<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/category/cybersecurity/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Sun, 17 Sep 2023 19:28:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>Cybersecurity Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/category/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?</title>
		<link>https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/</link>
					<comments>https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:28:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2858</guid>

					<description><![CDATA[<p>Threat intelligence offers a unique approach to cybersecurity in the 21st century. It provides visibility and helps eliminate blind spots across the threat landscape. Cyber professionals still have to wear their “detective” hats to pull together insights, but they now have a better map to use. You’ll be able to observe cybercriminals and understand their [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/">What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?' data-link='https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="size-medium wp-image-2859 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-300x199.jpg" alt="threat intelligence" width="300" height="199" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-300x199.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-1024x680.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-768x510.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-1536x1020.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-2048x1360.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-640x425.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Threat intelligence offers a unique approach to cybersecurity in the 21st century. It provides visibility and helps eliminate blind spots across the threat landscape. Cyber professionals still have to wear their “detective” hats to pull together insights, but they now have a better map to use.</p>
<p>You’ll be able to observe cybercriminals and understand their attack strategies with this clear understanding of their capabilities. That’s the opportunity, but you may not be getting the full value of threat intelligence in your organization. Its outcomes range, with some businesses heralding it while others feel overwhelmed by it.</p>
<p>In this post, we’ll review what threat intelligence is, its current impact, and what it all means to your cyber team.</p>
<h2>What Is Threat Intelligence?</h2>
<p>Threat intelligence describes the activities of collecting, processing, and analyzing data to understand a cyber criminal’s motives, targets, and attack behaviors. It should empower an organization to make quicker, more informed, data-driven security decisions. It can also help change your position to be more proactive than reactive.</p>
<p>There are three areas of threat intelligence:</p>
<ul>
<li><strong>Tactical:</strong> This segment focuses on malware analysis and enrichment and examines threat indicators around your cyber defenses.</li>
<li><strong>Operational:</strong> This category covers understanding the capabilities, infrastructure, and techniques of threat actors and leveraging them to conduct more targeted cyber operations.</li>
<li><strong>Strategic:</strong> This classification involves a high-level understanding of trends and motives and then using it to improve your strategy and decision-making.</li>
</ul>
<h2>Why Does Threat Intelligence Matter?</h2>
<p>Cyberattacks are constant and unrelenting. They are always in a state of growth and flux, with new attack methods springing up every day. Your good guys are constantly at war with hackers, and threat intelligence gives you an edge.</p>
<p>It can play an essential role in cybersecurity, including:</p>
<ul>
<li>Offering information on the unknown, which much of the cyber landscape is, to support better decisions</li>
<li>Empowering cyber stakeholders to uncover the motives of threat actors and the tactics, techniques, and procedures they use</li>
<li>Ensuring cyber professionals are aware of the perspective and motivations behind hacker decision-making</li>
<li>Providing essential information to the business side of a company, so they invest in cybersecurity and mitigate risk</li>
</ul>
<p>When you use threat intelligence, you can tailor your defenses, which builds cyber resilience. While many see its value, it’s not as easy to realize it. Most cyber teams are still at the basic level, such as integrating data feeds related to threats into existing networks, firewalls, IPS (intrusion prevention systems), and SIEM (security information and event management).</p>
<p>What do those using it actually experience?</p>
<h2>How Are Organizations Using Threat Intelligence?</h2>
<p>In a recent <a href="https://www.scmagazine.com/whitepaper/threat-intelligence-eyes-on-the-enemy" target="_blank" rel="noopener">cyber risk survey</a>, professionals had differing views of threat intelligence. Many stated it’s a significant support for cyber resilience, enabling them to be more proactive. Its other positive reviews include its ability to deliver insights and visibility. It allows greater awareness of the mind of a hacker, enabling cyber professionals to know what to look for in the <a href="https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/" target="_blank" rel="noopener">threat landscape</a>.</p>
<p>This sentiment wasn’t echoed by everyone. Other companies said it overwhelmed their team with all the alerts. Some also indicated that it produced failures in managing third-party risk.</p>
<p>Overall, a thread throughout respondents was that adapting is key to outmaneuvering threat actors. This approach requires several things, including:</p>
<ul>
<li>Automating some parts of threat detection</li>
<li>Collecting more data about threats for human analysis</li>
<li>Investing in tools and technology to support threat intelligence and integrating them into the enterprise</li>
<li>Improving the <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">soft skills of cyber professionals</a> so they can effectively communicate the intelligence and act on it</li>
</ul>
<p>These varied viewpoints put into focus where the opportunities and challenges are.</p>
<h2>The Opportunities and Challenges of Threat Intelligence</h2>
<p>In evaluating the current use cases and value of threat intelligence, you have to account for the possibilities and the problems. Let’s look at those:</p>
<h3>How You Use Data Determines Its Value</h3>
<p>Most threat intelligence data comes from internal network traffic, not external sources like the dark web. As a result, its value often aligns with two areas of cybersecurity — improving incident response and internal awareness.</p>
<p>Those are critical areas of your strategy and demonstrate the ability to be proactive. Enhancing your plans for reacting to threats fits in this category. The actual response is not, so the benefit is being more prepared.</p>
<p>With internal awareness, you are using the data to predict where threat actors will attack. How your technical folks use it could be the problem. In general terms, those in the field lack awareness of themselves and others. They have narrow perspectives and think in ones and zeros. The most technically adept cyber professional can still falter here because they aren’t adapting their mindset to align with what hackers are doing right now. Thus, you have to help them develop awareness for this intelligence to be actionable.</p>
<h3>Automating Threat Intelligence Reduces Manual Work, But Human Analysis Is Still Necessary</h3>
<p>There are lots of great systems that can automate threat detection and respond to it. It’s an early warning tool that puts less strain on your team, which may already be short-staffed. These tools are helpful and practical, but you still need human intelligence for analysis and improvement of strategies.</p>
