CP MoreyCP Morey

CP Morey

Chief Marketing Officer

Expertise
  • Working with early-stage founders and executives to build companies in fast growing markets.
Education
  • BBA in Accounting & Finance, University of Cincinnati
  • MBA in Marketing, Thunderbird School of Global Management
Certifications
  • CPA
About the author

CP Morey brings over 20 years of cybersecurity expertise to his role as Chief Marketing Officer at Reach Security. Previously, he led security marketing at Splunk, driving growth across a portfolio representing over half the company’s revenue. CP joined Splunk through the acquisition of Phantom, where he helped define a new market category and establish the company as a leader. His career includes leadership roles at Cisco, Sourcefire, and ISS.

Articles by

CP Morey

All articles
arrow rightarrow right
Zero Trust Adoption: Moving from Concept to Execution

Zero Trust isn’t a product or a one-time implementation, it’s a strategic approach to cybersecurity that continuously evolves. Yet, many organizations struggle to move beyond theoretical frameworks and turn Zero Trust into real-world security improvements.

What is Security Optimization? How to Find Gaps in Your Stack

True security optimization isn’t about buying more technology; it’s about maximizing the impact of the tools you already have. This means shifting from a reactive, tool-centric approach to a proactive, outcome-driven strategy; one that ensures security investments deliver measurable risk reduction.

What is Configuration Drift? 5 Best Practices for Your Team's Security Posture

Left unchecked, configuration drift increases exposure to cyber threats. Yet, many organizations remain unaware of how much drift has occurred until an audit, incident, or breach exposes the issue. Understanding what configuration drift is, how it happens, and how to prevent it is critical for maintaining a strong security posture.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit: