threats, from data leakage to adversarial attacks, without the benefit of well-worn playbooks.</p><p>The next 18 months will determine whether enterprises harness AI&#8217;s potential responsibly or stumble into costly missteps. And the stakes are high: regulators are moving quickly, consumers are hyper-aware of privacy risks, and adversaries&#8212;both criminal and nation-state&#8212;are actively probing weaknesses in AI systems today, not tomorrow.</p><h2>From Governance Gaps to Strategic Imperatives</h2><p>One of the biggest lessons I&#8217;ve seen firsthand is that the governance gaps inside enterprises are often more dangerous than the technology itself.</p><ul><li><p><strong>Security vs. Data Teams:</strong> Too often, the security organization and the data organization operate in silos. Without a shared governance framework, critical questions&#8212;Who owns the data? Who sets the policies? Who enforces them?&#8212;go unanswered. This disconnect is where vulnerabilities flourish.</p></li><li><p><strong>Super Users Without Guardrails:</strong> Generative AI has effectively turned non-technical employees into &#8220;super users.&#8221; With the right (or wrong) prompt, an employee could trigger a destructive query like <code>drop table</code>, leading to catastrophic data loss. Traditional access controls weren&#8217;t built for this.</p></li><li><p><strong>Model Integrity Risks:</strong> Nearly every LLM today is vulnerable to prompt injection and manipulation. What looks like an innocent request for analysis can be hijacked to exfiltrate sensitive data or generate biased, harmful, or even malicious outputs.</p></li></ul><p>The result? An urgent need for proactive, executive-level strategies&#8212;not just tactical fixes.</p><h2>The Three Pillars of AI Security Posture Management</h2><p>At TrustLogix, I&#8217;ve watched the thinking around governance evolve into what we now call <strong><a href="https://www.trustlogix.io/safeguarding-your-ai-models-and-data">AI-SPM: AI Security Posture Management</a>.</strong> It&#8217;s a high-level discipline designed to give enterprises the same kind of control, resilience, and visibility for AI that they&#8217;ve long pursued in cloud and DevOps.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sCcS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sCcS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!sCcS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!sCcS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!sCcS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sCcS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png" width="516" height="516" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:516,&quot;bytes&quot;:1351517,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/173139982?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sCcS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!sCcS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!sCcS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!sCcS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F498ae023-4dd7-4371-a760-aeb247a14915_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI Security Posture Management (AI-SPM) at a glance: securing model deployments, protecting enterprise data, and detecting risks with intelligent policy guidance&#8212;at both enterprise and global scale.</figcaption></figure></div><p>The framework rests on three pillars:</p><ol><li><p><strong>Proactive Data Protection</strong></p><ul><li><p>Automatic discovery and classification of sensitive data across AI training and inference pipelines.</p></li><li><p>Data lineage tracking to ensure auditability and reproducibility.</p></li><li><p>Granular access controls (RBAC, ABAC) tailored for AI workloads.</p></li></ul></li><li><p><strong>Secure Model Lifecycle Management</strong></p><ul><li><p>Model registries with strict access controls and full audit trails.</p></li><li><p>Integrity verification using digital signatures and cryptographic checks.</p></li><li><p>Real-time monitoring to detect adversarial attacks and anomalous behavior.</p></li></ul></li><li><p><strong>Continuous Posture Monitoring</strong></p><ul><li><p>Centralized visibility into who has access to what data and models.</p></li><li><p>Automated, template-driven policy enforcement.</p></li><li><p>Continuous risk detection against benchmarks like NIST and CIS.</p></li></ul></li></ol><p>This isn&#8217;t theory&#8212;it&#8217;s the pragmatic blueprint enterprises need to operationalize today. Just as cloud security posture management (CSPM) became indispensable for cloud adoption, AI-SPM is fast becoming the non-negotiable foundation for AI.</p><h2>Why the Next 18 Months Matter</h2><p>CxOs can&#8217;t afford to wait. Here&#8217;s why:</p><ul><li><p><strong>Regulatory Momentum:</strong> <a href="https://en.wikipedia.org/wiki/Artificial_Intelligence_Act">The EU AI Act</a>, U.S. <a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf">executive orders</a>, and <a href="https://iapp.org/resources/article/us-state-ai-governance-legislation-tracker/">state-level privacy regulations</a> are converging to place heavy accountability on AI use. Compliance won&#8217;t be optional.</p></li><li><p><strong>Adversary Sophistication:</strong> Organized crime and nation-state actors are already targeting LLMs and AI-enabled applications. Unlike early-stage technologies, this isn&#8217;t &#8220;wait and see.&#8221; The battlefield is live.</p></li><li><p><strong>Market Expectations:</strong> Customers and investors are paying close attention. A single AI-driven data leak could undo years of trust-building and destroy competitive positioning.</p></li></ul><p>The organizations that will thrive are those that move deliberately&#8212;implementing governance frameworks now, before AI adoption scales beyond their ability to control it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DmeV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DmeV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DmeV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DmeV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DmeV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DmeV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png" width="571" height="380.7973901098901" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:571,&quot;bytes&quot;:1482777,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/173139982?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DmeV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DmeV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DmeV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DmeV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc52197d6-ae5b-45d7-b8b0-94ff1ecaed09_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>A Real-World Wake-Up Call: The Salesloft Breach</h2><p>In September 2025, the industry saw just how fast trust can unravel when AI security posture isn&#8217;t managed proactively. A breach at <strong>Salesloft</strong>, an AI-driven chatbot provider, exposed the fragility of enterprise integrations at global scale.</p><p>Attackers from the UNC6395 group stole <strong>OAuth tokens</strong> from Salesloft&#8217;s Drift platform, using them to pivot into hundreds of downstream integrations. This wasn&#8217;t just a contained incident&#8212;it spread into enterprise systems like <strong>Slack, Google Workspace, AWS, Microsoft Azure, and even OpenAI environments</strong>. Along the way, attackers harvested <strong>AWS keys, VPN credentials, and Snowflake tokens</strong>, and then <strong>deleted logs</strong> to cover their tracks (<a href="https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chatbot-maker-salesloft/">KrebsOnSecurity</a>, <a href="https://www.itpro.com/security/cyber-attacks/warning-issued-to-salesforce-customers-after-hackers-stole-salesloft-drift-data">ITPro</a>).</p><p>The impact was sweeping. Security leaders at firms like <strong>Palo Alto Networks</strong> and <strong>Zscaler</strong> confirmed their organizations were affected, reminding us that even cybersecurity vendors aren&#8217;t immune (<a href="https://www.techradar.com/pro/security/palo-alto-networks-becomes-the-latest-to-confirm-it-was-hit-by-salesloft-drift-attack">TechRadar</a>, <a href="https://www.itpro.com/security/data-breaches/the-salesloft-drift-victim-list-keeps-growing-zscaler-is-the-latest-to-confirm-a-breach-warning-customers-to-remain-wary-of-follow-up-phishing-attacks">ITPro</a>).</p><p><strong>Why it matters:</strong> This was a classic case of <strong>authorization sprawl</strong>&#8212;unchecked AI-integrated tokens giving adversaries the keys to the kingdom. For executives, the lesson is crystal clear: <strong>AI governance cannot lag adoption.</strong> A single data leak or compromised token can wipe out years of trust-building and competitive advantage in a matter of days.</p><h2>A Call to Action for Leaders</h2><p>As I look back on my journey with TrustLogix, the throughline is clear: security and governance are not blockers to innovation; they are the <strong>enablers</strong> of sustainable, responsible AI adoption.</p><p>CxOs need to think differently. This isn&#8217;t about securing yesterday&#8217;s systems. It&#8217;s about preparing your enterprise to navigate the next wave of disruption with confidence. That requires new disciplines, new governance models, and new partnerships.</p><p>If you&#8217;re a CIO, CISO, or senior executive wrestling with these questions, I&#8217;d encourage you to take action now:</p><ul><li><p><strong>Schedule a private briefing or demo.</strong> I&#8217;m happy to arrange a session where you can see firsthand how TrustLogix is helping enterprises operationalize AI-SPM.</p></li><li><p><strong>Connect directly.</strong> Reach out to me if you&#8217;d like to discuss your specific challenges, roadmap, or board-level concerns.</p></li><li><p><strong>Learn more.</strong> Visit <a href="https://www.trustlogix.io">TrustLogix&#8217;s website</a> for additional resources and insights.</p></li></ul><h2>Final Word</h2><p>AI adoption is moving faster than most governance structures can keep up with. The temptation is to prioritize speed and deal with governance later. That&#8217;s a mistake.</p><p>What I&#8217;ve learned as an early advisor to TrustLogix is that governance isn&#8217;t the brake&#8212;it&#8217;s the steering wheel. Without it, you may move fast, but you&#8217;ll end up in a ditch. With it, you can accelerate into the future of AI confidently, knowing your enterprise is secure, compliant, and ready for what&#8217;s next.</p><p>The question isn&#8217;t whether AI-SPM will become a strategic priority for enterprises. It&#8217;s <strong>how quickly your organization will adopt it&#8212;and whether you&#8217;ll be ahead of the curve or playing catch-up.</strong></p><p>&#128073; <strong>Call to Action:</strong> Contact me directly if you&#8217;d like to arrange a private briefing, demo, or meeting with a representative from TrustLogix. Or visit <a href="https://trustlogix.io">trustlogix.io</a> to explore more.</p><h3>References</h3><p>McKinsey &amp; Company. (2023, June). <em>The economic potential of generative AI: The next productivity frontier.</em> McKinsey Digital. Retrieved from <a href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-economic-potential-of-generative-ai-the-next-productivity-frontier">https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-economic-potential-of-generative-ai-the-next-productivity-frontier</a></p><p>McKinsey Global Institute. (2023, June). <em>Generative AI could add up to $4.4 trillion annually to the global economy.</em> Retrieved from <a href="https://www.mckinsey.com/mgi/media-center/ai-could-increase-corporate-profits-by-4-trillion-a-year-according-to-new-research">https://www.mckinsey.com/mgi/media-center/ai-could-increase-corporate-profits-by-4-trillion-a-year-according-to-new-research</a></p><p>Salesforce Research. (2023, August). <em>Generative AI Snapshot Series: AI Ethics.