<p>This is going to require <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/" target="_blank" rel="noopener">communication</a> and collaboration inside your team and with other parties. For the analysis to be valuable, people have to think critically and creatively about the threat landscape. It’s not just a technical assessment of the information.</p>
<h3>Threat Intelligence Offers a Better Way to Update Your Playbook</h3>
<p>The policies, protocols, and strategies of cybersecurity reside in your playbook. It’s a fluid document that evolves as threats and risks do. What you learn from threat intelligence has a big impact on this playbook.</p>
<p>When your playbook goes through these updates, you also have to change the behavior of your people in relation to them. Change is hard for anyone or any organization. It may be even more difficult for technical folks. They like to keep things the same because it’s comfortable and gives them a better sense of control. Mindsets like these don’t help you manage risks and threats, so more development needs to happen in your people to align with what you get from threat intelligence.</p>
<p>In reviewing these components, you can see that threat intelligence is more than data, monitoring, and analysis. The human element is critical for it to really move your cyber operations forward. Developing specific attributes and abilities in the realm of people skills is just as necessary as implementing tools and technology.</p>
<p>As a result of this complex ecosystem, you can improve on the people part with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step program I developed to help cyber leaders do just that.</p>
<h2>Threat Intelligence and the Secure Methodology</h2>
<p>Having more data and information in cybersecurity doesn’t automatically mean it’s usable, practical, or seen as valuable. Technical people don’t deny data and its insights, but they can overlook them based on their own biases and fears. The Secure Methodology offers a way to overcome those. Here’s a quick introduction to the seven steps, which are the central theme in my book, <em><a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">The Smartest Person in the Room</a>:</em></p>
<ul>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>:</strong> I mentioned awareness earlier and its importance in threat intelligence. It’s where the Secure Methodology begins, with the objective of opening people up to new perspectives, including those of cybercriminals. You can do this by coaching your people in a personalized way by understanding their motivations.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a>:</strong> Next is mindset, which is also very critical. You want to assist people in expanding their mindset from one that’s fixed to one that’s growing. Your people have to break outside of the black-and-white thinking that doesn’t allow for new ideas. The Secure Methodology offers exercises on reflection and accountability to foster this shift.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a>:</strong> In this phase, you must rethink how you acknowledge the work of your team (or start if you don’t do it at all). When you do this outwardly in response to how someone took intelligence and made a difference, it demonstrates to everyone that this is a means to an end. It also builds rapport and trust.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a>:</strong> Transforming technical people into better communicators isn’t easy, but it is always necessary. Open and transparent communication regarding threat intelligence is essential for it to be usable to deter hackers and thwart attacks.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a>:</strong> We are an industry of multitasking, but it’s not always a great way to be productive. Instead, encourage team members that while they are assessing threat intelligence, they should do only that and not be distracted, which triggers more critical thinking.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a>:</strong> Step six refers to others being able to put themselves in the place of others. It aligns with all the stages before it and is crucial in deciphering and acting on threat intelligence. Your people have to think like hackers.</li>
<li><strong>Kaizen:</strong> The final stage is a Japanese term that translates to “continuous improvement.” It’s a step that never ends because cybersecurity will always need to evolve, and threat intelligence is a key driver for continuous adaptation.</li>
</ul>
<p>By applying the Secure Methodology, your organization can derive more value from threat intelligence, leading to better defenses. Get started today by <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">reading my book</a> and exploring the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?' data-link='https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?' data-link='https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/">What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</title>
		<link>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/</link>
					<comments>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:09:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity skills gap]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2852</guid>

					<description><![CDATA[<p>The cybersecurity workforce landscape is at a serious threat level. Millions of jobs are unfilled, and most companies state they can’t find qualified cybersecurity job candidates. If we continue on this trajectory, risks will rise and jeopardize the data and networks of thousands of businesses. As an industry, we must change how we hire, recruit, [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/">How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2853 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-300x200.jpg" alt="cybersecurity training" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />The cybersecurity workforce landscape is at a serious threat level. Millions of jobs are unfilled, and most companies state they can’t find qualified cybersecurity job candidates. If we continue on this trajectory, risks will rise and jeopardize the data and networks of thousands of businesses.</p>
<p>As an industry, we must change how we hire, recruit, and develop cybersecurity talent. <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">Expanding how you consider someone qualified</a> is a necessary step. Seeing the potential in someone who doesn’t necessarily check all the boxes is one way to address the shortage. For this to work long-term, upskilling must be a part of your employee development strategy.</p>
<p>This upskilling includes hard and soft skills because cyber job candidates need both to thrive. Let’s review the current cybersecurity workforce challenges, the facts about the skills gap, and how to upskill new hires.</p>
<h2>Cybersecurity Workforce Challenges</h2>
<p>Cybersecurity job growth is a bright spot in the tech industry, with many opportunities for someone to have a career that pays a good wage and is in demand. However, the field is currently experiencing significant shortages.</p>
<p>According to the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">(ISC)2 2022 Cybersecurity Workforce Study</a>, the global cybersecurity workforce grew to over 4.6 million, which is an 11.1% year-over-year increase. Unfortunately, 3.4 million jobs remain empty. As a result, many companies and cyber firms are operating without enough people, which can directly impact risk.</p>
<p>So, why is the industry struggling with recruitment and retention? It’s a complicated ecosystem, so there’s no easy answer. The cybersecurity workforce shortage is the result of several trends and occurrences, including:</p>
<ul>
