Mike Fitzpatrick

13.9K posts

Mike Fitzpatrick banner
Mike Fitzpatrick

Mike Fitzpatrick

@ncxceo

Founder & CEO, @NCXGroup Cyber Risk as a Business Decision | Distinguished Fellow, Ponemon Institute

Los Angeles, CA Katılım Aralık 2009
9.1K Takip Edilen9.8K Takipçiler
Sabitlenmiş Tweet
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Most businesses still think cyber readiness is about tools, policies, and passing an audit. The market does not see it that way anymore. Today, cyber risk is part of how your business proves it is well run, insurable, investable, and ready for scrutiny. Buyers, insurers, regulators, and major partners are not asking what you believe about your security. They are asking what you can prove. That shift changes everything. lnkd.in/gZsK8_rK
English
0
0
0
60
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
AI tools are reshaping compliance and risk management, but here’s the catch: over-trusting AI can lead to costly mistakes. From “automation bias” to contextual blind spots, AI hallucinations can create false confidence in your security posture. The fix? Build a culture of active skepticism. Measure hallucination rates, monitor drift, and ensure every AI-generated decision has human accountability. Remember, compliance isn’t about language—it’s about proof. Don’t let AI errors become your next business liability. f.mtr.cool/ztyvwborcp
English
0
0
0
5
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Cyber risk is a business issue, but executives are busy running their business. That’s why I created the "Bite Size Security" podcast. It's a way to give CEOs, CFOs, and executives the insights they need to tackle cyber risk head-on. In under 10 minutes, each episode delivers practical, no-fluff advice on topics like: - Why most incident response plans fail - How cyber risk impacts business valuation - The hidden vulnerabilities no firewall can stop Catch the latest episodes on Apple Podcasts or Spotify. Let’s simplify risk so you can take smart risks. f.mtr.cool/jorhzzxcdi
English
0
0
0
10
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Imagine finding the keys to a global bank’s infrastructure lying around on a public website. That’s exactly what researchers uncovered—API credentials granting access to cloud platforms, payment systems, and even firmware repositories. This isn’t just a technical slip-up; it’s a wake-up call for businesses everywhere. Credentials like these are goldmines for attackers, enabling malicious updates and data breaches. The solution? Regular audits, secure coding practices, and treating API security as a boardroom priority. We simplify risk so you can take smart risks. Don’t wait for a breach to act. f.mtr.cool/mktlrgikpe
English
0
0
0
30
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Your cybersecurity is only as strong as your weakest vendor. With 35% of breaches starting from third-party networks, it’s time to stop focusing solely on your firewalls and start scrutinizing theirs. Geopolitical conflicts, AI-driven automation, and third-party risks are reshaping the threat landscape. The lesson? Cyber risk isn’t just an IT issue—it’s a business issue. Forward-thinking organizations are elevating OT security to the board level and implementing ransomware-resilient backups. If I were a cybercriminal, I’d target the weakest link. Don’t let it be your partners. Plan for disruption, invest in resilience, and prepare for failures beyond your control. f.mtr.cool/pcajgikvqy
English
0
0
0
7
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Apple's recent move to expand iOS 18.7.7 updates is a wake-up call for businesses still running older devices. The DarkSword exploit—a six-vulnerability chain—turns a simple website visit into a data breach, exposing messages, passwords, and even crypto wallets. About 20% of iOS devices remain unpatched, leaving a significant attack surface. The solution? Push updates now or enable Lockdown Mode for high-risk users. Cyber risk is real, but smart actions today can protect your business tomorrow. f.mtr.cool/owcvotiqth
English
0
0
0
176
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
The most dangerous cyber threat your organization faces right now isn't a breached network. It is data you can no longer trust. For years, executives have focused entirely on keeping data safe. Now, the critical question has shifted from whether our data is secure to whether we can actually rely on it. When you lose data integrity, you lose your foundation for making sound business decisions. This creates immense operational risks: - AI blind spots: Artificial intelligence operates as a black box and does not question its inputs. Models trained on poisoned or skewed data do not fail. They simply produce harmful outcomes that look completely legitimate to the user. - Eroding confidence: When data is duplicated across teams without clear ownership or governance, the source of truth quickly degrades. - Strategic vulnerability: You cannot lead effectively if the information guiding your enterprise is compromised. Data integrity is not an IT problem. It is a fundamental leadership mandate. Organizations that treat data trust as a strategic advantage will innovate and compete, while those that ignore it will fly blind. A recent piece in SecurityWeek breaks down why defending data trust is the next major frontier for business leaders: f.mtr.cool/fhohobrjmd How is your board verifying the integrity of the data driving your strategic initiatives?
