Content

Strategic insights on blockchain, AI, and leadership in disruption.

Tokenization: The Freight Train Disrupting Finance
October 24, 2025·2 min read
blockchain

Tokenization: The Freight Train Disrupting Finance

Discover how tokenization and prediction markets are fundamentally reshaping financial services—and why traditional firms are building yesterday's solutions for tomorrow's world.

Recent Essays

All Content

517 posts

April 29, 2015

Security Pros Guide to Optimizing LinkedIn

Discover how to stand out in the security industry with an optimized LinkedIn profile. This guide covers crafting a unique summary, selecting impactful skills, and highlighting non-work activities.

April 27, 2015

7 Types of CISO

Explore the diverse landscape of CISO roles, from Executive to Buried CISOs, and learn how companies can avoid mismatches by aligning the right talent with specific security leadership needs.

April 24, 2015

RSA: Are We Talking About The Right Things?

RSA's focus misses the mark, overlooking key issues like nurturing security talent, expanding the workforce, and measuring program effectiveness. Let's reshape the conversation for next year's event.

April 20, 2015

Are We Running Out of CISOs?

Explore the growing demand and dwindling supply of CISOs as fear of breaches drives security leaders to avoid top roles. Discover why experience with breaches is becoming a valued asset.

April 14, 2015

My Morning Routine

Discover the intricacies of a balanced morning routine shaped by family dynamics, work demands, and personal habits. Learn how adaptability and planning create a seamless start to each day.

March 13, 2015

How I Work On The Road

Discover how to stay productive while traveling with essential tech tools and gadgets. Explore the featured gear from a recent Minneapolis trip and learn how to optimize your mobile workspace.

March 02, 2015

How We End Up With Too Many Security Policies

Explore the pitfalls of policy bloat in security management, as the article delves into redundant policies, misplaced guidelines, and tech-enforced rules, advocating for streamlined security measures.

February 26, 2015

You Have Too Many Security Policies

Explore the pitfalls of excessive security policies that prioritize compliance over true protection. Discover how simplifying and reducing policies can enhance your organization's security posture.

February 18, 2015

Security is Not A Special Snowflake

Explore how to integrate security seamlessly into technology processes, transforming it from a policing role to a collaborative partner, ensuring robust systems without hindering innovation.

January 30, 2015

How I Curate Security Longreads

Discover how Jay Schulman curates his Security Longreads newsletter in just 15 minutes a week. Learn his efficient process using tools like Feedly, Pocket, and Goodbits to stay informed and share insights.

January 29, 2015

Why Your Strategy Needs a Consultant

Discover why hiring a consultant can transform your strategy by providing fresh perspectives and overcoming internal limitations, much like FDR's need for a second medical opinion revealed critical insights.

January 20, 2015

Responding to Every E-mail: Two Months In

Discover the journey and challenges of responding to every e-mail for two months. Explore the surprising reactions and insights gained, and why some e-mails may no longer warrant a reply.

Jay Schulman - Blockchain & AI Strategy