Fractional CIO advising an SMB leader on cybersecurity leadership, risk register, and phishing training strategy

By Steve “The Doctor” Meek | Talk To Th3 Doc Podcast | The Fulcrum Group, Inc.

🎙️Doctor’s Diagnosis: CISO stewardship is essential… but executive engagement is non-negotiable.

Episode 134 with Craig Taylor landed on something I wish every SMB leader in DFW could put on a sticky note: you can’t outsource accountability. You can outsource execution, tools, and even virtual CISO for SMB guidance—but in today’s shared responsibility model cybersecurity world (cloud, vendors, insurance, compliance), the final risk owner is still the business leader. That’s not a scare tactic. It’s just the reality of modern technology stewardship.

At The Fulcrum Group in Dallas–Fort Worth, TX, we see it constantly: organizations that “have IT” but don’t realize they don’t have IT leadership. They may have a network and some security products, but not security stewardship. And they may run a phishing simulation program or security awareness annual training, but it’s the kind that creates silence instead of fast reporting. That’s where CISO-level guidance and executive sponsorship meet.

Why CISO Leadership Is More Important Than Ever (Especially for SMBs)

A CISO (or virtual CISO for SMB) isn’t valuable because they know more acronyms. They’re valuable because they bring prioritization, governance, and rhythm:

  • What risks matter most to your business
  • What controls reduce risk measurably
  • What order to do things in, given budget and bandwidth
  • What “good” looks like, and how to prove improvement over time

Craig and I talked about how phishing programs can backfire when they’re designed as a “gotcha.” When people feel embarrassed, they don’t report. When they don’t report, problems get bigger, faster. We want to test users, but only so we educate them to notice when something looks unusual—then report it. With attacker automation and the speed of their attacks, preventing an incident from growing is heavily dependent on early detection. Queue up Rod Stewart’s Young Turks here, “time is on your side, don't let 'em put you down, don't let 'em push you around”.

Here’s the punchline: the best cybersecurity programs aren’t built on fear. They’re built on habits. They build “muscle memory,” and the organization gets better week by week.

Cybersecurity Leadership for Non-Technical Executives (Your Job Is Still Critical)

Even if you’re not technical, you can’t delegate this like ordering office supplies. Even if you have a highly capable manager or a trusted internal IT leader, the executive should be asking questions, managing via metrics, and requesting documentation on “how do you know that for sure?” In our experience, many executives prefer visual, executive-friendly overviews that tie into the supporting technical detail—things like logical network maps, data workflows, and rolling technology roadmaps.

Today’s model is shared responsibility everywhere you look:

  • Your cloud provider secures their layer; you secure identities, access, configuration, and data governance.
  • Your vendors touch your network; you own the third-party risk decisions.
  • Your cyber insurance carrier may pay claims; you own the controls and proof.
  • Your MSP can run the playbook; you still make yes/no choices and own the outcomes.

So the non-technical executive’s job is not “pick the firewall.” The job is to stay engaged as the decision-maker, understand business goals, prioritize technology and security needs, and set the direction.

Executive “CISO Stewardship” in Plain English

If you do nothing else, do these four things consistently:

1) Own the priorities

Ask yourself: “What are our top 5 risks and/or opportunities and what are we doing about each one?” Protecting your apps and data is critical—but so is enabling growth: increasing user mobility, interconnecting applications, creating dashboards, driving adoption of Office 365 modern workforce features, and figuring out your AI strategy. A strong risk register (list of known risks + more) cybersecurity approach keeps security aligned with growth instead of competing with it.

2) Fund the basics before the fancy

There is low-hanging fruit in cybersecurity. Identity security (MFA), backups, monitoring, and training habits show up at the top of every framework—and they are always asked about on cyber insurance questionnaires. For most SMBs, MFA for small business Microsoft 365 is one of the highest ROI moves you can make this quarter. CIS Critical Security Controls details out a laundry list of items, but in the proper hands can help smaller organizations get started.

3) Reinforce culture

Anyone can make a mistake. I’ve been to cyber conferences where the CISOs admit to clicking their own phishing link. If someone reports a suspicious email, reward it. If someone makes a mistake, fix the system—not the person. That’s how you build a reporting culture that catches incidents early.

4) Demand a rhythm

Quarterly reviews, measurable progress, and accountability beat annual panic. Like most departments, you can’t fix things with one meeting a year. Rhythm turns one big insurmountable problem into smaller issues that are easier to handle—and easier to fund.

That’s your lane. And when you do it, your technical team (internal or outsourced) can execute with confidence.

The Fulcrum Way: CISO Guidance + Executive Engagement, Together

At Fulcrum, our approach combines CISO-level thinking with executive-friendly delivery through:

  • SPOT Managed IT Services (operational stability + standards)
  • SPOT Managed Security Services (layered protection + measurable controls)
  • STARPower Framework (quarterly cadence and reporting clarity)
  • Our “No IT Jerks” philosophy—because respect and trust is a security control

We don’t just fix tickets. We help leaders navigate a program of priorities, policies, habits, and metrics. The goal is to reduce risk without sucking up all your time or making your culture miserable.

