Leadership • Security • Execution

James’ Rules for Cybersecurity (2025)

Operating principles for CISOs and security leaders, built for modern enterprises where influence, clarity, and integrity move risk down and reliability up.

Last Updated: September 3, 2025

Index

Rules

#1

No single throat to choke.

Design governance so no one person can dictate security outcomes, use peer review, change control, and separation of duties.

#2

Influence is the control plane.

Security wins through persuasion and partnership; build coalitions with product, engineering, legal, and operations.

#3

Beware false simplicity.

If it looks easy, you’re missing complexity. Seek expertise before committing to security positions or designs.

#4

Sleep on irreversible choices.

For non-urgent decisions, require a cool-off period; for incidents, rely on pre-approved playbooks and act decisively.

#5

Decide on data, or state the guess.

Use telemetry, evidence, and risk models; when certainty is impossible, label assumptions and time-box a follow-up.

#6

Hire for judgment and integrity.

“People picking” is the CISO’s leverage. Prioritize ethics, curiosity, and delivery over résumés and tooling familiarity.

#7

Tell the truth, especially up the chain.

Precision beats spin. Inaccurate status is technical debt that compounds.

#8

Integrity is your ultimate control.

Openness and honesty build trust with customers, regulators, and the board, critical when things go wrong.

#9

Invite dissent; pay for it if needed.

Red teams, external reviews, and peer advice are force multipliers. Make listening a muscle, not a motto.

#10

Access given is risk accepted.

Least privilege by default; treat every grant as a durable liability and review it continuously.

#11

Delegate ownership, not tasks.

Once you assign responsibility, get out of the way. Coach in the open; don’t override in the shadows.

#12

If it’s not written, it’s not real.

Document policies, standards, SLAs, and risk acceptances. Memory fades; paper (and tickets) persist.

#13

Deadlines don’t mitigate risk.

Escalate when time pressure collides with safety. “We were late” is not a control.

#14

Make security visible, without theater.

Communicate roadmaps, metrics, and trade-offs. Optics support outcomes, but never replace them.

#15

Resilience funds the mission.

Cash flow equates to availability. Protect the revenue path first: identity, payments, uptime, and fraud controls.

#16

Evolve or be outpaced.

Threats adapt; so must we. Continuously raise the bar on detection, identity, and third-party risk.

#17

Blame fixes nothing; learning fixes everything.

Encourage reporting, run blameless reviews, and change systems so the same mistake can’t recur.

#18

Plan to capacity.

Plan capacity based on available resources and organizational priorities. Sequence and scope work realistically to ensure commitments can be met reliably and effectively.

#19

Value finishers.

The rare trait is getting things done. Define “done” to include testing, documentation, and operational readiness.

#20

Your calendar is a strategy doc.

If it’s packed, you’re not delegating. Reserve time for risk, people, and architecture.

#21

Meeting sprawl is risk sprawl.

Favor concise decision memos and async updates. Aim to reduce meeting time materially each quarter.

#22

Recognition is free fuel.

Celebrate engineers, analysts, and business partners who move risk down and reliability up.

#23

Credit flows downhill; accountability flows up.

Leaders highlight the team, own the misses, and protect their people.

#24

Take smart risks, visibly.

Security is risk management, not risk avoidance. Align choices to explicit risk appetite and business goals.

#25

Nurture your top 20%, and build depth.

Identify key contributors, prevent burnout, and create redundancy so no single person is a single point of failure.

#26

Psychological safety drives reporting.

People do their best work, and surface issues early, when it’s safe to speak up.

#27

Every vendor is temporary.

Design for exit: data egress, key ownership, off-boarding, and continuity plans from day one.

#28

Preparedness beats heroics.

Tabletops, runbooks, golden signals, and tested backups win more than late-night brilliance.

#29

Hold the hiring bar.

An empty seat is safer than the wrong hire, especially in roles that touch keys, identity, or payments.

#30

Don’t punish bad news.

Reward early escalation. If messengers get shot, telemetry goes dark and risk goes up.

#31

Synthesis: lead with clarity and courage.

Governance over heroics, influence over authority, and truth over optics. These are the levers that bend risk in your favor.

About This Page

This page is presented in the style of the primary site to keep a cohesive reader experience. For the canonical profile and biography, visit jameskimble.com.

Export

To publish, drop this file into your site. You can also render it to PDF via your browser’s “Print to PDF.”