Karen Letain has spent her career leading Go-To-Market strategies for the biggest names in the industry, including Proofpoint and McAfee. She has seen the "Old Guard" of security from the inside and knows exactly why legacy models are failing in 2026. Now, as CCO of StrongestLayer, she is redefining how the market views the value of human risk and the commercial necessity of invisible security.
Q: Karen, you spent years at the top of the "Security Awareness" world. In 2026, we’re seeing that even the best-trained employees are falling for AI-generated deepfakes and "Apex" phishing. Is the old model of monthly training videos and "Phish-test" emails officially dead?
The old model was compliance, not security. AI now fools 60% of trained employees, making "don't click" an impossible standard.
I'll say something that might surprise people given where I came from: the old model isn't just dead, it was never fully alive. I spent four years at Proofpoint, first as VP of Product for Security Awareness and then running the entire awareness division as GVP/GM. I worked hard to reshape awareness into something more meaningful than a compliance checkbox. And what I kept running into was a fundamental design flaw.
The traditional awareness model was built around punishment, not empowerment. You'd send a fake phishing email, wait for someone to click, and then hit them with a "gotcha" training module. We were essentially setting employees up to fail and then blaming them for it. I pushed hard against that because it creates exactly the wrong culture, people become afraid to engage with their inbox rather than becoming smarter about it.
But here's what's really changed: the attacks have outpaced even the best training. We published our Training Paradox research at StrongestLayer because the data is undeniable. AI-generated phishing now fools 60% of trained employees. Not untrained employees, trained ones. When attackers can generate contextually perfect, personally tailored emails in seconds using jailbroken LLMs, the idea that a quarterly training video is going to protect your organization is, frankly, magical thinking.
What needs to replace it is what we call human risk management, not what employees know, but what they do at the moment of decision. That's why we built an AI Advisor. Instead of testing employees quarterly and offering no help when they're actually staring at a suspicious email, we put an AI-powered security coach directly in the inbox. Nano-training at the moment of need. Positive reinforcement when someone checks an uncertain email, not punishment when they guess wrong. It's the approach I wanted to build for years but couldn't inside a legacy architecture.
Q: We talk a lot about the "Black Box Tax." From a commercial perspective, how are you seeing this impact the budgets of the Fortune 500? Are companies finally stopping the cycle of "buying more tools" to solve the "lack of time" problem?
The tax is the "Uncertainty Debt" analysts pay by triaging noise. Procurement wants to see reasoning chains, not just confidence scores.
The Black Box Tax is real, and it's not just a line item, it's a compounding operational cost that most organizations can't even quantify because it's buried across so many teams.
Here's what I see in almost every enterprise conversation: they're running a legacy SEG, they've added a behavioral analytics layer on top of that, they're paying for a separate awareness training platform, and their SOC is still drowning. One CISO told me his analysts were spending 15 to 20 hours a week just triaging "is this email legitimate?" That's not threat hunting, that's babysitting a system that can't make up its mind.
The budget conversation is shifting, but slowly. The smart organizations are asking a different question. Instead of "what else can we add to the stack?" they're asking "why isn't what we have working?" And when they dig in, they find the answer is architectural. Their ML-based tools make decisions inside a black box, no visibility into why something was flagged, no customer control when the model is wrong, and no clear timeline for correction. So the SOC becomes the human backstop for an opaque system, and that's where the real cost lives.
What I'm seeing with the Fortune 500 specifically is that procurement teams are getting more sophisticated. They're asking vendors to demonstrate detection on novel threats, not just known signatures. They want to see the reasoning chain, not just a confidence score. And they're starting to do the math on what I'd call "total cost of uncertainty": the analyst hours, the business disruption from false positives blocking legitimate email, the risk of false negatives that no one catches until it's a wire fraud.
That math is what makes the case for architectural change, not incremental tool additions.
Q: Cyber Insurance premiums in 2026 are skyrocketing. Carriers are demanding better proof of protection than just a firewall. How is StrongestLayer’s "Evidence Engine" changing the conversation during a renewal or an audit?
Insurers demand proof, not just logs. The Evidence Engine provides a transparent audit trail that moves the conversation from hope to evidence.
Cyber insurers have gotten dramatically more sophisticated in the last two years. They're no longer satisfied with "yes, we have email security" on a questionnaire. They want to understand how your detection works, what it catches that others miss, and critically, can you prove it?
This is where the architectural difference matters commercially. With a legacy system, what can you show an underwriter? Rule counts? Alert volumes? Those don't prove protection, they prove activity. With a black-box ML system, it's even worse. You literally cannot explain to an insurer why a specific email was blocked or allowed.
Our platform produces explainable reasoning for every detection decision. When an underwriter asks "show me how you'd catch a novel BEC attack that bypasses Microsoft Defender," we can walk through the actual chain of reasoning, the intent analysis, the dual evidence evaluation, the contextual signals that informed the verdict. That's not a feature demo. That's evidence of architectural capability.
The more practical impact is on the claims side. When an organization can demonstrate that a click didn't result in a breach because the system detected and contained the threat at the email layer, that's a fundamentally different insurance conversation than "we had training and a firewall." Carriers want to see that even when human error occurs, the architecture is resilient enough to prevent a loss event.
That's the real shift: from proving you tried to prevent the attack, to proving your architecture can survive one.
Q: You’ve led massive GTM strategies at McAfee and Proofpoint. What is the biggest challenge in selling "Invisible Security"? How do you convince a buyer that a tool is working when they don't see it every day?
Great security is silent. We prove ROI by making the intelligence visible—showing the specific threats legacy tools missed.
This is one of the most interesting commercial challenges in cybersecurity, and it's not new, but AI has amplified it.
The paradox of great security is that when it works perfectly, nothing happens. No alerts, no disruption, no drama. And in a world where security budgets are justified by visible risk, "nothing happened" is a hard ROI story.
At Proofpoint, I learned that visibility and value are different conversations. The visibility question is about dashboards and metrics, what did we block, how many threats, what types. That matters, but it's table stakes. The value question is about what didn't happen and what your team didn't have to do.
The way we approach this at StrongestLayer is by making the intelligence visible even when the threats are invisible. Every email our system evaluates gets a reasoning chain. Security leaders can see exactly what was caught, why it was caught, and what would have happened if it had reached the user. That's not a quarantine log, that's a narrative of risk avoided.
But the bigger commercial shift is this: the best buyers aren't asking "show me the tool" anymore. They're asking "show me what my current tools are missing." That's why our assessment model works so well. We run alongside existing infrastructure for 10 days and surface the threats that got through. One law firm found 347 advanced threats in 10 days that their Microsoft E5 and leading SEG missed entirely. After that, the product isn't invisible, it's the thing that showed them what they couldn't see.
The sale isn't about convincing people the tool works. It's about showing them the gap that already exists.
Q: At StrongestLayer, we talk about "survivable user error." What does that look like on a balance sheet? If an organization can survive a click without a breach, what is the actual commercial value of that resilience?
A click should be a data point, not a disaster. Survivable error means business continuity and confidence to operate at speed.
This is the question that brought me to StrongestLayer. Because after four years of building the best awareness programs I could at Proofpoint, I had to be honest with myself: even the best-trained human will eventually click. It's not a failure of training, it's the reality of human cognition under pressure, at scale, against AI-generated attacks designed to exploit exactly how we process information.
So the question becomes: what happens after the click?
In a traditional architecture, a click on a malicious link is the beginning of a breach timeline. The payload executes, credentials are harvested, lateral movement begins. The cost is well-documented: IBM puts the average breach at $4.88 million, with email-initiated breaches trending higher.
Survivable user error flips that equation. If your architecture can detect the malicious intent before the click reaches a payload, or contain the damage if a credential is entered on a spoofed page, or flag the anomalous behavior in real time, then a click becomes a data point, not a disaster.
On a balance sheet, that resilience shows up in several ways. There's the direct cost avoidance of a breach, the incident response, legal, regulatory, and reputational costs. There's the operational savings of not having your SOC in crisis mode every time someone clicks a link. There's the productivity gain of employees who can engage confidently with their inbox instead of forwarding every uncertain email to IT. And there's the insurance impact we discussed, carriers increasingly differentiate between "tried to prevent" and "architecturally resilient."
But the number I keep coming back to is the one that doesn't show up on any balance sheet: the cost of the breach that almost happened. Every organization has near-misses they never know about. Survivable user error means turning those invisible near-misses into visible, contained, non-events. That's the commercial value of resilience, it's not just what you save when something goes wrong, it's the confidence to operate at speed because you know your architecture can absorb the inevitable human moment.
Karen’s pivot from "Protection" to "Resilience" isn't just a security strategy; it’s a business one.
The "Black Box Tax" refers to the operational cost incurred when security tools provide a verdict (blocked/allowed) without explaining why. This forces SOC analysts to spend hours manually investigating false positives and triaging alerts, creating a massive financial drain on the organization known as "Uncertainty Debt."
Traditional SAT relies on testing employees with fake phishing emails. However, recent data shows that AI-generated phishing fools 60% of trained employees. The industry is moving toward "Human Risk Management," where the architecture protects the user in real-time rather than punishing them for clicking.
"Survivable User Error" is a security philosophy that accepts human error (like clicking a malicious link) as inevitable. Instead of trying to prevent every click, the architecture is designed to detect intent and neutralize the threat after the interaction, ensuring that a single mistake does not become a breach.
Legacy security tools only provide activity logs. StrongestLayer's Evidence Engine provides a transparent "Reasoning Chain" for every decision. This allows organizations to prove to insurance auditors exactly how a threat was detected and why their architecture is resilient, often leading to better terms and easier renewals.
Be the first to get exclusive offers and the latest news
Tomorrow's Threats. Stopped Today.