</em> Salesforce Newsroom. Retrieved from <a href="https://www.salesforce.com/news/stories/generative-ai-ethics-survey/">https://www.salesforce.com/news/stories/generative-ai-ethics-survey/</a></p><p>Salesforce Research. (2023, October). <em>Generative AI Snapshot Series: AI Skills.</em> Salesforce Newsroom. Retrieved from <a href="https://www.salesforce.com/news/stories/generative-ai-skills-research/">https://www.salesforce.com/news/stories/generative-ai-skills-research/</a></p><p>Forbes India Staff. (2023, July 14). <em>Generative AI could add up to $4.4 trillion a year to global economy: McKinsey.</em> Forbes India. Retrieved from <a href="https://www.forbesindia.com/article/news/generative-ai-could-add-up-to-44-trillion-a-year-to-global-economy-mckinsey/86157/1">https://www.forbesindia.com/article/news/generative-ai-could-add-up-to-44-trillion-a-year-to-global-economy-mckinsey/86157/1</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Compliance Theater to Human Leadership: Why Sidelining CISOs Normalizes Breaches]]></title><description><![CDATA[Boards that weaken security leadership reduce cybersecurity to performance art. CIOs and CISOs must reclaim their role as human-centered leaders&#8212;guardians of trust, privacy, and dignity.]]></description><link>https://www.strategylayer.com/p/from-compliance-theater-to-human</link><guid isPermaLink="false">https://www.strategylayer.com/p/from-compliance-theater-to-human</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Tue, 02 Sep 2025 15:33:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qXB9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Picture the scene: the boardroom applauds itself after another clean audit. The dashboards glow green. The compliance reports are filed neatly away. And yet, outside those walls, the breaches continue. Privacy is violated. Dignity is eroded. Trust vanishes.</p><p>This is the paradox of modern cybersecurity. Organizations are checking all the boxes but failing to protect the very thing that matters most: the humans behind the data. When security is reduced to compliance theater, breaches stop being treated as existential failures. They become routine. And in that routine, leadership normalizes the erosion of privacy and dignity.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>Sidelining CISOs Normalizes Breaches</strong></h3><p>The sidelined or weakened CISO is the hallmark of this dysfunction. Instead of acting as strategic multipliers, CISOs are too often cast as compliance managers. Their remit is narrowed to passing audits rather than preserving trust.</p><p>The result? A culture that tolerates breaches as the &#8220;cost of doing business.&#8221; This isn&#8217;t just bad governance. It&#8217;s organizational surrender. When boards minimize the CISO&#8217;s voice, they signal to the enterprise that protecting dignity is optional.</p><p>Recent research underscores this gap. In a 2025 Harvard Business Review study, 71% of executives believed their cybersecurity funding was adequate or strong. Yet only 39% rated their board&#8217;s understanding of cyber risk as proactive, and just 31% considered their organization an innovator or early adopter in cyber readiness[^1]. The illusion of readiness masks the normalization of failure.</p><h3><strong>The People/Process/Technology Prison</strong></h3><p>Why does this dynamic persist? Because CIOs and CISOs are often trapped in what I call the people/process/technology prison.</p><p>Legacy frameworks treat people as risks to be managed, processes as boxes to check, and technology as the silver bullet. Humans are reduced to &#8220;actors,&#8221; &#8220;insiders,&#8221; or &#8220;threat vectors.&#8221; Leadership is forced to view the enterprise through a compliance lens, not a human lens.</p><p>This prison strips cybersecurity of its real purpose: enabling people to thrive with dignity in a digital-first world.</p><h3><strong>The Stakes: Privacy and Dignity</strong></h3><p>Breaches aren&#8217;t just technical failures. They are human failures. They rob customers, employees, and citizens of their dignity. They leave people feeling exposed, powerless, and undervalued.</p><p>HBR research shows that dignity violations are common in organizations, and that treating people with dignity significantly improves motivation, satisfaction, and overall flourishing[^2]. Cybersecurity is no different. Each time leadership accepts compliance theater, it chooses to normalize dignity violations at scale.</p><p>The Golden Rule has long reminded us: treat others as you would like to be treated. Today, leadership demands an even sharper ethic: treat others as they want to be treated[^3]. That requires designing systems of trust, not systems of control.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qXB9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qXB9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qXB9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qXB9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qXB9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qXB9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg" width="644" height="429.62983425414365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:483,&quot;width&quot;:724,&quot;resizeWidth&quot;:644,&quot;bytes&quot;:314481,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/172575614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qXB9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qXB9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qXB9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qXB9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b7cbbb7-dc5c-473b-b0ff-f428ac6d6272_724x483.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The rebuilding of Notre Dame reminds us: leadership is about restoring dignity and trust, not performing for appearances. SPIRE gives CIOs and CISOs the same foundation.</figcaption></figure></div><h3><strong>The Escape Route: SPIRE as Human-Centered Leadership OS</strong></h3><p>How do CIOs and CISOs escape the prison? By reframing security leadership through SPIRE: a human-centered operating system for leadership .</p><ul><li><p><strong>Signal</strong> &#8211; Upgrade the signal. Replace noisy dashboards and vanity metrics with board-relevant telemetry: drag, control effectiveness, velocity friction, trust signals.</p></li><li><p><strong>Performance Intelligence</strong> &#8211; See the real system. Surface blind spots, entropy, and misaligned incentives that undermine execution.</p></li><li><p><strong>Insight</strong> &#8211; Understand what system you&#8217;re truly running. The CISO is not a translator but a Strategic Multiplier, co-designing systems of trust, speed, and resilience.</p></li><li><p><strong>Reframe</strong> &#8211; Stop reporting problems. Start commanding the system. Position security not as liability management but as enterprise execution.</p></li><li><p><strong>Execution</strong> &#8211; Close the loop. Translate insight into prioritized action with financial discipline, governance, and feedback.</p></li></ul><p>SPIRE is not abstract philosophy. It is a leadership design system. It restores agency to CIOs and CISOs. It elevates the role from compliance enforcer to guardian of dignity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cQiV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cQiV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!cQiV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!cQiV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!cQiV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cQiV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:516995,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/172575614?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cQiV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!cQiV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!cQiV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!cQiV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F373e0acb-823a-40bd-9bb8-447c6694ed76_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">True cybersecurity leadership starts here&#8212;treating people not as risks to control, but as voices with potential.</figcaption></figure></div><h3><strong>Why Symbolic Leadership Matters</strong></h3><p>MIT Sloan Management Review warns that simply adding more senior cybersecurity roles can actually increase collective overconfidence, leading leaders to overestimate capabilities compared to peers[^4]. In other words, title inflation doesn&#8217;t fix the problem&#8212;it makes it worse.</p><p>The solution isn&#8217;t more hierarchy. It&#8217;s more symbolism. An empowered CISO isn&#8217;t just a functional leader; they are a signal to the enterprise that dignity, trust, and momentum matter. Weakening that signal weakens the system.</p><h3><strong>Actionable Moves for CIOs and CISOs</strong></h3><ol><li><p>Reframe Board Discussions</p><ul><li><p>Don&#8217;t settle for &#8220;Are we compliant?&#8221; Ask: &#8220;How does this strategy preserve dignity and trust?&#8221;</p></li></ul></li><li><p>Elevate the Symbolic Role of Security</p><ul><li><p>Communicate not only risk reduction but also human empowerment.</p></li></ul></li><li><p>Challenge the Prison Mindset</p><ul><li><p>Reject frameworks that treat people as liabilities. Treat them as voices with potential.</p></li></ul></li><li><p>Measure What Matters</p><ul><li><p>Replace red-yellow-green dashboards with metrics tied to performance, friction, and trust.</p></li></ul></li></ol><p>These aren&#8217;t theoretical exercises. They&#8217;re boardroom moves CIOs and CISOs can make today.</p><h3><strong>Closing Call-to-Action</strong></h3><p>Compliance theater might pass audits. But it fails people. And in failing people, it fails the enterprise. Normalized breaches don&#8217;t just erode data&#8212;they erode dignity.</p><p>CIOs and CISOs who want to break free from the people/process/technology prison need a new operating system for leadership. That system is SPIRE.</p><p>Learn how to apply SPIRE as a leader, and inside your organization:<a href="https://www.identient.ai/spire"> identient.ai/spire</a></p><h3><strong>Footnotes</strong></h3><p>[^1]: &#8220;Boards Need a More Active Approach to Cybersecurity.&#8221; Harvard Business Review, May 20, 2025.</p><p>[^2]: &#8220;The Dignity Mindset: How to Build Organizations Where People Flourish.&#8221; Harvard Business Review, Oct 30, 2024.</p><p>[^3]: &#8220;The New Golden Rule of Leadership.&#8221; Harvard Business Review, Aug 2022.</p><p>[^4]: &#8220;The Case for Lean Cybersecurity Leadership.&#8221; MIT Sloan Management Review, Feb 10, 2025.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Equity by Design: Lessons from Modernizing Consumer IAM in Washington State]]></title><description><![CDATA[A case study in balancing privacy, inclusion, and UX to deliver equity by design.]]></description><link>https://www.strategylayer.com/p/equity-by-design-lessons-from-modernizing</link><guid isPermaLink="false">https://www.strategylayer.com/p/equity-by-design-lessons-from-modernizing</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 27 Aug 2025 22:47:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N9pk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I prepared a briefing for the CTO of Washington State on the modernization of our Consumer Identity and Access Management (CIAM) program, one principle rose above all others: <strong>digital equity wasn&#8217;t a side benefit &#8212; it was the driver.