About Steve Jump
Translating Cyber Risk Into Business Language Since 1998
Steve Jump is a chartered engineer with an uncommon talent: the ability to make complex cybersecurity concepts accessible, actionable, and relevant to business leaders.With over 30 years of information security experience—including a decade running his own technology and security businesses—Steve understands cybersecurity from both technical and business perspectives. This dual expertise enables him to bridge the communication gap that often leaves boards uncertain and security teams frustrated.
Cyber Risk, Cyber-Resilience, and AI Strategy require business level conversations before technology choices can be made! Conversations require communication.
The Problem We Solve
Most organizations treat cybersecurity as a technology problem. Cyber Risk is a Business Risk – Cybersecurity governance certainly require technology, but cannot be driven as a technology problem. Treating risk with a technology only approach leads directly to three critical failures:
1. Communication Breakdown
IT and Security teams focus on technology and struggle to articulate risk in business terms; executives struggle to make informed security investment decisions.
2. Misaligned Priorities
Without business context, security efforts focus on compliance rather than actual threat reduction. Cyber risk must be effectively managed by design.
3. Ineffective Investment
Security budgets get allocated based on everyone else’s industry threats rather than your specific business risks. Your business requires controls that match its own context.
Custodiet Advisory Services exists to resolve these problems.
Our Philosophy: Cyber Risk is Business Risk
The “For Want of a Nail” Principle
An old parable illustrates this perfectly:
For the Want of a Nail
For want of a nail the shoe was lost,
for want of a shoe the horse was lost,
for want of a horse the knight was lost,
for want of a knight the message was lost,
for want of a message the army was lost,
for the want of an army the kingdom was lost,
All for want of a nail.In our model these same words represent our dilemma: nail =understanding of the threats shoe = the risks that face a company knight = Chief of Information Security message = communication and direction army = the ability to execute on strategy kingdom = profit or success All for the want of understanding.
Custodiet Advisory provides that understanding
Why Work With Steve Jump?
Technical Depth, Business Focus
Steve’s engineering background enables him to share deep technical understanding. His corporate and entrepreneurial business experience ensures that his understanding serves your strategic objectives.
Proven Track Record
Experience
Businesses
International
Speaker
At Major Cybersecurity
Conferences
Published
Expert
At Major Cybersecurity
Conferences
Practical, Not Theoretical
Steve’s advice comes from real-world implementation experience, not academic theory. He’s built security programs, responded to incidents, presented to boards, and defended budgets. Practical business aligned principles that map to existing systems and AI based solutions equally.
Independent Perspective
As an independent advisor, Steve has no vendor relationships to protect or products to sell. His guidance serves only your interests.
Our Approach: Four Pillars
1. Asset Identification & Valuation
You can’t protect what you don’t understand. We help you identify critical business assets, both logical…
1. Asset Identification & Valuation
You can’t protect what you don’t understand. We help you identify critical business assets, both logical and physical and quantify their value—not just in financial terms, but in operational impact and strategic importance.
Methodology: – Business process mapping – Business value mapping – Digital asset inventory – Dependency analysis – Financial impact modeling.
2. Quantitative Risk Assessment
Move beyond traffic light matrices and compliance scores. We use quantitative risk analysis…
2. Quantitative Risk Assessment
Move beyond traffic light matrices and compliance scores. We use quantitative risk analysis to provide aggregated business actionable metrics that can be explained and understood.
Methodology: – Using your business strategy as a risk value model – Measuring your exposure using YOUR Data – Monte Carlo simulation for probability distribution – Financial exposure calculation – Risk-adjusted return on complex security controls – Based on FAIR (Factor Analysis of Information Risk) principles
3. Compliance as a Risk Management Tool
Compliance frameworks (ISO 27001, ISO42001, NIST, CIS Controls) are valuable—when used properly.
3. Compliance as a Risk Management Tool
You can’t protect what you don’t understand. We help you identify critical business assets, both logical and physical and quantify their value—not just in financial terms, but in operational impact and strategic importance.
Methodology: – Business process mapping – Business value mapping – Digital asset inventory – Dependency analysis – Financial impact modeling.
4. AI-Enhanced Threat Intelligence
Artificial intelligence affects every aspect of your business. AI can transforms threat detection and risk…
4. AI-Enhanced Threat Intelligence
Artificial intelligence affects every aspect of your business. AI can transforms threat detection and risk assessment. We help you leverage AI tools effectively while understanding their limitations.
Capabilities: – AI-powered vulnerability assessment – Predictive threat modeling – Automated risk scoring – Machine learning for anomaly detection – Real risks of AI use, in business and in security
Who We Serve
CEOs & Business Executives
Get clear, actionable cyber risk information that supports strategic decision-making. Understand how cybersecurity investments protect business value.
Boards & Audit Committees
Receive concise, business-focused AI & cyber risk reporting that enables effective governance and oversight.
CISOs & Security Leaders
Gain coaching on communicating risk to business stakeholders, building business cases for security investment, and aligning security strategy with business objectives.
CIOs & Technology Leaders
Understand how to integrate security into AI and digital transformation initiatives and build security teams that support business growth.
Growing Organizations
Access CISO-level and Business Risk aware expertise without full-time executive cost through Virtual CISO services tailored to your stage and needs.
Quis Custodiet Ipsos Custodes?
“Who guards the guardians themselves?”
Your information security officers and cyber security specialists are critical to business success. They need both the technical skills to defend your organization and the support to thrive within it.
Custodiet Advisory ensures your security team has the guidance, coaching, and strategic direction they need to perform at their peak—protecting both your business and the professionals who defend it.