Founder Q&A:

Chris Schreiber, CampusCISO

A deeper look at how I work with higher education leaders on cybersecurity strategy.

Smiling man holding microphone speaking to an audience in an auditorium.

Who are you, and what do you do?

I’m Chris Schreiber. After more than 25 years leading technology and information security programs in and around education institutions, I launched CampusCISO to build a Strategic Operating System for higher education.

I help CIOs and CISOs escape the 'Audit Trap' by giving them a proven framework to benchmark risk, validate budget, and govern with confidence.

Icon - Elements Webflow Library - BRIX Templates

What are CampusCISO, Cyber Heat Map, and Cyber Bridge?

CampusCISO® is the methodology and membership model.

Cyber Heat Map®
is the engine -- the platform that turns manual assessments into live roadmaps.

Cyber Bridge®
is the alliance -- the community where leaders validate their strategies.

Think of it this way: CampusCISO is the System, Cyber Heat Map is the Tool, and Cyber Bridge is the Network that ties it all together.

Icon - Elements Webflow Library - BRIX Templates

Why did you start CampusCISO?

I spent most of my career in the same seat as my clients. I grew tired of watching smart people burn time on low value tasks.

As a CISO and technology leader in higher education, I saw talented teams drown in audits, spreadsheets, and one‑off reports while real capability gaps lingered. The 80/20 rule was inverted. Most of their energy went into justifying budgets and documenting controls, not into completing the handful of activities that would move the needle to support teaching, research, and student services.

I also saw how much effort went into homegrown benchmarking. People call peers, run informal surveys, and try to guess what “good” looked like for their boards. I knew a simple, consistent assessment and planning framework could produce those insights much more quickly and reliably.

CampusCISO, Cyber Heat Map, and Cyber Bridge grew out of that frustration. I wanted to turn three decades of experience leading higher education cybersecurity programs into something repeatable, practical, and affordable, so CIOs and CISOs could stop reinventing the wheel and spend more of their limited time on activities that actually protect their institutions.

Icon - Elements Webflow Library - BRIX Templates

When did you realize “this is what I need to be doing”?

The idea had been in the back of my mind for years, but the turning point was during the COVID‑19 pandemic.

I had recently started a new CISO role and found myself living in video calls: back‑to‑back meetings, constant fire drills, and very little time for the deep, structural work I knew would actually help.

At the same time, I was sketching out ideas for streamlined assessment methodologies (spreadsheets, scoring models, frameworks) that could help any institution make smarter decisions, but there was never time to polish them.

At some point I realized two things:

  • Nobody was going to hand me time and space to build this framework.
  • If I didn’t build it myself, I’d keep watching the same pattern repeat for the rest of my career.


So I left the comfort of a fulltime university CISO role and turned my half-finished ideas about planning methods into Cyber Heat Map, wrapped it in a guided membership model with CampusCISO, and built Cyber Bridge as the peer alliance around it. I wanted to move beyond 'renting a CISO' to empowering the team you already have.

Icon - Elements Webflow Library - BRIX Templates

What do you want to be known for?

I want to be known as the architect who helped higher ed leaders stop 'investing blindly' and start governing with data.

If people say that:

  • I made complex security decisions understandable and manageable for non‑specialists;
  • I gave colleges and universities a practical way to align cybersecurity with teaching, research, and student success, without blowing up their budgets;
  • I stayed vendor‑neutral and honest, even when that cost me money;
  • I turned decades of experience into tools and guidance any institution can use to keep improving…


…then I will feel like I did the right work.

Icon - Elements Webflow Library - BRIX Templates

Who do you primarily serve?

Most of the time, my primary contact is the college or university CIO who is accountable for cybersecurity but not living in it all day.

They’re experienced leaders who:

  • Understand technology, budgets, and campus politics.
  • Are not usually deep security specialists.
  • Feel the pressure from boards, cabinets, regulators, and incidents.


Sometimes these CIOs have a strong CISO on staff. Sometimes they have a small security team, a part‑time lead, or nobody in a formal CISO role. Either way, they know that cybersecurity spend is scattered across the entire IT portfolio, not just a line item called “security,” and they want an easier way to see the big picture.

I also work with higher education CISOs, often when they are new to the CISO role or new to higher education. With them, the engagement looks more like strategic partnership: implementing the CampusCISO framework to sequence projects, validate decisions, and navigate board expectations.

Icon - Elements Webflow Library - BRIX Templates

Who are you not a good fit for?

I’m not a good fit for institutions that want to hand off responsibility instead of sharpening their own cybersecurity decision‑making.

More specifically, I'm not a good fit for prospects seeking:

  • Managed security operations: I don’t run SOCs, manage security tools, or provide 24x7 monitoring. My work is strategic, focused on governance, roadmap development, and decision support. If you need someone to operate tools day to day, an MSSP or managed provider is a better fit.
  • Audit-style assessments: If the goal is to score every compliance control and produce a binder for an auditor, I’m not the right person. I use frameworks, but only as a lens. My work focuses on capabilities, tradeoffs, and project sequencing. Traditional audit firms specialize in helping complete detailed audits and assessments.
  • Engagements pushed down the org chart: When a CIO or CISO brings me in, then pushes the relationship down to someone without budget or planning authority, the engagement is not a good fit. The CampusCISO model is designed to help the people who own strategy and budget decisions.
  • Vendors looking for client lists: I will not sell access, share client data, or steer institutions to a preferred product. If a vendor wants to use Cyber Heat Map for their own consulting engagements, we can talk about licensing options. If they want a back door into my client base, that’s a hard no.
  • Teams that just want a rubber stamp: If your tools and strategies are already chosen and you just need an external expert to bless the decision, we’ll both be frustrated. I work best with leaders who are open to looking at their portfolio holistically and crafting strategies based on data.
Icon - Elements Webflow Library - BRIX Templates

What usually leads someone to work with you?

Most new customers come to me when the stakes feel high and the path forward feels unclear.

Some common triggers include:

  • New CIO acceleration: A CIO recently started their role and wants to quickly understand their current cybersecurity posture, how they compare to peers, and what priorities they should focus on.
  • CISO transition or gap: A CISO has left, is retiring, or the role never existed. The CIO needs continuity, credible board conversations, and help stabilizing the roadmap using our Strategic Operating System to ensure continuity without rushing a permanent hire.
  • “We need a real plan” moment: A cabinet member, auditor, research sponsor, or board committee asks for a formal information security plan. The pieces exist in various documents, but there’s no single, coherent roadmap they feel comfortable presenting.
  • New CISO getting oriented: A new CISO, especially someone new to higher education, wants a trusted partner who understands both technical and institutional realities. Often the CIO initiates this engagement to support a new leader they’ve recently promoted.
  • Portfolio and vendor confusion: The institution has a crowded security stack, often managed by multiple teams besides security. CIOs want to identify overlapping tools and Leverage the Cyber Heat Map® to identify overlapping tools and cut through the steady stream of 'must-have' pitches from vendors. They want a vendor‑neutral view of what they actually have, what they need, and what solutions can be simplified or retired.


In all of these cases, what prospects are really looking for is a calm, experienced partner and a simple way to get to “here’s what we’ll do next and why.”

Icon - Elements Webflow Library - BRIX Templates

What problem do you actually solve?

I help leaders turn scattered cybersecurity work into a clear, living plan they can actually maintain, regardless of the size of their team or budget.

Most institutions already have:

  • Audits and assessments
  • Risk registers and project lists
  • A long backlog of “we really should…” ideas


What they usually don’t have is a shared, data‑informed roadmap that says:

  • Here’s what we will do first.
  • Here’s what can wait.
  • Here’s how this protects our mission.


My work focuses on:

  • Assessing current capabilities in a structured way.
  • Benchmarking against similar peers.
  • Turning that into a multi‑year roadmap inside Cyber Heat Map.
  • Keeping that roadmap current as risks, budgets, and people change.


For institutions in the Guided Membership, the CampusCISO model becomes a force multiplier for their leadership team: quarterly strategy reviews, peer validation, and data-driven decision support without the overhead of a full-time executive.

Icon - Elements Webflow Library - BRIX Templates

What makes your approach different?