<li>The cyber threat landscape is rapidly expanding, driving the demand for cyber professionals in all industries and businesses. In part, this is a supply and demand issue.</li>
<li>People leave the industry due to <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a>. It’s a common problem in a high-stress environment, and most organizations aren’t doing enough to mitigate this. Without proper staffing, people have to do more work, which increases the feeling of burnout.</li>
<li>Younger generations aren’t choosing cybersecurity as a career. Only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cybersecurity workforce is 34 or younger</a>. The industry needs to find ways to connect with students to attract new people into the field.</li>
<li>Many organizations place too much emphasis on degrees and certifications, which often don’t correlate to having the right abilities, aptitudes, and attitudes. As a result, companies reject those who could be a better fit but need some upskilling.</li>
</ul>
<p>If the industry remains on this path, the shortages will only worsen. Intervention is necessary for the entire community. What you can do to ensure your data and networks remain under protection is to focus back on <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">skills-based hiring</a>.</p>
<h2>The Cybersecurity Skills Gap</h2>
<p>We can’t talk about the labor shortage without addressing the <a href="https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/" target="_blank" rel="noopener">cybersecurity skills gap</a>. It would be great if every cybersecurity job candidate had years of experience and an array of skills. However, cyber leaders agree that a skills gap exists. According to the same workforce study cited above, 55% of hiring managers say applicants don’t meet the criteria of being qualified. The deficit here includes:</p>
<ul>
<li>Hands-on training and experience</li>
<li>Credentials</li>
<li>Degrees</li>
<li>Recommendations</li>
</ul>
<p>These things don’t always indicate that the person can do the job. The same study also looked at specific skills with gaps, which are the ones that matter in terms of upskilling. The skills in demand and often lacking are:</p>
<ul>
<li>Soft skills (e.g., communication, leadership, adaptability)</li>
<li>Cloud computing</li>
<li>Security controls (e.g., network, application, endpoint, implementation)</li>
<li>Coding skills</li>
<li>Software development-related topics (e.g., machine code, testing, languages, deployment)</li>
<li>Data-related topics (e.g., characteristics, collection, classification, processing, structure)</li>
<li>Network-related topics (e.g., architecture, networking components)</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Computing devices (e.g., software, hardware, file systems)</li>
</ul>
<p>It’s a mix of soft and hard skills, but the latter was at the top of the list. It’s possible to develop both of these in an individual who has the desire to learn and evolve. Those abilities aren’t always apparent in technical folks. However, if they are willing and have a good foundation to start from, upskilling can be the key to keeping great people long-term and continuously improving.</p>
<p>So, what’s the upskilling plan?</p>
<h2>Building an Upskilling Plan for Cybersecurity Job Candidates</h2>
<p>The first part of the plan should start with a clean slate of qualifications. Define what is imperative and what someone can learn over time. Get to the root of what makes someone a good cyber professional and what attributes they should possess.</p>
<p>In upskilling, you’ll have two paths — technical and soft skill development.</p>
<h3>Addressing Technical Upskilling</h3>
<p>In looking back at the list of skills above, those in the technical category are pretty standard. That’s a good starting point, but you should also consider the future and add training around AI tools and use cases. The curriculum will evolve as the threat landscape does.</p>
<p>How will they learn these skills? You need to create a learning environment for employees. This can include hands-on training internally, certification classes that you determine as high-quality, and other resources. Making continuing skill development part of your recruitment and retention strategy can attract people to your company and ensure you keep high-performers.</p>
<p>The other part of this is soft skills, and the plan to develop these in technical folks can be more demanding and challenging.</p>
<h3>Improving Soft Skills in Cybersecurity</h3>
<p>Soft skill development is a path that requires commitment and consistency. It’s about behavior change, and there can be many growing pains. First and foremost, you want to find cybersecurity job candidates who are open to this. Sometimes that might not be obvious until you have a few conversations and try to understand what motivates them and if they can handle flexibility.</p>
<p>Transforming anyone into a better communicator and collaborator isn’t easy. With technical folks, it can be harder, as they often have fixed mindsets, see things as black-and-white, and believe they know all the answers. These people could have impressive technical prowess, but these attitudes won’t fit into a healthy culture where everyone is open and transparent. Are they lost causes? No, but again, they must want to change.</p>
<p>You can drive this change with guidance from the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step process that I developed because of the soft skill deficiency and recognizing its value in creating and maintaining a strong cybersecurity posture.</p>
<h2>The Secure Methodology: The Framework for Soft Upskilling</h2>
<p>Here’s a preview of each step and how you can leverage it to improve the soft skills of technical people:</p>
<h3>Awareness</h3>
<p>The guide starts with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, with the objective of being mindful of the self and others. When this is missing, people don’t see or understand how their behavior affects others. If this is rampant in a culture, conflict and resentment build. With exercises on reflection and perspective, people can get to a state of awareness that improves how they interact with others.</p>
<h3>Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is crucial in soft skills, and every person on your team needs an open one. A person cannot change without it. Key to this is defining someone’s motivations and why they respond as they do. In this step, the <a href="https://christianespinosa.com/blog/finding-your-purpose-in-life-understanding-the-7-levels-deep-exercise/" target="_blank" rel="noopener">7 Levels Deep Exercise</a> is a good foundation.</p>
<h3>Acknowledgment</h3>
<p>The third step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>. There are several layers to this step. First, it encompasses feedback and its value to cyber professionals. Your staff wants to hear from you about accomplishments and how they are helping the organization. Not all feedback will be positive, and accountability matters, but you should do this in one-on-one conversations. Ensuring that your team feels appreciated and valued will prompt them to adapt with less friction.</p>
<p>Second is acknowledging that cybersecurity is difficult and filled with uncertainty. You set the tone of the culture, and if you do this well, your team will follow, enhancing their people skills.</p>
<h3>Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the fourth step and the most essential soft skill for anyone. It’s never a bad investment to develop someone’s communication skills. Just be clear on what this means. Being a good communicator and articulate aren’t the same thing. Yes, what we say matters, but most communication isn’t verbal.</p>
<p>An excellent communicator is clear, concise, and transparent. They also recognize the needs of the audience and listen to them fully. Assessing candidates based on communication skills can involve prompting them to share real-life stories about how they used it to overcome challenges.</p>