</strong></p><p>In my recent piece, <a href="https://www.strategylayer.com/p/identity-is-moving-faster-than-your">&#8220;Identity is Moving Faster Than Your Roadmap&#8221;</a>, I argued that technology outpaces governance if equity and transparency aren&#8217;t engineered in. This post builds on that experience by sharing how we approached digital equity as the driver of <a href="https://watech.wa.gov/strategy/watech-projects-initiatives/identity-access-management-iam-modernization">Washington State&#8217;s CIAM modernization</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N9pk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N9pk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 424w, https://substackcdn.com/image/fetch/$s_!N9pk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 848w, https://substackcdn.com/image/fetch/$s_!N9pk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!N9pk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N9pk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:700084,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/172128478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N9pk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 424w, https://substackcdn.com/image/fetch/$s_!N9pk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 848w, https://substackcdn.com/image/fetch/$s_!N9pk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!N9pk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa036dbff-dc9d-4bca-9e26-3b819a773f87_2560x1707.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Where digital equity became policy: Washington State&#8217;s commitment to modernizing identity for all residents.</figcaption></figure></div><p>Identity modernization is often pitched as a technology upgrade: stronger authentication, smoother login, lower fraud. But for us, it was about something deeper: making sure every resident, regardless of income, ability, or access to technology, could interact with the state on equal footing. That meant designing for the blind and disabled, the elderly, the unbanked, and the digitally underserved. It meant not just <em>doing no harm</em>, but actively lowering barriers that had excluded people for years.</p><p>Today, many vendors are talking about bias in AI and digital equity. It&#8217;s become the language of the moment. But unless a company can show <strong>independent test results</strong> and demonstrate a commitment to equity by design &#8212; from the product spec to the demo to the customer references &#8212; then talk and philosophy alone are not enough.</p><p>This is the story of how we set the bar, how we evaluated vendors, and the lessons others can draw as AI and biometrics rush into the identity ecosystem.</p><h2>Why Digital Equity Had to Lead</h2><p>Washington State&#8217;s services touch millions of people &#8212; renewing a driver&#8217;s license, applying for unemployment, accessing healthcare. Yet for too many, access had become a barrier in itself.</p><ul><li><p><a href="https://www.gao.gov/blog/credit-scoring-alternatives-those-without-credit">45 million Americans lack credit histories</a>, disproportionately young, low-income, and minority. Traditional knowledge-based authentication excluded them before they even started.</p></li><li><p>Multi-factor authentication, often lauded as secure, was inaccessible to the visually impaired or those without multiple devices.</p></li><li><p>Biometric systems introduced risks of racial and gender bias, not to mention concerns about surveillance creep.</p></li></ul><p>The reality was simple: <strong>if modernization didn&#8217;t expand equity, it wasn&#8217;t modernization at all.</strong></p><p>So from day one, equity wasn&#8217;t a requirement buried in an RFP &#8212; it was the lens through which every option would be judged.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-sfq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-sfq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-sfq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-sfq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-sfq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-sfq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png" width="606" height="606" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:1850790,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/172128478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-sfq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!-sfq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!-sfq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!-sfq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d6e9025-3eb8-4eb6-8914-2a3cb80eb1be_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Inclusive UX testing in action &#8212; evaluating digital identity systems for bias, accessibility, and equity.</figcaption></figure></div><h2>Setting the Evaluation Criteria</h2><p>The first step was translating values into <strong>hard criteria</strong>. We built a transparent, data-driven evaluation framework that measured vendors across bias, privacy, and transparency:</p><ul><li><p><strong>Bias &amp; Inclusion</strong></p><ul><li><p>Independent third-party bias testing across gender, race, and age groups.</p></li><li><p>Usability for visually and cognitively impaired populations.</p></li><li><p>Support for residents without smartphones or broadband.</p></li><li><p>Explainable AI &#8212; no black boxes making automated access decisions.</p></li></ul></li><li><p><strong>Privacy &amp; Consent</strong></p><ul><li><p>Explicit proof of consent for biometric use.</p></li><li><p>User control to view how their data is used and revoke consent at any time.</p></li><li><p>Permanent deletion of stored data, including selfies used for verification.</p></li><li><p>No tolerance for vendors selling data or contracting with federal enforcement agencies.</p></li></ul></li><li><p><strong>Compliance &amp; Governance</strong></p><ul><li><p>Teams supporting engineering, operations, and customer support had to be U.S.-based.</p></li><li><p>Full adherence to <a href="https://app.leg.wa.gov/rcw/default.aspx?cite=40.26.020">RCW 40.26.020</a> (biometric identifiers) and <a href="https://app.leg.wa.gov/RCW/default.aspx?cite=43.386">RCW 43.386 </a>(facial recognition accountability).</p></li><li><p>Documented incident response and breach notification plans.</p></li></ul></li></ul><p>Every vendor knew the rules upfront. Equity, privacy, and transparency were not philosophical aspirations &#8212; they were <em>measurable requirements</em>.</p><h2>Beyond Pedestrian Commitments</h2><p>Here&#8217;s where most vendors stumble.</p><p>It&#8217;s one thing to mention bias or accessibility in a presentation. It&#8217;s another to show <strong>enterprise-wide commitment</strong>. The vendors who passed evaluation didn&#8217;t just tack on fairness as a feature. They could demonstrate that equity shaped decisions in engineering, legal, operations, and customer-facing design.</p><p>In other words: <strong>privacy and equity by design</strong>, not as an afterthought.</p><p>One vendor, for example, was disqualified outright because of their use of 1:many biometric face matching and the controversy that followed around transparency and user rights.* This was more than a red flag &#8212; it was a reminder that identity systems live and die on trust. The lesson was clear: without a stellar track record, you cannot credibly claim to serve all residents.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qpLf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qpLf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qpLf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qpLf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qpLf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qpLf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg" width="564" height="564" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:564,&quot;bytes&quot;:268616,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/172128478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qpLf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qpLf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qpLf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qpLf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e9ab030-1f12-4306-af30-8cfc392ba154_1200x1200.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">True equity in identity requires dialogue &#8212; agencies, vendors, regulators, and residents all at the table.</figcaption></figure></div><h2>The Nash Equilibrium of Stakeholders</h2><p>The deeper lesson is that equity in identity isn&#8217;t one-dimensional. It&#8217;s a balancing act across multiple stakeholders:</p><ul><li><p>Residents who need access without barriers.</p></li><li><p>Agencies that must meet service delivery mandates.</p></li><li><p>Regulators demanding compliance.</p></li><li><p>Vendors seeking to grow responsibly.</p></li></ul><p>I often described this as finding a <strong>Nash Equilibrium</strong> &#8212; a state where no single stakeholder&#8217;s needs could be met by disadvantaging another. Achieving this balance came at real cost. Some vendors simply weren&#8217;t able to bear it. Those who did earned credibility that philosophy alone could never buy.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Lhh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Lhh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8Lhh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8Lhh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8Lhh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Lhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg" width="603" height="401.7239010989011" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:603,&quot;bytes&quot;:17449928,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/172128478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8Lhh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8Lhh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8Lhh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8Lhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94864bfb-1b9b-4120-9fd6-50db52c0da3e_6880x4584.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Facilitating cross-agency workshops to translate values into requirements &#8212; where equity becomes design, not afterthought.</figcaption></figure></div><h2>My Approach as an Advisor: The Playbook</h2><p>When people hear &#8220;vendor evaluation,&#8221; they picture an RFP, a demo, and a scoring sheet. In practice, what I led was closer to an <strong>archaeological and sociological excavation</strong>.</p><p>We weren&#8217;t just comparing features. We were interrogating culture, governance, and commitment to equity under pressure.</p><p>Here&#8217;s how I structured the process:</p><p><strong>1. Market Analysis</strong><br>We began by mapping the CIAM, IDM, and IDV landscape. It wasn&#8217;t about who was trending in analyst quadrants, but who had demonstrated credibility in public-sector contexts &#8212; without scandal, without hidden tradeoffs. Doing no harm and preserving trust was non-negotiable.</p><p><strong>2. Workshops with Agencies</strong><br>Each administrative agency had its own reality. Some served urban populations with smartphones; others reached rural communities with limited broadband. We convened workshops to capture these needs directly. Equity wasn&#8217;t abstract &#8212; it was grounded in personas and barriers that residents faced daily.</p><p><strong>3. A Data-Driven Evaluation Framework</strong><br>I developed a transparent, weighted model that scored vendors across functionality, privacy, transparency, and usability. Everyone saw the rules. No vendor could hide behind glossy decks or vague assurances.</p><p><strong>4. Privacy Reviews with Counsel</strong><br>We put attorneys from both sides in the room. That meant parsing terms of service, breach obligations, and data residency policies line by line. Privacy wasn&#8217;t allowed to be a compliance afterthought.