The wall you haven't built yet

You Built Five Walls.
Now Build the One That Matters Most.

Identify, Protect, Detect, Respond, Recover. None of them address the culture that determines whether your people actually execute on them. That's the sixth wall. No vendor sells it. No product builds it. We do.

The Five Functions + The Missing One

1
Identify
2
Protect
3
Detect
4
Respond
5
Recover
6
Culture & Human Behavior

The Adversary Has Evolved.
Has Your Culture?

Attackers aren't breaking in anymore - they're logging in. AI has made social engineering faster, cheaper, and nearly undetectable. A voice can be cloned from 60 seconds of audio. A video call can be faked well enough to authorize a $25 million transfer. The human attack surface is now the primary battlefield - and most organizations are defending it with an annual compliance training their employees have already forgotten.

202%
increase in AI-powered phishing (H2 2025)
Varonis State of Phishing Report
1,500%
increase in deepfake attacks since 2023
Keepnet Labs / Resemble AI 2026
13%
of companies have anti-deepfake protocols
Programs.com 2026

Technical controls can't fix a culture problem. Behavior change can.

Two gaps stand between you and a complete defense

The human element isn't a new challenge. But it is a solvable one - once you understand the two gaps that keep most organizations from building their sixth wall.

The Culture Gap

Employees don't think cybersecurity is their problem. They see it as IT's job - or worse, as the thing that slows them down. So they click. They reuse passwords. They trust the voice on the call that sounds exactly like the CFO.

Security awareness programs check a compliance box, but they don't change how people think. Real culture transformation requires the same strategic rigor companies apply to customer experience or brand identity - not a once-a-year training module.

The Communications Gap

Only 47% of board directors feel their CISO effectively communicates the impact of evolving threats. Only 30% describe the CISO-board relationship as "strong and collaborative." Security gets treated as overhead because it's communicated like overhead.

When security leaders can frame cybersecurity as a business enabler - in language the C-suite and board actually respond to - budgets grow, alignment deepens, and the culture program gets the executive sponsorship it needs to succeed.

Sources: IANS / Artico Search / CAP Group 2026 Benchmark Report

Translate what your team does into what your board needs to hear.

This free guide maps seven security functions to the business outcomes they protect - with ready-to-use language for board presentations, budget discussions, and executive conversations.

Download the guide

No spam. No sequences. Just the guide.

60%
of breaches involve the human element
Verizon 2025 DBIR
21 sec
median time for a user to click a phishing link
Verizon 2025 DBIR
74%
of CISOs say human error is their #1 vulnerability
Proofpoint 2024
$4.4M
average cost of a data breach
IBM 2025

CISOs, security executives, and enterprise leaders

Five functions built the framework.
Let's build the one that's missing.

Whether you're a CISO preparing for the board, a CRO quantifying human risk, or a security leader ready to build the culture your program depends on - the conversation starts here.

Build the Sixth Wall

Services

How the Sixth Wall Gets Built

We work where technical solutions can't reach: the human decisions, executive narratives, and cultural behaviors that determine whether your organization is truly secure.

01

CISO Executive Communications

Security gets treated as overhead because it's communicated like overhead. We help CISOs and security leaders reframe cybersecurity as a business enabler - in language the board and C-suite actually respond to. The result: larger budgets, stronger alignment, and the executive sponsorship every security program needs.

What You Get
  • Board presentation strategy & coaching
  • Budget justification narratives
  • C-suite & cross-functional messaging
  • Incident & crisis communications prep
  • Cross-functional stakeholder alignment
  • 02

    Security Culture Strategy

    We architect the cultural shift where every employee believes cybersecurity is their own personal imperative - not IT's burden. We assess your current culture, design the behavior-change roadmap, and build the internal narrative that makes security feel like identity, not compliance.