If Monty Python wrote modern IT governance, the executive would be pushing a wheelbarrow while a growing list of potential issues (your risk register) sit inside it would be yelling, “I’m not dead yet!” In real life, a CISO uses that list to communicate concerns, and leadership decides risk tolerance. Knowledge first, prioritization second—that’s how leaders stay alive.

A Simple Metric Set Leaders Can Use This Quarter

If you want a CISO-style starting point without becoming a technician, ask your team these three things:

1) MFA coverage

Are all users protected? Are admins/privileged accounts handled more strictly? Can you show me a list or a screen capture? (This is especially important for MFA for small business Microsoft 365 environments.)

2) Reporting behavior

Do employees report suspicious emails fast? Do they know what to do in 30 seconds? Test it: ask a few people who they think they should report to.

3) Policy usability

Can your team follow your policies without needing caffeine and a law degree? Long detailed policies ensure nobody reads or follows them. Bite-sized policies win.

These are leadership metrics. They’re not “IT documentation.” They’re business resiliency levers.

Key Takeaways

  • CISO leadership creates priorities, governance, and a real program.
  • Executives still own the risk in a shared responsibility model cybersecurity world.
  • “Gotcha” programs backfire; trust + repetition create resilience.
  • Habits beat heroics, every time.

Call to Action

If Episode 134 made you realize you need stronger stewardship, start by doing one thing: ask for your top 5 risks and the next 90-day plan—then put it on the calendar and run it like it matters.

🎧 Listen / subscribe: https://pod.link/1807560282
▶️ Watch on YouTube: https://youtu.be/x5pLx7m8LYo
🌐 Podcast hub: https://www.fulcrumgroup.net/talk-to-th3-doc-podcast/

If you’re in DFW and want a partner who can help you run IT and security with CISO-level intent—while keeping leadership engaged and accountable—reach out to The Fulcrum Group, Inc. We’ll help you build clarity, cadence, and confidence through SPOT Managed IT Services, DFW managed security services, and the STARPower Framework—delivered with our “No IT Jerks” culture.

 

About the Author — Steve “The Doctor” Meek, CISSP

Steve “The Doctor” Meek is a DFW-based IT strategist, cybersecurity leader, podcast host, and co-founder of a 24-year technology legacy in North Texas. A recipient of the 2024 MSP Titan of Industry Award for Community Impact, Steve brings decades of experience helping CEOs, city managers, and healthcare and manufacturing leaders navigate cybersecurity, AI readiness, and operational resilience. As host of Talk To Th3 Doc, he explores leadership and ownership topics to find practical insights for SMB decision-makers.

Founded in Keller, TX, The Fulcrum Group, Inc. delivers relationship-centered DFW Managed IT Services and DFW managed security services through its flagship SPOT Managed IT Services and SPOT Managed Security Services platforms. Using its proprietary STARPower™ Framework, Fulcrum helps businesses strengthen security, modernize operations, and plan technology with clarity and confidence. With a 100% Texas-based team and a “No IT Jerks” philosophy, Fulcrum has earned repeated national recognition on the MSP 501 and CRN Top 500, serving SMBs, local governments, and mission-driven organizations across North Texas.

FAQs

Do SMBs in DFW really need a virtual CISO for SMB organizations?

Yes—because threats, insurance requirements, and vendor/cloud complexity don’t scale down just because you aren’t an enterprise. Most DFW SMBs don’t need a full-time CISO, but many benefit from virtual CISO for SMB guidance: clear priorities, a risk register cybersecurity process, measurable controls, and a consistent cadence.

What does cybersecurity leadership for non-technical executives look like?

It looks like ownership of priorities and outcomes: asking the right questions, approving funding for the basics (MFA, backups, monitoring, training), identifying the next security initiatives or capabilities needed, reinforcing reporting culture, and requiring a quarterly rhythm that proves risk reduction—without needing to “be technical.”

What is the difference between a vCISO, a Fractional CIO, and DFW managed security services?

A vCISO focuses on security governance: risk register, policies, strategy, and oversight. Our Fractional CIO helps align your technology to your organizations desired business outcomes. That includes roadmaps, budgeting, vendors, operations and helping with governance. He complements process with tools for our DFW managed security services suite (like SPOT Managed Security Services) for SMB oriented CISO help, scaled down from enterprise costs.

Why do Simulated Phishing tests backfire (if “Gotcha” style), and what are security awareness training best practices?

“Gotcha” tests can reduce trust and cause employees to hide mistakes—slowing reporting and increasing impact. Security awareness training best practices include positive gamification and reinforcement, short repeatable lessons, and a phishing simulation program designed to increase reporting speed—not embarrassment.

What are the top cybersecurity priorities for SMB executives using Microsoft 365?

Start with fundamentals: MFA for small business Microsoft 365 (especially admin accounts), account hygiene, tested backups and restore, endpoint monitoring/response, email protection, basic vendor access control, third-party risk management, and training that increases reporting speed—then revisit priorities quarterly using a risk register.