</p><p><strong>5. Deep Dives and UX Assessments</strong><br>Beyond demos, vendors faced scenario testing and independent accessibility reviews. Could a visually impaired resident reset their password without calling a help desk? Could someone without a smartphone verify their identity? These weren&#8217;t edge cases &#8212; they were essential.</p><p><strong>6. Customer References</strong><br>We validated with customers &#8212; not just curated references, but independent sources who could speak candidly. Did commitments hold up in production? Did the vendor respond to real-world challenges with transparency and speed?</p><p>This was more than evaluation. It was <strong>a playbook for exposing culture and intent</strong>. Vendors who treated equity as marketing didn&#8217;t survive the process. Those who embedded it into their DNA did.</p><h2>Lessons Learned</h2><p>Several insights stand out from this experience:</p><ol><li><p><strong>Independent validation is everything.</strong> Vendors&#8217; claims mean little without third-party testing and references.</p></li><li><p><strong>Equity is measurable.</strong> It can be designed into evaluation frameworks and scored &#8212; not just spoken about.</p></li><li><p><strong>Privacy and equity by design separate leaders from laggards.</strong> Bolted-on fairness is not fairness at all.</p></li><li><p><strong>Compliance is table stakes.</strong> The differentiator is whether equity and transparency are core to the business model.</p></li></ol><h2>Call to Action</h2><p>For CIOs, CISOs, and policymakers evaluating identity platforms today, the lesson is simple: don&#8217;t settle for vendor philosophy. Demand proof.</p><p>Ask for independent bias testing. Ask to see how consent is captured and revoked. Ask where operations teams are located, and whether customer references validate the promises.</p><p><strong>Digital equity in identity is not a philosophy &#8212; it&#8217;s engineered, tested, and proven. Anything less is just noise.</strong></p><p>* <em>Footnote: One vendor (ID.me) was disqualified from consideration in Washington State due to use of 1:many biometric face matching and <a href="https://cyberscoop.com/id-me-ceo-backtracks-on-claims-company-doesnt-use-powerful-facial-recognition-tech/#:~:text=ID.me%20does%20not%20use%201:many%20facial%20recognition%2C,on%20Wednesday%20confirms%20that%20ID.me%20does%20indeed">subsequent controversy</a>. Their case underscored the importance of transparency, consent, and trustworthiness as non-negotiable prerequisites for public identity systems.</em></p><h2>Additional Resources </h2><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/us/podcast/s3e5-nonconformist-innovation-in-modern-digital-identity/id1651019312?i=1000646718725&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000646718725.jpg&quot;,&quot;title&quot;:&quot;S3E5: 'Nonconformist Innovation in Modern Digital Identity' with Steve Tout (Integrated Solutions Group)&quot;,&quot;podcastTitle&quot;:&quot;The Shifting Privacy Left Podcast&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:3295000,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/us/podcast/s3e5-nonconformist-innovation-in-modern-digital-identity/id1651019312?i=1000646718725&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-02-27T14:00:00Z&quot;}" src="https://embed.podcasts.apple.com/us/podcast/s3e5-nonconformist-innovation-in-modern-digital-identity/id1651019312?i=1000646718725" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/us/podcast/the-pain-cave-the-ciso-edge-steve-tout-on/id1829184179?i=1000722511673&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000722511673.jpg&quot;,&quot;title&quot;:&quot;The Pain Cave &amp; the CISO Edge: Steve Tout on Discipline, Purpose &amp; Digital Equity&quot;,&quot;podcastTitle&quot;:&quot;Drink Coffee. Do Cool Stuff.&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:2850000,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/us/podcast/the-pain-cave-the-ciso-edge-steve-tout-on/id1829184179?i=1000722511673&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2025-08-18T14:00:00Z&quot;}" src="https://embed.podcasts.apple.com/us/podcast/the-pain-cave-the-ciso-edge-steve-tout-on/id1829184179?i=1000722511673" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8ae757efa405083a8f7d04b28c&quot;,&quot;title&quot;:&quot;Ethics, AI, and the Future of Identity Verification&quot;,&quot;subtitle&quot;:&quot;Steve Tout&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/0aNhRIqgrjBbuehYAIkPtH&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/0aNhRIqgrjBbuehYAIkPtH" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8a0feee02218dd4784dda4ae62&quot;,&quot;title&quot;:&quot;Identity Transformation: Crafting Seamless Government UX with Brian Chidester&quot;,&quot;subtitle&quot;:&quot;Steve Tout&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4jtIXfha0vcskqbtz2hMXp&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4jtIXfha0vcskqbtz2hMXp" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;bad0f4c3-fb74-48d3-9967-26df038fa2b5&quot;,&quot;caption&quot;:&quot;Last week, I had the opportunity to join Mat Keller from Okta and Deb Snyder for a timely conversation on CIAM modernization in the public sector. The &#8220;No Wrong Door&#8221; webinar wasn&#8217;t about buzzwords or platform features. It was about real-world barriers, organizational friction, and what it takes to modernize resident IAM without breaking the systems&#8212;or &#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;7 Strategic Insights from My CIAM Modernization Webinar with Okta&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-05-15T19:24:47.239Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!Jkwc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F527b93cc-03f7-49ee-8871-289e55396d9a_631x330.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.strategylayer.com/p/7-strategic-insights-from-my-ciam&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:163655584,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Strategy Layer&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!QgOt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8648a4bf-8dca-4279-a23a-100da89643b8_820x820.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Next-Gen CISO: Leading Beyond Risk and Certs with Jimmy Sanders]]></title><description><![CDATA[Watch now (56 mins) | Cyber leadership is shifting &#8212; and the gulf between yesterday&#8217;s CISO and tomorrow&#8217;s is only growing.]]></description><link>https://www.strategylayer.com/p/the-next-gen-ciso-leading-beyond</link><guid isPermaLink="false">https://www.strategylayer.com/p/the-next-gen-ciso-leading-beyond</guid><pubDate>Fri, 22 Aug 2025 17:42:19 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/171676662/c5c8eeefe982d09fad6286ce23760b1e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>The Strategy Layer Live</em>, we sit down with one of the most respected and candid voices in cybersecurity today &#8212; <strong>Jimmy Sanders</strong>.</p><p>Jimmy is the CISO of Save Mart overseeing more than 200 stores across the West Coast, the former CISO of Netflix DVD, and the current President of ISSA International &#8212; giving him a rare, global vantage point on how the role of CISO is being redefined in real time.</p><p>But this conversation isn&#8217;t just about job titles. It&#8217;s about transformation.</p><p>Together, Steve and Jimmy dive into how the CISO role is shifting from technician to strategist, why governance frameworks often crumble under real-world politics, and what it takes to lead when budgets are flat, expectations are exponential, and trust is the only currency that matters.</p><p><strong>What we cover in this episode:</strong></p><ul><li><p>Why automation must come before AI &#8212; and how to prepare your team for agents</p></li><li><p>The hidden costs of being &#8220;just the technician&#8221; instead of the strategic partner</p></li><li><p>The politics of governance and why frameworks often fail without enforcement</p></li><li><p>How to measure human-centered risk: burnout, fatigue, and decision friction</p></li><li><p>Why trust and presence &#8212; not titles &#8212; determine whether you get heard at the board level</p></li><li><p>The future of the CISO: from risk manager to Chief Trust Officer, or even CIO</p></li><li><p>The limitations of &#8220;people, process, technology&#8221; thinking</p></li></ul><p>And I finally introduced the <strong><a href="https://www.identient.ai/spire/">SPIRE leadership model</a></strong> &#8212; my push to move beyond &#8220;people, process, technology&#8221; into something built for the AI era:<br><br>&#128313; Signals</p><p>&#128313; Performance Intelligence</p><p>&#128313; Insight</p><p>&#128313; Reframing</p><p>&#128313; Execution</p><p>Whether you&#8217;re leading your first security team or steering global strategy, this episode will challenge you to rethink what leadership looks like when the CISO&#8217;s true mandate is to create resilience, not just reduce risk&#8230;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HIAF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HIAF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!HIAF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!HIAF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!HIAF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HIAF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:913382,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/171676662?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HIAF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!HIAF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!HIAF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!HIAF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F198b6ad0-5f5b-4246-9cf2-68f13c9cf84f_1456x1048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.identient.ai/spire/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CDNJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 424w, https://substackcdn.com/image/fetch/$s_!CDNJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 848w, https://substackcdn.com/image/fetch/$s_!CDNJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 1272w, https://substackcdn.com/image/fetch/$s_!CDNJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CDNJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png" width="749" height="987" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:987,&quot;width&quot;:749,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:952580,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.identient.ai/spire/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/171676662?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CDNJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 424w, https://substackcdn.com/image/fetch/$s_!CDNJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 848w, https://substackcdn.com/image/fetch/$s_!CDNJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 1272w, https://substackcdn.com/image/fetch/$s_!CDNJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9060b031-7b07-4bc3-b2cc-8396e6cfb85a_749x987.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Identity Is Moving Faster Than Your Roadmap]]></title><description><![CDATA[What NIST Rev 4 Signals &#8212; and Why CIOs and CISOs Must Act Before 2026]]></description><link>https://www.strategylayer.com/p/identity-is-moving-faster-than-your</link><guid isPermaLink="false">https://www.strategylayer.com/p/identity-is-moving-faster-than-your</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 20 Aug 2025 20:47:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nMeZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When NIST publishes an update to its <a href="https://csrc.nist.gov/pubs/sp/800/63/4/final">Digital Identity Guidelines</a>, many private-sector leaders breathe a sigh of relief: &#8220;Guidelines, not regulations. We can take our time.