<p>Listen for their use of geek speak or overly technical terms. This could be a red flag if they aren’t willing to drop the posturing.</p>
<h3>Monotasking</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>; it’s a soft skill you don’t hear much about. Most technical people have been doing the opposite — multitasking. Many believe this is a valuable trait. It is important to be able to juggle priorities, but blocking off specific time to concentrate on one task can make people more productive and eliminate feelings of being in fight-or-flight mode all the time. They will need to act quickly at times and move around priorities, but encouraging monotasking lets people think more critically and problem-solve more effectively.</p>
<h3>Empathy</h3>
<p>In the Secure Methodology, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">cognitive empathy</a> is the sixth step. This type of empathy is the ability to understand another’s feelings and perspectives. It’s crucial to a person’s ability to be a great communicator and collaborator. Much of this relates to stripping down egos and dynamics of “me vs. them.” You can’t have a successful cybersecurity strategy and team without empathy.</p>
<p>Human connection is vital in cybersecurity, and in this phase, you support people to become more empathetic.</p>
<h3>Kaizen</h3>
<p>The last step is kaizen. It’s a Japanese term meaning “continuous improvement.” It’s the step that never ends and focuses on adaptability and flexibility. When you reach this phase, your staff should be in a state where they want to continue to develop their soft skills and transfer them to others.</p>
<h2>Upskill Cybersecurity Job Candidates with the Secure Methodology</h2>
<p>The Secure Methodology provides a framework and tools to transform candidates lacking skills. It’s a proven way to change behavior, with benefits for the person and the organization.</p>
<p>Get more insights on each step by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. You can also explore how to apply it in the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/">How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</title>
		<link>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/</link>
					<comments>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:03:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2850</guid>

					<description><![CDATA[<p>Building a cybersecurity team comes with many challenges. So many factors are impacting the ability to do this effectively and efficiently. The cybersecurity workforce shortage means more competition for talent, but you can’t be confident all those vying for positions have the hard and soft skills to succeed and thrive. On top of all this, the threat [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/">How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2851 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-300x200.jpg" alt="cybersecurity team" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-1536x1025.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Building a cybersecurity team comes with many challenges. So many factors are impacting the ability to do this effectively and efficiently. The <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/" target="_blank" rel="noopener">cybersecurity workforce shortage</a> means more competition for talent, but you can’t be confident all those vying for positions have the hard and soft skills to succeed and thrive. On top of all this, the threat landscape keeps expanding as cybercriminals develop new tools and strategies to exploit weaknesses.</p>
<p>So, what can you do as a cybersecurity leader? As someone who’s been in the position, I have some insights to share on how to accomplish this. Keep reading for strategies, tips, and info about the Secure Methodology as a framework for constructing a cybersecurity team.</p>
<h2>Steps to Take to Build a Sustainable Cybersecurity Team</h2>
<p>Where should you start on this journey? Should you jump right into recruiting and hiring? I would urge you to first develop a strategy, define the tools you need, and create some principles for the culture you hope to cultivate.</p>
<p>To do this, follow these steps:</p>
<h3>Acknowledge that cybersecurity is a people problem and let that guide your strategy.</h3>
<p>It’s easy to blame the breaches and attacks in the cyber world on technology. Without it, there wouldn’t be an issue, but categorizing it only this way is a fallacy. Behind every attack is a person. Every defense also has human intelligence executing it, and most causes of cyber incidents relate to errors, mistakes, or intentions of someone.</p>
<p>It’s very much a people problem, and that fundamental principle should guide your team-building strategy. Yes, there are lots of great cyber tools out there that are leveraging AI and enabling automation. You need those, but the people charged with managing them need knowledge and skills to do so. Those skills must include soft ones, as the human issue in cybersecurity won’t find a resolution without staff that cannot communicate or collaborate.</p>
<p>There is a current soft skills gap in every industry, including cybersecurity. The people who are a good fit for your roles may not possess these. If they are curious to learn and motivated to evolve, they can be great additions to your team.</p>
<h3>Ensure the bad guys are cybercriminals, not internal.</h3>
<p>Another element of creating a cybersecurity team is to eliminate the “us vs. them” mentality that often happens between technical and business folks. You’re all on the same side, but much of that can get lost in translation. The business side may not take cybersecurity as seriously as they should, frustrating cyber professionals. There’s animosity on your side, too, as your team may resent others, especially when they have questions and challenges.</p>
<p>It&#8217;s critical to put the target back on the real enemy’s head. There must be balance and cooperation between business and technical groups. You don’t want to bring someone on who fails to understand the perspective of others. Employees like this will degrade the trust and credibility of your team and do anything to avoid being wrong. You can spot this in how they respond to queries about collaborating and if they do a lot of posturing.</p>
<h3>Look for a wide range of skills.</h3>
<p>You have to define the requirements you want in your team, which should include various abilities and aptitudes. In doing so, you have to <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">shift your definition of qualified</a>. The majority of cyber leaders believe applicants don’t have the right qualifications, according to the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">State of Cybersecurity 2022 report.</a> What they say people lack includes hands-on experience and training along with credentials and degrees.</p>
<p>The hands-on part makes sense because you want people to have real-world interactions. One cannot get this without opportunity. It’s especially true for younger generations, who we need to join the field. These people could be bright and eager to learn, making them excellent hires.</p>
<p>Credentials and degrees can demonstrate skill sets but not always. Often, people look great on paper because of these achievements but lack the knowledge to apply what they learned in classes. The learning may also be insufficient, especially for courses that validate aptitude based on multiple-choice tests. You can only be confident in one thing for those passing these — they can memorize answers. Beware of these “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>.”</p>
<p>Instead, use skills-based hiring models. This approach focuses on a candidate with specific competencies that directly relate to the work. It involves soft and hard skills.</p>
