CP MoreyCP Morey

CP Morey

Chief Marketing Officer

Expertise
  • Working with early-stage founders and executives to build companies in fast growing markets.
Education
  • BBA in Accounting & Finance, University of Cincinnati
  • MBA in Marketing, Thunderbird School of Global Management
Certifications
  • CPA
About the author

CP Morey brings over 20 years of cybersecurity expertise to his role as Chief Marketing Officer at Reach Security. Previously, he led security marketing at Splunk, driving growth across a portfolio representing over half the company’s revenue. CP joined Splunk through the acquisition of Phantom, where he helped define a new market category and establish the company as a leader. His career includes leadership roles at Cisco, Sourcefire, and ISS.

Articles by

CP Morey

All articles
arrow rightarrow right
Compensating Controls: The Unsung Heroes of Cyber Resilience

Most security teams know what the “right” controls look like on paper. But real-world environments rarely match the blueprint. Between legacy systems, limited staffing, and overlapping tools, the gap between what’s ideal and what’s feasible is often wide.

Security Control Management: The New Mandate for Risk-Driven Security

Security teams today aren’t short on tools. Most environments are packed with security controls—spanning email, identity, network, endpoint, and cloud. But despite this abundance, risk remains stubbornly high. Attacks continue to land. Exposure persists.

What is Security Optimization? How to Find Gaps in Your Stack

True security optimization isn’t about buying more technology; it’s about maximizing the impact of the tools you already have. This means shifting from a reactive, tool-centric approach to a proactive, outcome-driven strategy; one that ensures security investments deliver measurable risk reduction.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Just Released: AI Buyer’s Guide for Security Architects
Get the Guide
arrow rightarrow right