77 Spyglass
Strategic Security Leadership.
Built on Depth.
Cybersecurity consulting backed by 25 years of practitioner experience, five patents, and original work cited by Amazon, Microsoft, IBM, and Siemens. Offensive security, executive advisory, AI security strategy, and operations.
Get in TouchServices
What I Do
Fractional security leadership for organizations that need a senior executive on retainer. Program strategy, risk governance, and board reporting.
Learn more →Most AI strategists lack security depth. Most security leaders don't build agentic systems. This engagement bridges both on a fractional basis.
Learn more →Penetration testing, architecture review, and adversary simulation. Senior-led from scoping through board-ready deliverables.
Learn more →PCI DSS, BSIMM, NIST AI RMF, MITRE ATLAS, and security program maturity. I've sat on both sides of the assessment table across hundreds of enterprise engagements.
Learn more →Why 77 Spyglass
What You Get
I scope and oversee every engagement personally. Offensive work is staffed with senior and principal-level researchers. Advisory, AI, and compliance work is direct. No junior analysts, no bait-and-switch.
I run offensive security programs and build agentic AI pipelines. Finding both in one person is uncommon. I offer both in one engagement.
No layers of project management between you and the work. Scoping to delivery in weeks.
I went from Field CISO at Praetorian to building this practice. I advise on what I've operated against, not what I've read about.
Testimonials
What Colleagues Say
Chad has always possessed a rare combination of technical ability, business acumen and leadership skills. He is completely at ease when discussing complex technical solutions in a room full of engineers and security consultants. Concurrently, he can present these same technical concepts from a business development perspective in a C-Level forum.
His bias for action and leadership skills were instrumental in streamlining our technical service operations and maintaining the quality of our security practice. His ability to dissect complex problems into manageable and discreet tasks made a significant impact on our and our customer's projects.
Chad has a deep understanding of technology, but is capable of seeing the big picture. He understands information security strategy as well as he does information security technology, and knows when to focus on one over the other. It's a rare skill.
LinkedIn recommendations. Read all testimonials →
Get in Touch
I take on a limited number of engagements at a time. If you have a security problem worth solving, let's talk.
Contact