&#8221; That mindset is dangerous. Rev 4 may not be law, but it is a clear signal of where identity assurance is headed. For CIOs and CISOs, the real question is not <em>&#8220;Do we need to comply?&#8221;</em> but <em>&#8220;Are we ready for the identity landscape of 2026?&#8221;</em></p><p>I&#8217;ve seen this play out before. During my work with Washington State on CIAM modernization, we confronted many of the same issues that NIST has now codified in Rev 4 &#8212; equity and usability in user journeys, sub-account and account-linking for families and caregivers, independent privacy reviews, and fraud signals embedded even at IAL-1. (E.g., Passive new account onboarding) Those decisions weren&#8217;t theoretical; they were the difference between whether citizens could access services fairly and whether fraudsters could exploit weaknesses in our systems.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The lesson then is the lesson now: identity threats evolve continuously. Guidelines like Rev 4 aren&#8217;t a checklist to adopt blindly. They&#8217;re a compass pointing to where attackers, customers, and regulators are already moving. Leaders who treat them that way will shape their roadmaps with foresight. Those who wait will find themselves reacting under pressure.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nMeZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nMeZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!nMeZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!nMeZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!nMeZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nMeZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png" width="522" height="522" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:522,&quot;bytes&quot;:1706714,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/171507196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nMeZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!nMeZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!nMeZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!nMeZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3654b49-b5e9-4d51-af38-aee37eb20e61_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Signals That Matter</strong></h2><p>Revision 4 makes dozens of changes, but not all of them deserve equal weight in the boardroom or in a CIO&#8217;s roadmap. The point isn&#8217;t to memorize every adjustment; it&#8217;s to recognize the signals of direction that will shape identity resilience, customer experience, and risk posture over the next 18&#8211;24 months.</p><p>Several stand out:</p><ul><li><p><strong>Sub-accounts and account linking</strong> acknowledge the real-world complexity of digital lives &#8212; families, caregivers, and delegated authority &#8212; moving identity beyond the single-user model.</p></li><li><p><strong>Equity, accessibility, and privacy</strong> are no longer afterthoughts; they&#8217;re explicit expectations. Designing for inclusivity is becoming inseparable from building trust.</p></li><li><p><strong>Phishing-resistant authenticators and digital wallets</strong> show the shift toward modern, user-controlled trust mechanisms. Passwords and static factors are fading into the background.</p></li><li><p><strong>Fraud detection and account recovery</strong> get sharper attention, reflecting the reality that attackers exploit the weakest seams in identity flows.</p></li><li><p><strong>Continuous evaluation</strong> replaces &#8220;annual reviews&#8221; with a living model of posture &#8212; measuring, adapting, and mitigating in near real time.</p></li></ul><p>None of these should surprise seasoned leaders. They mirror challenges already surfacing in enterprise programs. The real value of Rev 4 is in its ability to crystallize these priorities into a shared language &#8212; one that CIOs and CISOs can use to rally security, product, and business teams around the same identity horizon.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OlTj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OlTj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 424w, https://substackcdn.com/image/fetch/$s_!OlTj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 848w, https://substackcdn.com/image/fetch/$s_!OlTj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 1272w, https://substackcdn.com/image/fetch/$s_!OlTj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OlTj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png" width="445" height="264.775" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1200,&quot;resizeWidth&quot;:445,&quot;bytes&quot;:145892,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/171507196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OlTj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 424w, https://substackcdn.com/image/fetch/$s_!OlTj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 848w, https://substackcdn.com/image/fetch/$s_!OlTj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 1272w, https://substackcdn.com/image/fetch/$s_!OlTj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5701ecd-5b64-4702-8b20-7d3924d40231_1200x714.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Lessons from the Field</strong></h2><p>The signals in Rev 4 aren&#8217;t theoretical for me. I saw them firsthand during my work consulting to the State of Washington on CIAM modernization. Long before NIST put these themes into writing, we had to make hard decisions about how to deliver both security and usability at scale.</p><p>Several priorities stand out from that experience:</p><ul><li><p><strong>Account linking and sub-accounts.</strong> Citizens don&#8217;t interact with government systems as isolated individuals. Families, caregivers, and delegated authorities all need the ability to manage services without breaking trust or security.</p></li><li><p><strong>Equity and usability.</strong> We had to evaluate how different groups experienced the digital journey &#8212; and whether design choices unintentionally excluded or disadvantaged certain users.</p></li><li><p><strong>Independent privacy reviews.</strong> Transparency wasn&#8217;t optional; it was critical for maintaining trust in identity systems that handled sensitive data.</p></li><li><p><strong>Fraud and threat intelligence signals.</strong> Even at IAL-1, we considered checks like email compromise detection to harden flows that attackers were already probing.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0qR0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0qR0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 424w, https://substackcdn.com/image/fetch/$s_!0qR0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 848w, https://substackcdn.com/image/fetch/$s_!0qR0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 1272w, https://substackcdn.com/image/fetch/$s_!0qR0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0qR0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png" width="1456" height="477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:477,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:286602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/171507196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0qR0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 424w, https://substackcdn.com/image/fetch/$s_!0qR0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 848w, https://substackcdn.com/image/fetch/$s_!0qR0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 1272w, https://substackcdn.com/image/fetch/$s_!0qR0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4361350a-8d2e-464a-8196-1d1ea4db8b82_2193x719.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To make these priorities concrete, we developed what we called <strong>Dani&#8217;s Journey</strong> &#8212; a user-centered storyline that every vendor in the evaluation process had to deliver against during proof-of-concepts. Instead of simply asking for compliance with standards, we mapped Dani&#8217;s end-to-end experience across registration, login, profile updates, and service access. Each vendor was judged on whether they could provide:</p><ul><li><p>An <a href="https://open.spotify.com/episode/0aNhRIqgrjBbuehYAIkPtH?si=be9a7472638d449c">equitable and inclusive</a> experience that worked across diverse user groups.</p></li><li><p>A <a href="https://open.spotify.com/episode/4jtIXfha0vcskqbtz2hMXp?si=45b5b5b890e6430b">frictionless journey</a> that reduced unnecessary steps without weakening assurance.</p></li><li><p>Security in context, where fraud detection and MFA were woven naturally into the flow, not bolted on as obstacles. </p></li></ul><p>This approach forced vendors to prove that they could connect identity assurance, security posture, and user experience. And it revealed a truth that Rev 4 now reinforces: continuous risk evaluation is essential because threat actors adapt daily, while users expect consistency and fairness.</p><h2><strong>Why CIOs &amp; CISOs Can&#8217;t Wait for 2026</strong></h2><p>It would be easy to look at NIST Rev 4, note that it isn&#8217;t mandatory for the private sector, and push it down the priority list until the next budget cycle. That would be a mistake. The updates in Rev 4 don&#8217;t describe a distant future; they reflect realities already shaping the digital identity landscape. By the time 2026 arrives, these practices will be table stakes.</p><p>Consider what&#8217;s already in motion:</p><ul><li><p><strong>Phishing-resistant authentication</strong> is no longer experimental. Major platforms and consumer ecosystems are moving aggressively toward passkeys and FIDO2.</p></li><li><p><strong>Fraud detection</strong> isn&#8217;t optional. Attackers are already exploiting the seams of account recovery and low-assurance on-boarding.</p></li><li><p><strong>Digital wallets and user-controlled credentials</strong> are beginning to reshape federation models.</p></li><li><p><strong>Equity and accessibility</strong> are becoming brand-level trust issues as much as technical requirements.</p></li></ul><p>Waiting until 2026 means scrambling to retrofit systems, retrain teams, and react to mounting fraud and user dissatisfaction. Worse, it means letting competitors define the trust baseline while your organization plays catch-up.</p><p>Acting now, on the other hand, provides space to experiment, learn, and evolve without crisis pressure. Leaders who begin assessing their identity posture today &#8212; against Rev 4&#8217;s signals and their own customer journeys &#8212; will enter 2026 with confidence, not anxiety.</p><h2><strong>Strategic Actions for Executives</strong></h2><p>One of the most important lessons I learned in Washington State came from briefing the CISO on CIAM modernization. At the time, cybersecurity was treated as a low priority in the project, overshadowed by usability and program delivery. The result? Gaps opened between cybersecurity and usability &#8212; gaps that were preventable, but only if security leaders got more engaged.</p><p>That&#8217;s the risk for CISOs today. I understand how IAM often lands at number five, six, or seven on a priority list &#8212; behind cloud transformation, endpoint visibility, or regulatory audits. But that doesn&#8217;t mean your influence should be missing. In fact, many of the most consequential changes in NIST Rev 4 are policy-level updates designed to accommodate new technology innovations. And here&#8217;s the catch: just because the technology exists doesn&#8217;t mean the gaps disappear. You know what they say about assumptions.