The Supply Chain Problem Nobody’s Modeling
When AI models are trained on compromised data, the downstream effects aren’t just accuracy problems — they’re security events. A look at emergent risks in AI supply chains.

AI & Cybersecurity Strategist
Advancing AI with security, ethics, and real-world impact.
About
I'm a Solutions Architect at Check Point Software Technologies, where I specialize in Harmony SASE deployments and next-generation security solutions. I also serve as a Strategic Advisor to CTRL Labs, helping shape their cybersecurity readiness assessments and offensive security toolsets for government and defense clients. My work bridges hands-on technical architecture with strategic content creation around nation-state threats and emerging attack vectors like AI-powered social engineering.
When I'm not architecting security solutions, I'm building things. I run Onemoretab, LLC for my personal projects and consulting work — developing iOS apps like Moodie (a mood-based movie recommender with Plex integration) and ApexTracker (a motorcycle maintenance tracker with route navigation). I work primarily in React, Next.js, Swift, and Rust, and I'm currently developing RedTeamAI, an AI-powered red team agent designed to automate offensive security testing. Yes, I have seventeen other half-finished projects in various stages of "I'll get back to that eventually," but we don't talk about those. My 3D printers are currently churning out both practical solutions and things I absolutely didn't need but wanted to see if I could make.
Outside of tech, you'll find me on two wheels or hanging out with my 3.5-year-old pittbull, Jackson. I'm an avid motorcyclist currently planning an epic cross-country ride across the American West — which I've meticulously planned down to every rest stop, then will probably completely improvise when I actually go. Being a dog dad has taught me as much about patience and routine as any complex technical problem, mostly because Jackson is better at maintaining focus than I am.
I believe in comprehensive documentation, clean architecture, and building tools that solve real problems — whether that's protecting critical infrastructure, automating penetration testing, or just finding the perfect movie for your mood. I also have 47 browser tabs open right now and I'm not apologizing for it.

Current
Solutions Architect, Check Point Software Technologies
Focus
AI Security & Ethical Adoption
Background
Cybersecurity Architecture
Approach
Human-centered, evidence-driven
Current Focus
Helping organizations adopt AI responsibly — with clear governance, measurable outcomes, and an honest view of what these systems can and cannot do.
Protecting AI-driven systems and the data they depend on. From threat modeling AI pipelines to defending against adversarial attacks on machine learning models.
Ensuring automation serves people, not just efficiency metrics. Focused on the human side of technological transformation — reskilling, transparency, and equitable deployment.
Insights
When AI models are trained on compromised data, the downstream effects aren’t just accuracy problems — they’re security events. A look at emergent risks in AI supply chains.
The conversation about AI and jobs skips a critical step: who decides what gets automated, and what accountability looks like when those decisions affect livelihoods.
How state-sponsored threat groups are leveraging AI to accelerate reconnaissance, craft more convincing social engineering, and evade traditional detection systems.
Most organizations measure security readiness by checkbox. Here’s what meaningful readiness assessment looks like when AI is part of the threat model.
Projects
AI-powered offensive security platform with custom exploit development, automated vulnerability assessment, and a seven-layer safety architecture for professional red team operations.
Technical analysis and strategic content around ransomware operations, supply chain attacks, and nation-state cyber threats for industry audiences.
Contact
Open to conversations about AI strategy, cybersecurity architecture, responsible technology adoption, and collaborative research.