Insights
Here is our shared knowledge base and latest happenings concerning the industry, our partners and company.
Trust is our currency.
Carraig Stanwyck joined Lou Rabon on Channel Security Secrets to dig into what’s actually happening inside security programs. Teams chasing new products while ignoring what they already own. Procurement shaping outcomes more than the people running security. Organizations operating without a clear risk appetite. And the role transparency plays when you’re trying to build trust in an environment that isn’t always built for it.
A New Recipe for Cybersecurity
Michael Meis is a security leader with a passion for architecting security programs, leading people, and developing world-class security teams. He argued that cybersecurity struggles not because teams lack funding or tools but because the structure puts too much weight on too few people. Attackers move fast and the traditional model cannot keep up.
Perception is Everything
Three Months as CEO and What I Got Wrong About Being a Good Customer
When I accepted the CEO role at 3 Tree Tech three months ago, I thought I understood the vendor side of technology partnerships. I’d been partnering with vendors for over a decade, and I'd been 3 Tree Tech’s customer for over five years. I'd seen how partnering was traditionally done, and then I saw how 3 Tree Tech operated differently. I felt I knew the pain points on both the customer and vendor sides.
Surviving the speed of change: AI, Trust and Customer Experience
At the Portland Summit, 3 Tree Tech hosted its own “tribal council.” Tim Schocke, Product Manager at Lowe’s, Stacy Sherman, Founder of Doing CX Right®, and Eric Skeens, Co-founder and CTO of 3 Tree Tech sat down to debate. In true Survivor fashion, the question was not who has the best tools. It was who can outwit, outplay, and outlast the speed of disruption.
Connection Over Silos: What Technology Leaders Must Get Right About Customer Experience
Stacy Sherman, founder of Doing CX Right, took the stage at the Portland Summit to deliver a powerful message for technology leaders: IT and security are not just support functions. When leaders break silos, align goals, and strengthen connection across teams, they turn technology into a true competitive advantage.
How Leaders Are Closing the Browser Security Gap
At our Stealth Security Experience in Chicago, Cliff Moore, CISO of Wilson Sporting Goods, said it plainly: “Where the awareness ends, the technology has to pick up.” He’s right. Even world-class phishing programs still see 6 to 7 percent click-through rates. That’s not failure. That’s human nature. People click. And in global environments, that margin for error turns into hundreds of risky interactions a day.
Scaling Observability and Security: How M1 Finance Built a Data Strategy Without Compromise
At our Stealth Security Experience in Chicago, 3 Tree Tech hosted a conversation that hit on a critical challenge facing technology leaders today: how do you scale data access across your organization without compromising on cost, control, or clarity?Axiom, a featured partner, brought in a customer to help unpack that question.
The Myth of the Lone Wolf CISO
At the 3 Tree Tech Stealth Security Experience in Chicago, Rick Doten shut down one of the biggest misconceptions in cybersecurity: the lone wolf CISO. The idea that one person can single-handedly defend an entire organization is not just outdated, it is reckless. Security is not about heroics. At its core, it is about adaptability, relationships, and having the right people in the right places when things go sideways.