<h3>Develop your recruitment strategy on skills-based hiring.</h3>
<p>Building a strong, multi-dimensional team requires a mix of people. Not everyone has to be strong in everything. You can create a staff who can learn from each other and you.</p>
<p>With skills-based hiring, you can:</p>
<ul>
<li>Identify people with abundant soft skills and a desire to improve their technical skills.</li>
<li>Find candidates who have familiarity in all areas of cybersecurity but don’t have real-world experience yet and develop them.</li>
<li>Attract people newly entering the workforce and those starting over, which can help you build that right mix.</li>
<li>Assess people holistically instead of only looking at their technical aptitude.</li>
<li>Reduce barriers for people getting a shot at a cyber career who didn’t attend college.</li>
</ul>
<p>Putting together a team of cyber professionals in this manner can lead to a strong and healthy culture. It can also decrease risk and ensure that <a href="https://christianespinosa.com/blog/why-cybersecurity-deserves-a-seat-at-the-leadership-table/" target="_blank" rel="noopener">cybersecurity has a seat at the table</a> to influence business decisions. You simply won’t be able to do that if you hire with bias found in the old ideals of “qualified.”</p>
<p>All these ideas and opportunities align directly with the Secure Methodology, which is a seven-step process of transforming people with purely technical and closed mindsets into great communicators and partners.</p>
<h2>The Secure Methodology and Building Your Cybersecurity Team</h2>
<p>The Secure Methodology is the foundation for creating and maintaining a team that thrives and is adaptable. I based it on my own experiences and observations of what was going wrong in cybersecurity, which is a people problem.</p>
<p>Here’s a glimpse of each step and how it can support your hiring strategy:</p>
<h3>Awareness</h3>
<p>The process kicks off with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>. It pertains to both self and others. Without it, people don’t understand the impact of their behavior on relationships and communication. It’s about opening up people’s blind spots.</p>
<p>Will every candidate already have awareness? And how do you evaluate this? Most people lack awareness to some extent, so it often requires development. You can assess someone’s state of awareness or willingness to get there by asking them to reflect and tell you about a challenging time and how they handled their interactions with others.</p>
<h3>Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is critical for anyone’s ability to grow and evolve. Those with a fixed mindset will resist any type of change. It’s a problem for technical people because they desire absolutes, but cybersecurity is a dynamic and volatile field! It’s kind of a paradox, so be observant of how people communicate about themselves and their experiences. This can give you a good idea of how open their mindset is and if they’ll be a good fit for your team.</p>
<h3>Acknowledgment</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>, which you’ll want to make a pillar of your culture. Technical employees crave feedback and understanding of their place in the business. Of course, they must also be receptive to it because it won’t always be positive. You also want to know if someone can acknowledge the work and contributions of others within the group or outside of it.</p>
<h3>Communication</h3>
<p>The fourth step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and it’s the most important concept when creating a team. We can’t do anything well without honest, transparent, and consistent communication.</p>
<p>Being a good communicator doesn’t just mean being articulate. In the world of cybersecurity, your team must be clear about what they need, the challenges they face, and what’s really happening in the threat landscape. They also have to be active listeners to be good collaborators.</p>
<p>You can likely assess someone’s communication skills within the context of your conversations. Look for those who can clearly express big ideas and don’t use geek speak. If they show signs of this and seem to be listening to you, it’s a good sign, and you can continue to help them master this skill.</p>
<h3>Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is the fifth step, and it means concentrating on one task or project at a time without disruptions. It’s hard to find anyone who monotasks much in the workforce, where we seem always to be doing five things at once.</p>
<p>You can talk about monotasking in interviews to see someone’s reaction to it. Do they think it’s bad for productivity or impossible? Emphasize that you believe it to be a critical component of the workday because it enables critical thinking and problem solving, which are two huge assets in cybersecurity.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is the sixth step, and in this connotation, it means the ability to understand someone’s perspective and feelings. It’s one of the hardest things for anyone to build, and yes, we must learn it. We are not innately empathetic. Achieving this can help with stress, burnout, and frustration toward others.</p>
<p>In speaking with prospective hires, ask them about a time when empathy would have been a good response to a problem. The answers they give can reveal a lot about their inner workings.</p>
<h3>Kaizen</h3>
<p>The last step is Kaizen. It’s a Japanese term that means “change for the better.” It never ends because continuous improvement is forever. When hiring, you want to put people on your team who believes in this approach to work.</p>
<p>Ready to learn more about the Secure Methodology? Start by reading <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a> and explore the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/">How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger</title>
		<link>https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/</link>
					<comments>https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 18:58:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity silos]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2847</guid>

					<description><![CDATA[<p>Silos are a common theme in many businesses. It can occur in any industry, department, or team. The reasons this is all too prevalent are many, from cultural issues to not sharing data to a lack of communication. Silos undermine an organization’s ability to be proactive and agile, weakening its cybersecurity posture. So, how did [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/">Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger' data-link='https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2848 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-300x243.jpg" alt="cybersecurity silos" width="300" height="243" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-300x243.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-1024x829.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-768x622.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-1536x1244.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-2048x1659.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-640x518.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Silos are a common theme in many businesses. It can occur in any industry, department, or team. The reasons this is all too prevalent are many, from cultural issues to not sharing data to a lack of communication. Silos undermine an organization’s ability to be proactive and agile, weakening its cybersecurity posture.</p>
<p>So, how did cybersecurity become so siloed? And what can you do to break silos down?</p>
<h2>Why Silos Exist in Cybersecurity</h2>