</p><p>This is where proactive leadership matters. CISOs and CIOs need to step forward now &#8212; not as owners of every identity project detail, but as shapers of direction and champions of balance between assurance and experience. Consider these actions:</p><ul><li><p><strong>Get involved early.</strong> Establish forums (like the Identity Security Forum I recommended in Washington State) where security has a seat at the table for program design decisions.</p></li><li><p><strong>Bridge security and usability.</strong> Demand that identity flows be tested through the lens of equity and user experience, not just policy compliance.</p></li><li><p><strong>Challenge assumptions.</strong> Don&#8217;t let your teams or vendors assume that &#8220;new tech&#8221; equals &#8220;no risk.&#8221; Push for fraud detection, continuous monitoring, and independent privacy reviews.</p></li><li><p><strong>Treat IAM as strategic.</strong> Even if it isn&#8217;t your top-3 operational fire, identity is now the foundation of digital trust &#8212; and when it breaks, everything else is exposed.</p></li></ul><p>This is what Rev 4 makes clear: it&#8217;s not about perfect compliance with guidelines, but about proactive, visible leadership from cybersecurity executives. Without it, identity gaps will remain hidden until they become incidents. With it, identity becomes a driver of resilience, trust, and competitive advantage.</p><h2><strong>Identity as a Trust Advantage</strong></h2><p>NIST Rev 4 won&#8217;t appear on your compliance calendar. It won&#8217;t trigger an audit. But it does provide a clear signal of where identity assurance is headed &#8212; and by 2026, these practices will be expected baseline. The question for CIOs and CISOs is whether you will arrive there by design or by scramble.</p><p>The leaders who move now will have the advantage. They will have already pressure-tested their posture, improved customer journeys, and closed gaps before adversaries exploit them. They will have turned identity from a back-office control into a visible trust advantage for their organizations.</p><p>At Identient, we see Rev 4 not as a checklist but as an opportunity for leadership. Our guidance to cybersecurity executives is to begin now by:</p><ul><li><p>Conducting a thorough gap analysis against the Rev 4 guidelines to identify where posture, equity, and resilience need reinforcement.</p></li><li><p>Planning strategic adoption of phishing-resistant authentication methods such as <a href="https://fidoalliance.org/specifications-overview/">FIDO2</a> and synced <a href="https://fidoalliance.org/passkeys/">passkeys</a>, ensuring both workforce and customer readiness.</p></li><li><p>Reevaluating and modernizing identity proofing and federation processes, with attention to wallets, delegated authority, and accessibility.</p></li></ul><p>Rev 4 is not regulation. It is a compass. And for those who choose to act, it is a chance to lead. The CIOs and CISOs who use it to shape their roadmaps now will define the trust advantage of 2026. The rest will be left reacting.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The $2M Detour: When Good Intentions Derail Great Decisions]]></title><description><![CDATA[How one PAM project became a leadership lesson in timing, trust, and telling the truth]]></description><link>https://www.strategylayer.com/p/the-2m-detour-when-good-intentions</link><guid isPermaLink="false">https://www.strategylayer.com/p/the-2m-detour-when-good-intentions</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Tue, 05 Aug 2025 03:21:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DsbI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>The Ask Was Simple. The Cost Wouldn&#8217;t Be.</h2><p>Earlier this year, I was hired to spearhead a privileged access management (PAM) proof of concept (POC) at a $2.5 billion public cybersecurity company. Scope was clear. Expectations were set. Everyone wanted this to work.</p><p>But two weeks in, after a handful of stakeholder interviews, the signals started shifting.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Teams weren&#8217;t just hesitant&#8212;they were resistant. And not in the passive-aggressive, &#8220;we&#8217;ll get to it later&#8221; way. Some of them had already built high-integrity PAM solutions using HashiCorp Vault, with role-based access managed through Okta. These weren&#8217;t hacks or shortcuts. These were engineered, maintained, and trusted.</p><p>The more I listened, the clearer it became: this wasn&#8217;t a PAM problem. It was a non-human identity (NHI) problem. And the proposed solution didn&#8217;t match the shape of the real need.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DsbI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DsbI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DsbI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DsbI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DsbI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DsbI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png" width="540" height="360.1236263736264" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:540,&quot;bytes&quot;:2580932,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/170143673?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DsbI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!DsbI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!DsbI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!DsbI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f76ad0a-386e-4d7a-ae24-feda95bd40a2_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>When the Stakeholders Whisper, You Listen</h2><p>Most CISOs don&#8217;t get the luxury of hindsight in real time. They&#8217;re under pressure to act, perform, and show progress&#8212;fast.</p><p>But in this case, I wasn&#8217;t the one under pressure.</p><p>The VP of Global Cybersecurity &amp; GRC I was advising had aspirations beyond the current org chart. A successful PAM deployment would&#8217;ve been a feather in his cap&#8212;a proof point on his way to the C-suite. He was sharp. He was motivated. But his assumptions were brittle.</p><p>He wanted a centralized PAM system. The org wasn&#8217;t ready.</p><p>What the teams actually needed was a lightweight, internal solution that improved NHI hygiene without rewriting the security culture overnight. Centralizing control would&#8217;ve sparked more friction than value&#8212;politically, technically, and financially.</p><h2>So I Did What a Consultant Is Supposed to Do. I Told the Truth.</h2><p>I stepped back, reframed the problem, and presented the VP with a different option:</p><p><strong>Pivot from PAM to NHI governance.</strong><br><strong>Leverage the existing Vault + Okta + Conductor One integrations.</strong><br><strong>Avoid a disruptive vendor rollout.</strong><br><strong>Save $2M in year one.</strong></p><p>That&#8217;s not the kind of advice that protects your billable hours. But it&#8217;s the kind of advice that protects the customer from self-inflicted wounds.</p><p>We talk a lot about vendor lock-in and feature gaps. But sometimes the real danger is strategic misalignment&#8212;pushing forward because the project is in motion, not because it still makes sense.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CiOL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CiOL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CiOL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CiOL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CiOL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CiOL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png" width="478" height="478" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:478,&quot;bytes&quot;:1691450,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/170143673?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CiOL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!CiOL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!CiOL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!CiOL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60f0b0dd-bf0c-4f13-aabd-63c9e1d03b2c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>You Don&#8217;t Always Need More Tools. You Need More Foresight.</h2><p>How does this happen? In 2026, with all the conferences, research, and chatter on LinkedIn, how does a well-funded cybersecurity firm almost walk straight into a multimillion-dollar misstep?</p><p>Simple: the landscape is changing faster than most teams can track. Tools blur. Categories shift. What looked like a clear roadmap three quarters ago might be outdated today.</p><p>And even if the VP had perfect market intelligence, he still would&#8217;ve faced internal resistance. The engineering teams weren&#8217;t bought in. IT had their own ideas. SREs weren&#8217;t even in the room.</p><p>The risk wasn&#8217;t just a failed implementation. It was organizational backlash, political fallout, and lost trust.</p><h2>The Customer Isn&#8217;t Always Right &#8212; But They&#8217;re Always Worth Protecting</h2><p>This is one of those moments where I didn&#8217;t have all the answers. I wasn&#8217;t the most technical person in the room. I didn&#8217;t know more about Vault or Okta or NHI architecture than the people building it.</p><p>But I <em>did</em> know how to read a room. I knew how to map incentives. I knew what happens when strategy and execution fall out of sync. And I knew when the smartest move was to stop the train before it jumped the track.</p><p>That&#8217;s the real work of a strategic advisor.</p><p>It&#8217;s not about selling the scope. It&#8217;s about saving the system.</p><h2>Start with Feasibility, Not Fantasy</h2><p>If you&#8217;re leading a cybersecurity team right now, here&#8217;s the uncomfortable truth:</p><p>You can execute flawlessly&#8212;on the wrong thing.</p><p>That&#8217;s the story I want to expand from <em><a href="https://www.stevetout.com/book/">The CISO On The Razor&#8217;s Edge</a></em>&#8212;the second CISO from &#8220;A Tale of Two CISOs&#8221; who had the right vision, but the wrong timing. Not because they were na&#239;ve or underprepared. But because they didn&#8217;t step back and ask the harder question:</p><p><strong>Is this right&#8212;for this org, right now?</strong></p><p>The temptation to push forward is strong. Especially when budget is secured, headcount is assigned, and the goal is tied to your performance review. But leading on the razor&#8217;s edge means something different. It means having the guts to pause. To pivot. To protect your people&#8212;even from well-meaning plans.</p><h2>Saving $2M Wasn&#8217;t the Point. Saving Trust Was.</h2><p>A failed PAM rollout would&#8217;ve cost $2 million. But the deeper cost would&#8217;ve been internal fragmentation, eroded credibility, and another data point in the &#8220;security slows us down&#8221; narrative.</p><p>Instead, we shipped something leaner. We built momentum. We delivered a win. And we set the stage for bigger change later&#8212;when the organization is ready to absorb it.</p><p>That&#8217;s how transformation really works.</p><p>Not by forcing tools into cultures that don&#8217;t want them. But by sequencing moves that build trust, reduce noise, and surface insight.</p><h2>Final Thought: The Consultant&#8217;s Real Job Isn&#8217;t Delivery. It&#8217;s Discernment.</h2><p>What most companies need isn&#8217;t more vendors, more dashboards, or more &#8220;strategy in a box.&#8221;</p><p>What they need is someone who can sit across the table and say, &#8220;I hear you. I get it. But I think there&#8217;s a better way.&#8221;</p><p>They need someone who isn&#8217;t afraid to ask:</p><ul><li><p>Is the problem what you <em>think</em> it is?</p></li><li><p>Are you solving for optics or outcomes?</p></li><li><p>Are you ready for what this solution will really change?</p></li></ul><p>This isn&#8217;t theory. This is real leadership, in the real world.