A few things:

  • Mission‑first, higher education at the center: I design everything so even small public universities or community colleges can justify working with me, not just large research institutions. The pricing and format are built for real‑world constraints that every educational institution faces.
  • Methodology first, tools as the engine: CampusCISO is a Strategic Operating System. We don't just give you advice; we give you Cyber Heat Map® to visualize it and the Cyber Bridge® alliance to validate it.
  • Portfolio lens, not product lens: I don’t just help people choose what tools to buy. I help them see how tools, services, and teams fit together across prevention, detection, investigation, and mitigation capabilities. That portfolio view is baked into everything I do.
  • Technophile with a pragmatic filter: I enjoy new technology and I experiment with it. But the filter is always: “Does this help a registrar’s office, research lab, or student services in a way we can explain to leadership?” If the answer is no, it goes on the back burner.
  • Intentionally solo and vendor‑neutral: I’m not trying to build a big consulting firm. Operating as a solopreneur means clients always work with me rather than junior consultants, and I don’t have revenue targets tied to any partner sales. That independence matters. And the Cyber Bridge community gives you access to a dedicated network of peers, so you get far more than a solo advisor.
Icon - Elements Webflow Library - BRIX Templates

How do you approach compliance and frameworks?

Frameworks are useful, but they’re not a strategy.

Many organizations quietly let auditors and frameworks drive their plan. Board conversations become a tour of findings and checkboxes instead of a discussion about whether the institution has the capabilities it needs.

My approach:

  • Start with understanding capabilities and outcomes that support the mission.
  • Plan investments around those capabilities and real constraints.
  • Then map the resulting portfolio back to frameworks to understand coverage and gaps.


When working with clients in Cyber Heat Map, I care less about “Did we answer this control with a yes or no?” and more about “Given what we’ve deployed, are we in a good position to comply and respond?” Compliance becomes a byproduct of building the right capabilities, not the headline.

Icon - Elements Webflow Library - BRIX Templates

How do you think about vendors and “best in class” tools?

In higher education, “best” matters less than “best fit in the portfolio.”

Almost all cybersecurity vendors can provide some value.

The real question is:

  • What specific capabilities does this product actually deliver for us?
  • How does it fit with what we already own and operate?
  • What does it allow us to simplify or retire?
  • Does it fit within our budget and staffing reality?


A tool that’s “objectively superior” in a vacuum may be the wrong choice if it consumes 80% of the security budget and overlaps with three existing solutions.

I encourage institutions to stop issuing RFPs in isolation and start managing cybersecurity as an interconnected portfolio. That means making tradeoffs at the portfolio level, not just picking winners in each category. It also means intentionally balancing cybersecurity investments across all technology functions, not just the line items managed by "security".

It’s not about building a theoretically perfect stack. It’s about maximizing the impact of a very constrained budget across the whole security landscape in a way the institution can actually sustain.

Icon - Elements Webflow Library - BRIX Templates

What outcomes can clients expect?

If you join as a CampusCISO Member, you should expect:

  • A Board-Ready Roadmap: A live, data-informed strategy that evolves with your institution, replacing static spreadsheets and 'shelfware' plans.
  • Better conversations with leadership and boards: A simple, honest way to explain where you are, where you’re headed, and what different investment levels mean, without leaning on fear or buzzwords.
  • A calmer internal compass: Confidence that you understand your capabilities, aren’t missing something obvious, and are making defensible decisions based on experience and peer insights.


Even if you only read my blogs and other free content, my goal is that you gain a clearer mental model and at least one practical step you can apply immediately inside your institution.

Icon - Elements Webflow Library - BRIX Templates

What deeper shift are you trying to create for leaders?

The shift I care most about is moving from “we’re always behind” to “we know exactly where we stand and what to do next.”

In practice, that looks like moving:

  • From vague anxiety about gaps to a clear picture of capabilities, overlaps, and tradeoffs.
  • From reacting to audits and headlines to steering by your own framework.
  • From guessing at next steps to choosing the next best action with intent.
  • From feeling isolated in the role to being supported by the Cyber Bridge® Alliance.

It’s not just about better plans. It’s about leaders feeling more grounded, less defensive, and more in control of how their institutions approach cybersecurity.

Icon - Elements Webflow Library - BRIX Templates

What do you believe that some people in cybersecurity might not say out loud?