<p>Cybersecurity often sits in a walled garden, with little interaction with the business side of an organization. There have been some shifts to bring it into the fold, with CISOs (chief information security officers) now <a href="https://christianespinosa.com/blog/why-cybersecurity-deserves-a-seat-at-the-leadership-table/" target="_blank" rel="noopener">having a seat at the table with the C-suite</a>.</p>
<p>This demonstrates the process, but the silos have stood for a long time, so they are very much a current problem. There are several reasons why they exist, including:</p>
<ul>
<li>Businesses believing cybersecurity impedes innovation and growth and intentionally wanting to keep it separate</li>
<li>The increased number of attacks and threats cybersecurity teams must defend against, which keeps them in a reactive mode instead of a proactive one</li>
<li>Failures in communication that leave cybersecurity and other parts of the company unaware of the landscape and its evolution</li>
<li>No shared accountability for cybersecurity throughout the organization, which leaves cybersecurity on an island when it comes to security and resilience</li>
<li>Company leadership not treating cybersecurity as a business enabler, which can impact budgets, staff numbers, and resource allocation</li>
<li>No initiatives to build partnerships across the organization between cybersecurity and other teams</li>
</ul>
<p>All these reasons have a foundation in disconnection. When cybersecurity isn’t a critical part of an organization, it’s easy for silos to stay in place.</p>
<p>Those silos can exist within teams as well.</p>
<h2>Cybersecurity Silos Are Present Within Technical Teams</h2>
<p>It’s not just the enterprise-wide silos you have to worry about. Chances are they are also creating walls within your people. These may be even harder to conquer because of the nature of the job and the characteristics of individuals.</p>
<p>Silos within cybersecurity occur primarily because cyber professionals never want to be wrong. They concentrate on always being the smartest person in the room. When others question their stance, internally or externally, they find solace in silos where they have all the control.</p>
<p>If this sounds familiar, you’re not alone. It’s all too common in the cybersecurity workforce to have people operating independently without much awareness of what others are doing. Furthermore, many don’t care. They have surety in their capabilities and don’t want to share or collaborate because it could lead to them being wrong.</p>
<p>The silo mentality leads to the things that are threatening the cybersecurity workforce — unhealthy cultures, <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a>, and an uneven work-life balance. These were all reasons that cyber professionals left jobs, according to the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">(ISC)2 Cybersecurity Workforce Study</a>.</p>
<p>Dissatisfaction in a cyber job has more to do with organizational issues than the work. Silos are a threat to your team and cybersecurity posture. They breed resentment and disengagement. It’s bad for everyone, but it’s difficult to transform mindsets and perspectives from a silo perspective to a collaborative one. For this shift to occur, you have to focus more on soft skills than technical ones.</p>
<h2>Silos Keep People From Adapting and Changing</h2>
<p>As noted, silos can seem like safe places for cyber professionals who cling to certainty and believe they don’t need others to do their job well. What it actually does is keep people in a state of stagnation. They won’t grow or change because doing so would mean they have to accept that they don’t know everything. That’s too big of a pill to swallow for many without intervention.</p>
<p>Those who crave the safety of a silo aren’t bad people (usually). It is possible for them to get to a point where they’ll embrace the gray that cybersecurity lives in, moving away from <a href="https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/" target="_blank" rel="noopener">black-and-white thinking</a>.</p>
<p>Cybersecurity is a dynamic industry, indicating that evolving practices and protocols are necessary. Even if you consistently improve your strategies and ways to manage and eliminate threats, that doesn’t mean that silos aren’t still present. They show themselves in many different ways, from how your employees work with other groups, how they handle user interactions, and what happens when a threat becomes a reality.</p>
<h2>How Silos Put Your Cybersecurity Posture At Risk</h2>
<p>On the threat landscape, there are a million things that increase risk. As networks grow, workers remain remote, and implementations of new technology rise, there’s risk everywhere. You have to defend against phishing, malware, and ransomware, which requires a united front and effort. Silos make this harder.</p>
<p>When silos exist within the department or in the company, the ability of a cyber team to be proactive against these threats becomes very difficult. Being proactive requires everyone to work together from a defined strategy. It involves a lot of communication and movement across the organization to establish and maintain your “protective shield” against attacks.</p>
<p>Attempting to reduce or eliminate risk is a journey that never ends or stays the same. Doing this well really means working as a team. Even if you have lots of protocols and tools in place, a silo doesn’t crack so easily. And often, people can do just enough to collaborate but true transparency is still missing.</p>
<p>As a result, errors and mistakes occur. Assumptions about who’s doing what and when are usually wrong, and gaps in your cybersecurity posture widen. It gives hackers an opportunity to exploit these weaknesses, so having silos is a helping hand to cybercriminals. If you want to prepare your organization to be cyber-resilient, you have to focus on growing your team’s people skills.</p>
<h2>Development of People Skills Is a Silo Breaker</h2>
<p>When individuals improve their people skills, they see the value in working together. They understand that silos are holding them back and want to work in a culture that thrives in teamwork.</p>
<p>It would be great if people could come to this realization on their own. Some never will, but many are willing to commit to developing their soft skills, especially when they realize it can decrease risk. Ultimately, most cyber professionals got into this field because they are passionate about security. If they know that their behaviors and actions have impacted their cybersecurity posture, they may be even more eager to change and adapt.</p>
<p>So, how does this happen in the real world? It won’t occur without a framework and strategy. You can’t start this journey without a map, and you’ll find one in the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<h2>The Secure Methodology Transforms Silos</h2>
<p>The Secure Methodology is a seven-step guide to transforming technical people into excellent communicators and collaborators. Each step seeks to resolve the major problems that exist in the <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/" target="_blank" rel="noopener">cybersecurity workforce</a>, supporting people as they pursue a new mindset and perspective. Here’s how each step can knock down those silos for good:</p>
<h3>Awareness</h3>
<p>The Secure Methodology starts with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a> of self and others. When awareness is lacking, silos flourish because there’s no connection. Technical folks will remain on their own island, causing friction and antipathy.</p>
<p>You can use coaching methods within this step to drive people to open their eyes and realize the detriment of silos. You can also learn about their motivations, which will be vital in changing behavior.</p>