</p><p>And sometimes, it looks like walking away from a $2 million implementation&#8212;because the most valuable thing you can build is trust.</p><p><strong>Like this post?</strong><br>If you&#8217;re leading a complex cybersecurity program and wondering if your current path still makes sense, I&#8217;m here to help. Let&#8217;s talk.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Vibe CISOing: The Leadership Skill No Dashboard Can Teach You]]></title><description><![CDATA[Because the most important signals aren&#8217;t technical&#8212;they&#8217;re human.]]></description><link>https://www.strategylayer.com/p/vibe-cisoing-the-leadership-skill</link><guid isPermaLink="false">https://www.strategylayer.com/p/vibe-cisoing-the-leadership-skill</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Sun, 27 Jul 2025 20:48:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hifx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Not all threats come with signatures. Not all misalignments show up in logs. And not all risks are technical.</p><p>Sometimes, the most critical signal in a security program is the vibe.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>That uneasy feeling before a breach. The tension in a cross-functional meeting. The moment when everyone follows the policy&#8212;but no one feels responsible.</p><p>Call it soft. Call it squishy. Or start listening to what it's telling you.</p><p>Because vibe CISOing is real.</p><p>And if we&#8217;re going to move from the old playbook to the next edge of cybersecurity leadership, we need to get serious about what it means.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hifx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hifx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Hifx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Hifx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Hifx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hifx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1839114,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/169400779?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hifx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Hifx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Hifx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Hifx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3db4d9e0-3969-40c7-9101-8d1813a002dd_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">This is Vibe CISOing&#8212;when leadership is a frequency, not just a function.</figcaption></figure></div><p></p><h3>What Is Vibe CISOing?</h3><p>It&#8217;s not about intuition in place of data. It&#8217;s about recognizing that <strong>data isn&#8217;t only what you log&#8212;it&#8217;s what you observe, what you sense, what you create clarity around.</strong></p><p>Vibe CISOing is a mindset and practice that takes the invisible parts of organizational life seriously:</p><ul><li><p>The vibe of a team after a restructure</p></li><li><p>The social cues when developers avoid raising security concerns</p></li><li><p>The energy in the room when a CISO presents to the board</p></li><li><p>The burnout that doesn&#8217;t show up in quarterly KPIs</p></li></ul><p>You&#8217;re not imagining it. You&#8217;re leading in it.</p><p>The vibe is not fluff. It&#8217;s feedback.</p><p>And like all feedback, it&#8217;s either listened to&#8212;or it becomes something you can&#8217;t ignore.</p><h3>Why It Matters Now</h3><p>The pressure is rising.</p><p>Budgets are tightening. Political and economic uncertainty is expanding. And many cybersecurity leaders are being asked to do more with less&#8212;faster, with fewer people, and higher expectations.</p><p>In that kind of pressure cooker, traditional risk models break down. Not because the frameworks are wrong, but because they miss what happens in the gray space:</p><ul><li><p>Where people are confused, overloaded, or incentivized to bypass controls</p></li><li><p>Where entropy accumulates in communication, workflows, or incentives</p></li><li><p>Where the org quietly drifts out of alignment</p></li></ul><p>When leaders stop listening to those signals, they lose the plot. And eventually, they lose the team.</p><h3>From Strategic Multiplier to System Builder</h3><p>In a <a href="https://www.strategylayer.com/p/from-technician-to-strategic-multiplier">recent post</a>, I introduced the idea of the <strong>CISO as a Strategic Multiplier</strong>&#8212;someone who doesn&#8217;t just reduce risk, but expands organizational capacity.</p><p>That&#8217;s the shift: from managing controls to multiplying clarity, trust, and performance.</p><p>But how?</p><p>The best CISOs I know do three things differently:</p><ol><li><p><strong>They listen to the system, not just the stakeholders.</strong> They pick up weak signals, early warning signs, and contradictions in their environment.</p></li><li><p><strong>They shape the narrative.</strong> They give language to what others feel but can&#8217;t articulate&#8212;and use that to reframe decisions and actions.</p></li><li><p><strong>They move with intent.</strong> They don&#8217;t just fix problems; they design conditions for better performance, better outcomes, and a better future.</p></li></ol><p>This is what Vibe CISOing enables.</p><p>It&#8217;s not mystical. It&#8217;s managerial courage and cultural awareness, tuned to the signals that metrics miss.</p><h3>A Better Way to Lead Through Uncertainty</h3><p>We don&#8217;t need more dashboards. We need a different design for leadership.</p><p><strong><a href="https://www.identient.ai/spire">SPIRE</a> is that design.</strong></p><p>It&#8217;s not a feel-good framework or rebrand of soft skills. It&#8217;s a system&#8212;a leadership operating system&#8212;for navigating uncertainty with intention and impact.</p><p>Each letter in SPIRE points to what matters now:</p><ul><li><p><strong>Signal</strong> &#8212; Cut through the noise. Know what&#8217;s actually happening across your org, not just what gets reported in the dashboard.</p></li><li><p><strong>Performance Intelligence</strong> &#8212; Understand how identity, governance, and security directly affect execution, delivery, and trust&#8212;not just compliance.</p></li><li><p><strong>Insight</strong> &#8212; Expose what&#8217;s invisible in static metrics: bottlenecks, misalignment, entropy.</p></li><li><p><strong>Reframe</strong> &#8212; Shift from reactive technician to strategic multiplier. Redefine security as a system of business enablement.</p></li><li><p><strong>Execution</strong> &#8212; Close the loop. Ensure that what you know turns into what gets done&#8212;with clarity, cadence, and consequences.</p></li></ul><p><strong>SPIRE is not just a mindset&#8212;it&#8217;s a method.</strong><br>And when paired with SPI 360, it gives CISOs and cybersecurity leaders a way to observe, measure, and act in alignment with the system they&#8217;re actually running&#8212;not just the one they hope they&#8217;re running.</p><p>This is how we lead differently.<br>Not by forcing performance, but by creating the conditions where high performance is inevitable.</p><h3>The Conversation Continues</h3><p>Join me and Jimmy Sanders <strong>tomorrow at Noon PT</strong> for a bold conversation about the next generation of cybersecurity leadership.</p><p>We&#8217;ll talk about:</p><ul><li><p>What&#8217;s really broken in today&#8217;s CISO model</p></li><li><p>How governance must evolve as a <a href="https://www.strategylayer.com/p/governance-should-be-a-living-doctrine">living doctrine</a></p></li><li><p>And why no one can lead the next era alone</p></li></ul><p>&#127919; <strong><a href="https://www.linkedin.com/events/thenext-genciso-leadingbeyondri7343023472064765953/theater/">Register here</a></strong>: Strategy Layer Live &#8212; Monday, July 28th, Noon PT / 3:00 ET</p><p>Let&#8217;s bring more clarity, courage, and creativity into how we lead.</p><p>Because if we don&#8217;t tune into the signals&#8212;we&#8217;ll be the ones sending the wrong ones.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/events/thenext-genciso-leadingbeyondri7343023472064765953/theater/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3lUM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!3lUM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!3lUM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!3lUM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3lUM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:920642,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/events/thenext-genciso-leadingbeyondri7343023472064765953/theater/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/169400779?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3lUM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!3lUM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!3lUM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!3lUM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb82f0b7d-7caf-46b5-a61a-49106126cc20_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How To CISO with Andy Ellis]]></title><description><![CDATA[Listen now | Leadership Lessons for the Next-Gen Security Executive]]></description><link>https://www.strategylayer.com/p/how-to-ciso-with-andy-ellis</link><guid isPermaLink="false">https://www.strategylayer.com/p/how-to-ciso-with-andy-ellis</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Thu, 03 Jul 2025 14:48:05 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167440574/07656c760ba3c693b9d447aa3469bde9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>The Strategy Layer Live</em>, we sit down with one of the most trusted and pragmatic voices in cybersecurity leadership today &#8212; Andy Ellis.</p><p>Andy is the former CSO of Akamai, a CISO Hall of Fame inductee, leadership coach, and the author of <em>How To CISO 1.1</em> &#8212; a sharp, experience-driven guide for navigating the first 91 days and beyond as a security leader.</p><p>But this conversation isn&#8217;t just about onboarding. It&#8217;s about enduring.</p><p>Together, Steve and Andy unpack how the CISO role is evolving &#8212; not just in scope, but in identity &#8212; and what it takes to lead effectively when frameworks fall short, trust is fractured, and security teams are expected to protect systems they don&#8217;t fully control.</p><p>What we cover in this episode:</p><ul><li><p>Andy&#8217;s vision behind <em>How to CISO</em> and why version 1.1 matters</p></li><li><p>The Zero Trust paradox and how it undermines human trust when misapplied</p></li><li><p>Why your &#8220;first 91 days&#8221; might be more telling than your title</p></li><li><p>The difference between control, clarity, and presence in the boardroom</p></li><li><p>What Andy sees coming next &#8212; and why the CIO may outlast the CISO</p></li></ul><p>Whether you're a first-time CISO or a seasoned operator, this episode will challenge how you think, lead, and speak inside the enterprise.</p><p>&#127897;&#65039; Check out Andy&#8217;s work: <a href="https://www.howtociso.com">https://www.howtociso.com</a> </p><p>&#128216; Learn more about Steve's book, <em>The CISO On The Razor&#8217;s Edge</em>: <a href="https://www.stevetout.com/book">https://www.stevetout.com/book</a></p>]]></content:encoded></item><item><title><![CDATA[Governance Should Be a Living Doctrine — So Why Are We Measuring It Like It's Dead?]]></title><description><![CDATA[Beyond static scorecards: How Strategic Performance Intelligence transforms governance measurement for modern CISOs]]></description><link>https://www.strategylayer.com/p/governance-should-be-a-living-doctrine</link><guid isPermaLink="false">https://www.strategylayer.com/p/governance-should-be-a-living-doctrine</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 02 Jul 2025 05:19:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5fc16b64-a6b7-44aa-94d4-d45f7cc0d15a_600x338.