English
0
0
0
8
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
In every major transaction today, cyber risk is the new price chip. Most business owners think their cyber risk is handled until a buyer asks for hard proof. If you wait for the diligence phase to uncover your security gaps, you hand the buyer exactly what they want: leverage to chip away at your valuation. You might have a great internal IT team or a trusted Managed Service Provider. But relying solely on them to prepare you for external diligence is a massive oversight. It is exactly like asking a company to audit its own financial books. Buyers demand independent validation. Without it, unvalidated cyber risk leaves you exposed to real consequences at the negotiation table: - Stalled deal momentum - Reduced negotiating leverage - Damaged leadership credibility Strategic readiness requires an independent look at your defenses before the data room ever opens. Building a defensible posture early protects your valuation and keeps your deal on track. How early are you building independent cyber validation into your exit strategy? Visit the website to learn more on preparing your business before diligence begins f.mtr.cool/mleorumsfb
English
0
0
0
8
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
The attack surface has shifted. Endpoints are no longer the primary target. As a recent CSO Online article points out, APIs are the new perimeter. The problem is that most organizations still rely on traditional defenses like EDR and WAF. Those tools were built for yesterday's problems. They miss business-logic abuse and credential stuffing because, to them, API abuse just looks like normal, valid traffic. Add AI to the mix—and the risk multiplies. Ungoverned APIs expose sensitive data, disrupt operations, and complicate insurance renewals. If you want to protect your business without slowing it down, you want to treat APIs as first-class security assets. Check out the full article here: f.mtr.cool/vybuclxtip How is your team handling API governance? Share your thoughts below.
English
0
0
1
17
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
A CEO recently told me, "We have cyber handled. We spend about a million a year." I asked, "What is the average cost of a breach in your industry?" Silence. That silence is the cybersecurity spending trap. Too many leaders believe that writing a check for IT equals security. But buying software and calling yourself secure is like buying gym equipment and calling yourself fit. Cybersecurity isn't a purchase. It's a discipline. Right now, most companies are over-investing in tools and under-investing in testing and governance. They are funding failure because they cannot actually prove their cyber maturity to an underwriter, a regulator, or a buyer. I published an article on how to escape the illusion of security and align your cyber spending with actual business risk on the NCX Group website. Read the full article here to see where you stand: f.mtr.cool/ibatwzkagw At NCX Group, we simplify risk so you can take smart risks. Don't be a CEO who thinks you’re covered, but aren’t. Take your business seriously and if you need support, get in touch.
Mike Fitzpatrick tweet media
English
0
0
0
12
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Imagine handing the master key to your entire office building to a trusted vendor, only to find out someone stole their uniform and is walking out with your corporate files. That is exactly what just happened with one of the most popular software building blocks in the world. A tool called Axios, which gets downloaded 100 million times every single week, was recently compromised. Attackers hijacked a maintainer account to plant a Remote Access Trojan right into the update pipeline. This was not a lazy attack. Whether your team uses Windows, macOS, or Linux, the attackers built a specific, self-destructing payload designed to silently open a backdoor into your network. Read the full breakdown of this sophisticated attack and learn the practical steps you can take to secure your development pipeline: f.mtr.cool/mxdjbnaypx
English
0
0
0
15
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Most CEOs say their boards have the right experience to help them navigate disruption. Yet, nearly three-quarters of those same CEOs admit they are struggling to set basic priorities. There is a massive gap between the talent sitting in the boardroom and the actual support the executive team receives. Read the full breakdown on how modern boards must rethink their approach to advising CEOs and driving strategic value: f.mtr.cool/xgvxawhvxk What has your experience been like with boards?