<h3>Mindset</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindset</a>, and it’s a key contributor to silos. When people have a fixed mindset, they have tunnel vision and no desire to change. This step is about helping them open it, which can occur with reflection, asking questions, and working as a team in decision-making.</p>
<h3>Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is the third step, and the lack of it is another cause of silos. Acknowledgment means recognizing people for their efforts regularly. They want and need praise to feel part of something, which is critical to breaking down silos. Part of this is also acknowledging that no one can know everything about cybersecurity but that collectively, we all have a better shot at defending against threats.</p>
<h3>Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the fourth step but crucial in all the others too. Communication is the single biggest tool you have to remove silos. Consistent, transparent, and clear communication within your team and outside of it ensures that silos don’t form or stay.</p>
<p>Working on communication isn’t easy. It takes a lot of practice and learning new ways to share information and listen.</p>
<h3>Monotasking</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>, which means workers focus only on one task. It’s the opposite of multitasking, which often leads to sloppy work. Yet, people receive praise for multitasking, but it’s a problem in cybersecurity.</p>
<p>In terms of silos, if you encourage people to block time to work on specific things without distraction, they can use critical thinking skills and balance their workload. Gaining these things supports a collaborative workforce where there’s even distribution of work and team support.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is an essential soft skill that we have to learn and develop. Silos can’t function in an empathetic culture because people can see the perspective of others. When they do, there’s no longer a “me vs. them” mentality. This step includes exercises to help people foster this skill.</p>
<h3>Kaizen</h3>
<p>The last step is kaizen, which is a Japanese term meaning “continuous improvement.” It’s a stage that never ends with an emphasis on root cause analysis. If your team can embody this, silos won’t have fertile ground.</p>
<p>Using the Secure Methodology is a proven path for transformation and removing silos. You can learn more about it in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and in the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger' data-link='https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger' data-link='https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/">Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Red Flags to Pay Attention to in Your Cybersecurity Staff and How to Handle Them</title>
		<link>https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/</link>
					<comments>https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 19:22:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[red flags]]></category>
		<category><![CDATA[toxicity]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2844</guid>

					<description><![CDATA[<p>Building your cybersecurity team isn’t easy. Recruiting, hiring, and retaining staff is a significant challenge in today’s environment. However, that doesn’t mean you should keep people who aren’t performing well, create toxicity, and collaborate poorly. There are many red flags you should pay attention to concerning your cybersecurity staff. This doesn’t automatically mean you should [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/">The Red Flags to Pay Attention to in Your Cybersecurity Staff and How to Handle Them</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Red Flags to Pay Attention to in Your Cybersecurity Staff and How to Handle Them' data-link='https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2845 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-300x225.jpg" alt="cybersecurity team red flags" width="300" height="225" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-300x225.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-1024x768.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-768x576.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-1536x1152.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-2048x1536.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/07/paolo-bendandi-D6_y7pAPMqw-unsplash-640x480.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Building your cybersecurity team isn’t easy. Recruiting, hiring, and retaining staff is a significant challenge in today’s environment. However, that doesn’t mean you should keep people who aren’t performing well, create toxicity, and collaborate poorly. There are many red flags you should pay attention to concerning your cybersecurity staff. This doesn’t automatically mean you should let them go. If they are willing to grow, change, and adapt, they still have potential.</p>
<p>As you assess the makeup of your team, you have to be aware of their behavior and its impact on risk, culture, and success. In this post, we’ll review the red flags to be on alert for and how to handle them.</p>
<h2>5 Red Flags That Signal Trouble in Your Cybersecurity Staff</h2>
<p>Before going into this list, there are a few things to discuss. Technical folks often have a bad reputation for being antagonistic and lacking soft skills. In some ways, this is a stereotype that doesn’t always play out in the real world. However, there is some truth in this, as many in the field struggle with communication, collaboration, and change. They crave certainty, but cybersecurity is dynamic and very uncertain much of the time. The nature of the job is also high-stress, and <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a> is a pervasive issue.</p>
<p>The reason to acknowledge these things is to give context to the list of red flags. Many of these aren’t necessarily conscious decisions by technical people to be difficult. They are creatures of habit and will tend to keep these patterns unless they become aware of them and see a path to grow and learn. The real problem comes when individuals resist any development of <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">soft skills</a> and can’t take criticism or coaching. Keep these things in mind as we discuss the topic further.</p>
<h3>They Mask Insecurity with Posturing</h3>
<p>No one wants to admit they feel insecure about anything, least of all cyber professionals regarding their work. They believe that not knowing everything is a weakness, and they need to hide this from everyone. The reality is that no one can know everything about anything. It’s especially true in cybersecurity, where new threats emerge every day, and hackers are hard at work trying to breach your networks.</p>
<p>When posed questions about a risk, threat, or concern, they will posture instead of admitting they aren’t sure what the answer is. It turns into a tirade of geek speak that doesn’t make much sense to those on the business side. When you see these reactions play out, it’s a big red flag. All that posturing and blustering doesn’t help your team or company. It actually creates more risk and continues the stereotype of technical folks being defensive and rude.</p>
<p>As a cyber leader, you have to call this out immediately. You don’t want to be antagonistic in your response, as that’s unlikely to remedy the situation. What you should do is talk about the insecurity they’re obviously feeling and get to the why.</p>
<p>Helping them become aware of their behavior and its impact can drive change if they are willing to be accountable. Encourage them to ask for help, investigate the issue, and communicate with transparency. Give them chances to rework how they approach a problem they don’t know the answer to. They will either appreciate your advice and start working on themselves or revert to what feels comfortable. If they do the latter, they may not be the best fit for your culture.</p>
