From Cybersecurity to Sovereignty
Same mission, different layer: protect what’s essential.
In enterprise security I saw how algorithms harvest attention and how unclear agreements drain teams. Personally,
I felt the same pressures—relentless notifications, boundary friction, and the pull to perform a version of
myself online. I built a Stoic–Shamanic stack—clean agreements, trained 1st/2nd attention, and emotional
discipline. It insulated me from manipulation and reconnected me with meaning.
Then: SOC/Cyber Fusion work, incident response, content engineering.
Shift: Daily Stoic reviews, breath practice, shamanic journeywork, QiGong.
Now: I help people reclaim energy and attention—without abandoning technology.
Practices I Use
- Stoic drills: Dichotomy of Control, premeditatio, evening review.
- Shamanic tools: journeying, cord/agreements work, ritual design.
- QiGong & breath: grounded body, calmer nervous system, steadier focus.
- Operational hygiene: scope, reciprocity, and simple checklists that work in real life.
Ethics & Boundaries
- Consent and confidentiality first. Coaching/education—not medical treatment.
- Simple rituals, measurable habits—no exaggerated claims.
- Respect for culture and lineage; I work within my scope and refer out when needed.
“Sovereignty is not isolation. It’s choosing what you give your energy to—and how you show up—on purpose.”