A few things:

  • Don't start with the Audit: Frameworks are important, but they aren't a strategy. We believe you must visualize your capabilities first (using tools like Cyber Heat Map), and let compliance follow.
  • Cybersecurity is an essential utility, not a differentiator: In higher education, security should be planned more like providing electricity or libraries to the campus. It keeps the core mission running safely. Forcing ROI language into security discussions often creates more confusion than clarity.
  • Strategy has to be maintainable in real life: A “good enough and easy to update” plan is more valuable than a beautiful deck that is out-of-date the minute it’s presented.
  • Authority must align with accountability: Cybersecurity isn't a silo; it’s the aggregate result of decisions made by network directors, cloud architects, and system administrators. Since the CIO typically controls the budget and strategy for those teams, the CIO must retain ultimate accountability for the risk. The CISO acts as the strategic architect and governance authority, but cannot be the "responsible executive" for risks they lack the budget or authority to mitigate.
Icon - Elements Webflow Library - BRIX Templates

What have you spent years learning that sets you apart?

I’ve spent years at the intersection of two worlds:

  • Long‑horizon technology and security planning in higher education.
  • Product and services portfolio work in the vendor world.


From that combined perspective, two unique philosophies have emerged:

  • Treating security as a living product, not a project: Projects have end dates; security doesn't. I treat roadmaps like product backlogs, managing a living portfolio where 'maintenance' is just as important as 'new features'. This backlog needs to be adjusted and rebalanced regularly to maximize the impact of your available resources.
  • A “less is more” discipline: Sometimes the most strategic move is subtraction. I measure success not just by what we implement, but by the 'shelfware' tools we decommission and the performative busywork we stop doing. I’m comfortable saying “yes, that project would add value, but this other change will move the needle more right now.” I focus on progress over perfection: are you in a better place than you were last quarter, not “did you hit a perfect maturity score.”


That mix of agile thinking, “less is more,” and progress over perfection shows up in how I designed the Strategic Operating System, built the Cyber Heat Map®, and guide our Members.

Icon - Elements Webflow Library - BRIX Templates

What do people ask you about, even when you’re not “on the clock”?

People come to me with “what’s next” questions:

  • “Is this new security tool actually worth caring about?”
  • “What should I be paying attention to with AI right now?”
  • “Is this low‑code platform real, or a toy?”


I’m fairly hands‑on with technology. I like piloting new cybersecurity products, building internal tools with low‑code and NoSQL platforms, and exploring AI in my own work and for clients.

So when people want a grounded read on emerging tech (how it might fit, what could go wrong, and whether it deserves attention given their constraints) they tend to ask me.

Icon - Elements Webflow Library - BRIX Templates

If I follow your content, what can I count on?

You can count on calm, practical, vendor‑neutral guidance.

No hype. No fear‑mongering. No “Top 10 tools you must buy now.”

My goals are simple:

  • Help you think more clearly about cybersecurity in a higher education context.
  • Give you usable ways to plan, prioritize, and communicate information security strategies.
  • Offer ideas you can apply today, even if you never join as a CampusCISO Member.


If a piece of content doesn’t do at least one of those things, it probably won’t make it out of my drafts folder.

Icon - Elements Webflow Library - BRIX Templates

Member Success Stories

Hear from our members about how CampusCISO has helped them strengthen their cybersecurity posture.

"Chris was uniquely positioned to provide an assessment of where Kent State was in relation to our peers and to identify potential steps forward."

John Rathje

VP of IT and CIO at Kent State University

"The Benchmark Reports [Cyber Heat Map] generated helped me show my Board where we stood vis-a-vis our peers in security readiness."

Isaac Abbs

VP of IT and CIO at Pima Community College

"[CampusCISO has] an inside-out approach that goes far beyond the typical 'check the box' and gives us a high level of confidence we know what needs to be done."

Jim Raber

Associate CIO at Kent State University

"The CISO coaching I received from Chris was so effective, I view him as a partner rather than a vendor."

Isaac Abbs

VP of IT and CIO at Pima Community College

"[Chris] has deep understanding of both industry and higher ed, and knows what is pragmatic and actionable."

John Rathje

VP of IT and CIO at Kent State University

"It only took us 4-6 hours... and CYBER HEAT MAP immediately uncovered a number of opportunities to strengthen our security."

Justin Bettura

CISO at Youngstown State University

"I was simply blown away by the comprehensive nature of the CampusCISO application."

Jim Raber

Associate CIO at Kent State University

"Chris helped me to quickly adopt the mindset of a CISO."

Justin Bettura

CISO at Youngstown State University

"Being able to meet weekly with someone with broad CISO experience and perspective in our field was, and is, incredibly valuable."

Isaac Abbs

VP of IT and CIO at Pima Community College
Icon - Elements Webflow Library - BRIX Templates
Icon - Elements Webflow Library - BRIX Templates