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few days ago I asked: <a href="https://www.strategylayer.com/p/governance-existsbut-does-it-work">does your governance actually work?</a></p><p>Here's a tougher question: how would you even know?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The <a href="https://a.co/d/j5yg2C5">CCISO Certified Chief Information Security Officer All-in-One Exam Guide</a> (2020) calls governance a "living doctrine"&#8212;something that evolves with your organization, adapts to new threats, and aligns with shifting business priorities. But here's what no one says out loud: Most organizations are measuring governance like it's dead. Stuck in last quarter's PowerPoint. Buried in a maturity model that hasn't been updated since 2019. Reduced to a dashboard that shows the same green checkmarks month after month, telling you nothing about what's actually happening beneath the surface.</p><h2>Governance Is a Living System. Your Measurement Approach Should Be Too.</h2><p>The CCISO All-in-One Guide gets the philosophy right. It emphasizes that CISOs should define a security charter that evolves with the organization, demonstrates clear alignment with business goals, and shows measurable progress. It even calls for measuring governance ROI and performance&#8212;not just controls and compliance.</p><p>The spirit of that guidance? Spot on. The tools we use to execute it? Still trapped in 2010.</p><p>We're using balanced scorecards designed for manufacturing plants. Maturity models that assume linear progression. Static dashboards that report on the past instead of informing the future. Excel spreadsheets masquerading as strategic intelligence.</p><p>Then we wonder why board conversations feel like theater. Why security investments are impossible to justify in business terms. Why the same issues resurface after every incident review, despite our "lessons learned" sessions.</p><h2>The Dangerous Illusion of Measurement</h2><p>Here's how most organizations "measure" governance today. They check whether activities happened:</p><ul><li><p>Did we review the security charter this year? &#9989;</p></li><li><p>Do we track open risk items in a register? &#9989;</p></li><li><p>Did we present metrics to the board quarterly? &#9989;</p></li><li><p>Is our maturity score improving year-over-year? &#9989;</p></li></ul><p>Congratulations. You've proven that meetings occurred and documents exist.</p><p>But these checkbox metrics mask critical realities:</p><ul><li><p>How quickly governance adapts when business priorities shift</p></li><li><p>Whether your security teams have genuine strategic clarity</p></li><li><p>Where <a href="https://www.identient.ai/entropy-scorecard/">organizational entropy</a> is building silently</p></li><li><p>If the governance model itself creates value or just compliance theater</p></li></ul><p>When real pressure hits&#8212;during an M&amp;A, a sophisticated attack, or a strategic pivot&#8212;these surface measurements offer no guidance. Governance collapses precisely when leadership needs it most.</p><h2>What Living Governance Actually Feels Like</h2><p>At its best, governance isn't a compliance burden or administrative overhead. It's an enterprise capability&#8212;a strategic muscle that strengthens with use, flexes under pressure, and builds organizational resilience.</p><p>Living governance should:</p><ul><li><p>Surface strategic misalignments before they become critical failures</p></li><li><p>Guide investment decisions with real-time business context</p></li><li><p>Connect cybersecurity outcomes directly to enterprise value</p></li><li><p>Improve your ability to lead through uncertainty and change</p></li></ul><p>But achieving this requires fundamentally rethinking how we measure and manage governance. Static assessments and backward-looking metrics won't cut it. You need intelligence systems designed for dynamic environments.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!86Yv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!86Yv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 424w, https://substackcdn.com/image/fetch/$s_!86Yv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 848w, https://substackcdn.com/image/fetch/$s_!86Yv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 1272w, https://substackcdn.com/image/fetch/$s_!86Yv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!86Yv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png" width="465" height="445.0366492146597" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:914,&quot;width&quot;:955,&quot;resizeWidth&quot;:465,&quot;bytes&quot;:270094,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/167326349?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!86Yv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 424w, https://substackcdn.com/image/fetch/$s_!86Yv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 848w, https://substackcdn.com/image/fetch/$s_!86Yv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 1272w, https://substackcdn.com/image/fetch/$s_!86Yv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31418d2f-4626-4866-81dd-0d590142b9ae_955x914.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Enter Strategic Performance Intelligence: The SPI 360 Approach</h2><p>This is where Strategic Performance Intelligence changes the game. <a href="https://www.identient.ai/demo/">SPI 360</a> wasn't built as another dashboard or GRC platform. It's a strategic leadership system designed for the complexity and velocity of modern enterprise security.</p><h3>1. Continuous Strategic Alignment, Not Annual Reviews</h3><p>Your security program operates in a dynamic business environment. Market conditions shift. Threats evolve. Priorities change quarterly. SPI 360 maintains live alignment between governance structures and enterprise goals&#8212;not through annual reviews, but through continuous intelligence gathering and pattern recognition.</p><h3>2. Value Creation Metrics That Matter</h3><p>Forget vanity metrics and meaningless percentages. SPI 360 translates governance effectiveness into business language that resonates in the boardroom. It surfaces the actual impact of governance improvements on risk reduction, operational efficiency, and strategic agility&#8212;with data that CFOs and CEOs actually care about.</p><h3>3. Early Warning Systems for Governance Drift</h3><p>Where is organizational energy being wasted? Which governance processes are creating friction instead of value? SPI 360 detects weak signals and emerging patterns before they cascade into systematic failures. It's the difference between preventing governance breakdown and explaining it afterward.</p><h3>4. Adaptive Response to Strategic Shocks</h3><p>Whether facing an acquisition, responding to a breach, or navigating leadership transitions, SPI 360 provides leaders with a live system for rapid recalibration. No more scrambling to update static documents or create emergency dashboards. The intelligence is already there, ready for strategic decision-making.</p><h3>5. Enterprise-Wide Visibility Without Information Overload</h3><p>Governance touches every corner of your organization&#8212;security, IT, legal, operations, finance. SPI 360 creates shared visibility across stakeholder groups without drowning them in data. Each leader sees what matters for their decisions, while maintaining enterprise coherence.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pgJ3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pgJ3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pgJ3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pgJ3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pgJ3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pgJ3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg" width="600" height="338" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:338,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82579,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/167326349?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pgJ3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pgJ3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pgJ3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pgJ3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bce9417-ece0-49b2-b6cb-2cb76010a5be_600x338.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Identient&#8217;s SPI 360 is the first platform designed to unify strategic, operational, and governance insights&#8212;giving CIOs and CISOs the intelligence they need to drive performance, reduce friction, scale effectively, and empower their teams.</figcaption></figure></div><h2>From Static Documents to Living Intelligence</h2><p>Let's face an uncomfortable truth: that beautifully crafted governance framework sitting in SharePoint? The one that took six months to develop and get approved? It became obsolete the day after the board signed off.</p><p>What you need isn't better documentation. You need living intelligence that evolves with your organization, learns from your operations, and strengthens your leadership.</p><p>That's the transformative gap SPI 360 fills.</p><p>Because governance isn't a one-time declaration captured in a PDF. It's a living discipline that requires continuous sensing, adaptation, and evolution. And it's time we started measuring it like one.</p><p>Modern enterprises don't need more governance frameworks. They need governance intelligence&#8212;systems that transform static policies into dynamic capabilities, converting compliance obligations into competitive advantages.</p><h2>Ready to Bring Your Governance to Life?</h2><p>If you're tired of measuring governance like it's a corpse instead of a living system&#8212;if you're ready to transform compliance theater into strategic capability&#8212;it's time to explore Strategic Performance Intelligence.</p><p>Ready to discover what your governance system can really do? Let's map the system and build a stronger foundation for what comes next.</p><p><strong><a href="https://meet.identient.ai">Book a Strategy Call</a> | <a href="https://www.identient.ai/demo/">SPI 360 Demo</a></strong></p><p><em>Because the best time to evolve your governance measurement was yesterday. The second best time is now.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.strategylayer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Strategy Layer! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.linkedin.com/events/7343023472064765953/comments/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vxWY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 424w, https://substackcdn.com/image/fetch/$s_!vxWY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 848w, https://substackcdn.com/image/fetch/$s_!vxWY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 1272w, https://substackcdn.com/image/fetch/$s_!vxWY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vxWY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png" width="442" height="442" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:900,&quot;width&quot;:900,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:640691,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.linkedin.com/events/7343023472064765953/comments/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.strategylayer.com/i/167326349?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vxWY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 424w, https://substackcdn.com/image/fetch/$s_!vxWY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 848w, https://substackcdn.com/image/fetch/$s_!vxWY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 1272w, https://substackcdn.com/image/fetch/$s_!vxWY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eb3561b-5714-4fa2-b6e8-da4432658a58_900x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item></channel></rss>