Configure → Drift → Breach → Repeat: The Cycle of Cybersecurity Control Configuration Risk
Get the reportCP Morey brings over 20 years of cybersecurity expertise to his role as Chief Marketing Officer at Reach Security. Previously, he led security marketing at Splunk, driving growth across a portfolio representing over half the company’s revenue. CP joined Splunk through the acquisition of Phantom, where he helped define a new market category and establish the company as a leader. His career includes leadership roles at Cisco, Sourcefire, and ISS.

Left unchecked, configuration drift increases exposure to cyber threats. Yet, many organizations remain unaware of how much drift has occurred until an audit, incident, or breach exposes the issue. Understanding what configuration drift is, how it happens, and how to prevent it is critical for maintaining a strong security posture.
Most security teams know what the “right” controls look like on paper. But real-world environments rarely match the blueprint. Between legacy systems, limited staffing, and overlapping tools, the gap between what’s ideal and what’s feasible is often wide.
Security teams today aren’t short on tools. Most environments are packed with security controls—spanning email, identity, network, endpoint, and cloud. But despite this abundance, risk remains stubbornly high. Attacks continue to land. Exposure persists.
To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:
© 2026 Reach Security.
Terms of use