From Professional Baseball to Cybersecurity Entrepreneur

A Conversation With Greg Tomchick, CEO, Valor Cybersecurity

by Beth Hester

Greg Tomchick, is a former professional baseball player. He’s a cybersecurity entrepreneur, author, and international speaker. He inspires others to embrace change, build trust and create a lasting impact in the digital age. He focuses on cybersecurity in the government contracting space. He’s also, incidentally, a proud ODU alumnus.

CoVaBIZ: What was the defining moment that led you to found Valor Cybersecurity?

Greg Tomchick: I was an entrepreneurial kid, always building things. In my first successful business, a software development firm, I was the victim of a widespread cyberattack. Coming out of pro baseball, I had already faced one major identity shift. But this moment cut deeper. It forced me to pause and ask a question that still guides me today: What’s the most painful thing I’ve been through that I can help others prevent?

That experience planted the seed for Valor. After years of building cybersecurity companies for others, I saw a growing gap. Leaders didn’t need more tech, they needed clarity and confidence. Valor was created to bring both, helping business leaders win in a world where trust is constantly under pressure.

How did transitioning from pro baseball to cybersecurity shape your leadership style and what core mindsets or habits helped you succeed?

Baseball taught me how to lead in the middle of chaos. You train your mind to slow the game down when everything’s speeding up around you. That same mindset shaped how I lead in cybersecurity. I focus on preparation, team clarity and keeping people grounded in high-stakes situations.

The habit that helped most with my transition, was learning to adapt quickly without losing discipline. I didn’t come from a cybersecurity background, I had to outlearn, outwork, and out connect others in he field. That mindset carried me through the transition and still fuels how I lead teams today.

Valor Founder, Greg Tomchick

Valor Founder, Greg Tomchick

Why focus Valor on defense contractors and Cybersecurity Maturity Model Certification (CMMC) compliance?

Defense contractors operate behind the scenes but sit at the front lines of national security. Most are small to mid-sized companies without the tools or structure to navigate cyber risk. CMMC—which is a framework that mandates cybersecurity standards for defense contractors to protect sensitive information—gave them a clear framework, but many still feel stuck. At Valor, we focus on this space because we believe secure businesses build a secure nation, and these companies deserve the same level of protection as the primes they serve.

What cybersecurity risks can make or break a DoD bid?

It comes down to one word: proof. You can’t just say you’re secure. You have to show it. A company might have great people and solid tech, but if their documentation is weak or they can’t prove their environment is protected, the bid falls apart.

What kills momentum is inconsistent access control, unclear data flow, and weak supplier oversight. The DoD wants risk-aware partners who can demonstrate real control of their systems. If you can’t prove it, your business is at risk.

What emerging threats should business leaders be preparing for now?

Threats are evolving faster than most companies can respond. Deepfakes, AI-generated phishing, and third-party supply chain attacks are rising. But the real threat is thinking the old ways still work.

Leaders need to prepare their people as much as their systems. The attacks will come through human error or vendor gaps more than a brute-force hack. Awareness, identity verification, and accountability in an organization’s culture are more critical than ever. Technology evolves, mindsets must as well.

How can smaller businesses with limited budgets prioritize security?

Start with visibility. Know what systems you have, who has access, and where your data lives. Then secure the basics—strong passwords, multi-factor authentication, data backups and employee training.

You don’t need enterprise tools. You need the right strategy. Focus your energy on protecting your highest-risk assets and building habits that scale. Cybersecurity isn’t about being perfect. It’s about being prepared for what matters most.

What’s the most unexpected item on your desk and is there a story behind it?

There’s a cracked baseball sitting on the edge of my desk. It’s from my final professional game. The seams are worn, the leather scuffed, and a deep crack runs down the side. It is a quiet reminder that even the things we dedicate our lives to eventually come to an end. That ball isn’t just from a game. It’s a symbol of transition, resilience, and reinvention, all lessons baseball taught me repeatedly. Every time I see it, I’m reminded that no chapter lasts forever. But your character does. What defines us is how we step into the next one.

If you could invite three people to dinner with your family and team, who would they be and why?

Teddy Roosevelt for his courage and relentless drive to lead from the front. Maya Angelou for her unmatched wisdom on empathy and communication. Elon Musk for pushing every boundary of what’s possible.

Each one brings a unique force, bold action, deep human connection, and future-focused innovation. That’s the kind of energy I want around the table, both at home and at work.

Related Posts

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept

Privacy & Cookies Policy