    What You Get
  • Culture maturity assessment
  • Behavior-change strategy & roadmap
  • Internal narrative architecture
  • Employee engagement frameworks
  • Measurement & executive reporting
  • 03

    Executive & Team Training

    Immersive workshops and executive sessions on the threats that bypass every technical control: deepfakes, social engineering, AI-powered phishing, and the psychology of manipulation. Your team leaves understanding not just what to watch for - but why it matters personally.

    What You Get
  • Executive & leadership offsites
  • Deepfake & social engineering workshops
  • AI-era threat awareness sessions
  • Team-specific scenario exercises
  • Board-level security briefings
  • The Case for the Sixth Wall
    The data is unambiguous. Technical controls alone cannot address the human attack surface. Organizations that invest in culture and communications close the gap.
    88%
    of cybersecurity breaches caused by human error
    Stanford University
    $25.6M
    lost in a single deepfake video call scam
    CNN / Arup Case
    62%
    of orgs hit by a deepfake attack in the past year
    Gartner 2025
    "

    Genelle's skill in analyzing audience insights allows her to craft messages that truly resonate. A strategic thinker, she is able to craft compelling narratives based on data-driven insights - a unique skill that sets her apart. She helped me, as an executive, tell authentic stories that resonated with my internal and external target audiences.

    Aimee Cardwell, Former SVP & CISO, UnitedHealth Group

    About

    Built Where Security Meets Strategy

    Sixth Wall was founded by Genelle Heim - a communications leader who spent her career inside the world's largest technology and cybersecurity organizations, and who led the team behind a U.S. patent in AI-driven security behavior change.

    The unique combination of security depth and communications mastery

    Most communications consultants can write. Few understand how a CISO thinks, what a board needs to hear, or why security awareness training fails to change employee behavior. Genelle does - because she built her career inside the organizations where these problems live.

    From advising Fortune 3 executive leadership to representing a Fortune 500 Chairman at the United Nations, from semiconductor fabs to cybersecurity war rooms, Genelle has counseled CEOs, Chairmen, CISOs, and SVPs through transformations, crises, and acquisitions that defined their companies. She led communications for executives who went on to become CEO of Intel - twice.

    She doesn't just communicate about cybersecurity - she's operated inside it. Genelle led the organization that pursued and secured a U.S. patent in AI-driven security behavior change - the exact intersection of culture, technology, and human behavior that Sixth Wall is built on.

    Education
    Harvard Kennedy School, MPA
    Security + AI
    Led org behind U.S. Patent in AI-driven Behavior Change
    Languages
    English & Business-level Japanese
    Global Reach
    25 countries across APAC, Europe & North America

    CISO & Security Leadership Communications

    Counseled CISOs and security executives at Fortune 3 scale. Deep fluency in translating technical risk into the language of business impact, board governance, and enterprise value.

    AI-Driven Security Behavior Change

    Led the organization that secured a U.S. patent in AI-driven security behavior change - the foundation on which Sixth Wall's culture transformation methodology is built.

    Enterprise-Scale Communications

    Built communications capabilities from scratch at a Fortune 3 company with 465,000 employees. Managed M&A communications for transactions up to $7 billion.

    Executive Training & Coaching

    Delivered executive masterclasses and leadership workshops across three continents. Praised as "the perfect mix for an executive trainer" by the Dean of Ecole des Ponts Business School.

    Research & Thought Leadership

    Authored research cited by Harvard University. Career spanning semiconductors, cybersecurity, healthcare, enterprise software, and AI.

    Contact

    Let's Build the Wall That Matters

    Whether you're a CISO preparing for the board, a CRO quantifying human risk, or a security leader ready to build the culture your program depends on.

    Every strong defense starts with a conversation

    We work with a select number of organizations at a time to ensure the depth of engagement each deserves. We're particularly well-suited for security leaders and executives at Fortune 500 companies who are building or transforming their security culture, preparing for high-stakes board or C-suite communications, or facing an AI-era threat landscape that their current awareness programs weren't built for.

    Loading...

    Schedule a Call

    Initial conversations are always confidential and without obligation. We typically respond within 24 hours.