English
0
0
1
28
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Think of public AI like a brilliant intern. They work incredibly fast, but they don't know which company secrets to keep quiet. Right now, your team is using ChatGPT to save time. But what seems like a completely "harmless" productivity prompt can act as a covert channel, silently exfiltrating your sensitive corporate data. When that data leaks, you are looking at: Compliance failures (like HIPAA or PCI) Potential cyber insurance denials Lost leverage if your organization is prepping for a deal Read the article to understand exactly how this data exfiltration happens and the practical steps you can take to protect your business while using AI tools: f.mtr.cool/whegrxhgts How do you protect your business without getting in the way of running it?
English
0
1
1
22
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
No one told you that cybersecurity was so critical until the audit passed, but the breach happened anyway. Passing a compliance audit feels like a win. You check the boxes, file the paperwork, and get back to running your company. But compliance is just the beginning, not the finish line. You're not covered just because you meet regulatory checklists. These frameworks do not stop active threats. In this episode of the Bite Size Security podcast, I break down why "checking the boxes" won't save your business—and what you actually need to prioritize to protect your resilience. Listen to "Compliance vs. Security - Why "Checking the Boxes" Won't Save Your Business" episode on Spotify here: f.mtr.cool/vzfmvndkzo
English
0
0
0
5
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
If an AI agent goes off the rails in your environment, how long would it take your team to shut it down? When companies deploy autonomous AI to improve efficiency, but fail to account for the operational risk this becomes a problem. As a recent Harvard Business Review article points out, AI agents act a lot like malware. They can operate independently, interact with live databases, and cause real harm if left unchecked. To keep your business moving forward without introducing unpriced risk, leadership must enforce strict controls: - Align security and legal teams early to build safeguards into every agent. - Clearly define the agent's boundaries to ensure the business value outweighs the potential downside. - Implement a mandatory kill switch for every autonomous program. If you grant an AI agent autonomy, you must be able to take it back instantly. Read the full article to learn how to contain the risks of AI agents before they impact your bottom line: f.mtr.cool/hdnvwobnmh
English
0
0
0
15
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
For a long time, cybersecurity readiness was assumed. If you had a strong IT team and no major incidents, you were considered safe. That world no longer exists. Today, readiness is tested by people outside your organization. Buyers, insurers, and partners aren't asking if you feel prepared. They demand proof. When your business faces external scrutiny, point-in-time checklists quickly collapse. To protect your valuation and build trust, you need evidence of: - Clear leadership ownership - Tracked and revisited security actions - Defensible risk decisions Read the full article to learn how to demonstrate your cyber risk readiness: f.mtr.cool/rvsfczedjv
English
0
0
0
9
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Think you have time to patch? Think again. Attackers weaponized the critical Oracle WebLogic vulnerability (CVE-2026-21962) the exact same day the exploit was published. Get the mitigation steps here: f.mtr.cool/igtbsonahe
English
0
0
0
55
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
Most CEOs genuinely believe their IT group has cybersecurity handled. But delegation without validation creates a blind spot that destroys business value. I call this comfortable ignorance protected by process. You hire an MSP, deploy security tools, and check compliance boxes. It feels safe. The problem is that operational responsibility is not the same as risk ownership. Read my full article to learn why independent validation is critical to protect your business: f.mtr.cool/wdhmtudjyo
Mike Fitzpatrick tweet media
English
0
0
0
24
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
A cyber near-miss isn't a time to celebrate. It's a chance to fix your architecture before an attack hits your revenue. Stop blaming employees. Learn from the close calls. Use near-misses to validate your security posture and insurance readiness. Read the full article: f.mtr.cool/jilylrbbhp
English
0
0
0
34
Mike Fitzpatrick
Mike Fitzpatrick@ncxceo·
67% of leaders are excited about AI, but only 5% have it operational. In that gap? Over 100k shadow AI apps running unseen. Read the full article for more insights: f.mtr.cool/dhrevgxvsk
English
0
0
0
13