CP MoreyCP Morey

CP Morey

Chief Marketing Officer

Expertise
  • Working with early-stage founders and executives to build companies in fast growing markets.
Education
  • BBA in Accounting & Finance, University of Cincinnati
  • MBA in Marketing, Thunderbird School of Global Management
Certifications
  • CPA
About the author

CP Morey brings over 20 years of cybersecurity expertise to his role as Chief Marketing Officer at Reach Security. Previously, he led security marketing at Splunk, driving growth across a portfolio representing over half the company’s revenue. CP joined Splunk through the acquisition of Phantom, where he helped define a new market category and establish the company as a leader. His career includes leadership roles at Cisco, Sourcefire, and ISS.

Articles by

CP Morey

All articles
arrow rightarrow right
The Definitive Guide to Security Misconfiguration

The constant evolution of today's threat landscape has organizations counting on security controls to keep the bad actors out and safeguard their people, sensitive data, critical infrastructure, operations, and brand. However, even the most sophisticated security tools can present a risk to organizations when they are improperly configured. And unfortunately, even the best security teams can make mistakes. Whether it’s a firewall rule left too permissive, a mismanaged IAM rule, or an EDR process monitoring bypass, the implications can range from severe financial loss to risks with the customer base that can lead to significant and sometimes irreparable reputational damage.

7 Practical Steps to Implement Zero Trust

Zero Trust is no longer a novel idea, it's a security imperative. While most organizations have embraced Zero Trust in principle, putting it into practice is another story.

Posture Management: A Modern Approach to Building Security That Holds

Security posture is the ability of your environment to withstand real-world threats, not just meet compliance requirements. Strong posture doesn’t just reflect what’s present. It reflects how well your protections are working, how proactively you reduce risk, and how resilient your systems are when tested.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Just Released: TAG Cyber's ROI analysis of the Reach platform
Read the Report
arrow rightarrow right