<h3>They Are Black and White Thinkers, and It Hinders Communication and Collaboration</h3>
<p>Technical folks are logical, rational thinkers most of the time. It comes in handy in such a high-pressure industry. However, it can make them more prone to only see things as black and white. <a href="https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/" target="_blank" rel="noopener">Cybersecurity is anything but black and white</a>! Most of it lives in the gray because hackers are always trying new approaches to steal your data. They are creative and curious. Your cybersecurity staff should be, too.</p>
<p>A black-and-white thinker has a fixed mindset with only one correct answer. This may sometimes be true in the technical aspect of cybersecurity, but in the big picture, it’s not. What creates the red flag here is when they take this perspective into communication and collaboration. They won’t actively listen or participate in trying to solve the problem other than to give you the one answer they believe to be true.</p>
<p>Addressing this means working on communication and collaboration. Again, they must become aware of their behavior and how it hurts the team. The key is to open their mindset toward change and accept that there are many possible solutions. Finding what will work will require a group effort, so they have to be willing to be part of the effort.</p>
<p>Improving communication skills is hard for anyone. Technical people often have an even harder time, but it’s not impossible. Transforming them into healthy communicators is a critical step in the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step guide for cyber leaders to build teams that focuses on developing soft skills for their teams. Many ways to handle red flags tie back to the Secure Methodology.</p>
<h3>They Have Little Regard for Their Clients</h3>
<p>As a cyber team, you are either serving the company you work for internally or externally. Either way, they are your clients, and caring about what they care about matters. The key things that cyber professionals should focus on are—what are we trying to protect, and what are the threats to it? It’s a simplification of the cyber world, but it does come down to these things.</p>
<p>If your cyber staff never asks these questions and goes through the motions of cyber defenses, vulnerabilities are exploitable. You’ll never improve the risk posture if they don’t have some degree of consideration for the job they are doing.</p>
<p>Working on this aligns with the <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness step</a> in the Secure Methodology. It’s the first step, and the goal is for the person to become more aware of themselves and others. They have to be willing to see other perspectives from the business side. When they don’t, constant friction and animosity impede any progress you hope to make.</p>
<p>This concern is also associated with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">empathy</a>, the sixth step of the Secure Methodology. Humans have to learn empathy; it’s not innate. In the business sense, we’re talking about cognitive empathy. It’s the ability to understand another’s feelings and perceptions. It’s not about sympathizing with a person but connecting and accepting their perspective. Helping your team cultivate this skill will go a long way in constructing healthy relationships among the team and with your clients.</p>
<h3>They Don’t Want to Learn from Their Mistakes</h3>
<p>Every cyber professional will err—sometimes, many times a day or week. It’s not an exact science, and the threat landscape keeps changing. Making mistakes isn’t a red flag; not wanting to learn from them is.</p>
<p>Mistakes can be teachable moments for cybersecurity staff. Huge blunders that happen due to negligence are another category, but most errors are part of the job. When these things happen, you need to acknowledge it privately and see what response you get. If the person is immediately defensive and not accountable, that’s bad news. If they are willing to take responsibility and learn from it, that’s someone you want on your team.</p>
<p>You also have to create a culture where an error isn’t an automatic pink slip. You don’t want people so scared to make one that they do nothing. It comes from being transparent in communication and giving feedback to the group and individuals consistently.</p>
<p>Ultimately, learning is about embracing continuous improvement or “Kaizen,” which is the final step in the Secure Methodology. It’s the never-ending step that guides your cybersecurity staff to welcome change and not fear it.</p>
<h3>They Thrive on Negativity</h3>
<p>Cyber professionals are often pragmatic and realistic, which aren’t red flags alone. It becomes a problem when they only want to argue and spread negativity. They never have a positive thing to say or offer to the conversation. It’s disruptive and creates resentment. If someone is rude to everyone they engage with at work, it’s not good for your culture, team, or risk.</p>
<p>Their predisposition to be negative can be part of insecurity and posturing. Other times it may be an intentional way to sew chaos. You can try to push them toward working on themselves, but they have to be committed to it and realize the damage they are doing. The step of mindset is the first strategy to try with these folks. Shifting mindset is about being reflective and understanding motivation. Exercises in the book offer a way to navigate this journey for those brave enough to take it.</p>
<h2>Tackle Red Flags with the Secure Methodology</h2>
<p>These red flags don’t mean that someone isn’t smart or talented. It usually correlates with the other emotions we’ve discussed—insecurity, uncertainty, and fear. There’s no way to banish all these, but you can support your cybersecurity staff in their growth with the Secure Methodology. Explore more about the steps in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and in the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Red Flags to Pay Attention to in Your Cybersecurity Staff and How to Handle Them' data-link='https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='The Red Flags to Pay Attention to in Your Cybersecurity Staff and How to Handle Them' data-link='https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/">The Red Flags to Pay Attention to in Your Cybersecurity Staff and How to Handle Them</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/the-red-flags-to-pay-attention-to-in-your-cybersecurity-staff-and-how-to-handle-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Diagnosing the Root Causes of the Cyber Workforce Shortage</title>
		<link>https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/</link>
					<comments>https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 19:16:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity skills gap]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2842</guid>

					<description><![CDATA[<p>The cyber workforce shortage has been the talk of the industry for the past few years. Many jobs remain unfilled, and experts predict that will only grow. The reason for this gap is the result of many different factors. At the heart of the problem are root causes. The field can attract and retain workers [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/">Diagnosing the Root Causes of the Cyber Workforce Shortage</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Diagnosing the Root Causes of the Cyber Workforce Shortage' data-link='https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class=" wp-image-2843 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/museums-victoria-7YUvAUbfSV0-unsplash.jpg" alt="cybersecurity skills gap" width="393" height="271" />The cyber workforce shortage has been the talk of the industry for the past few years. Many jobs remain unfilled, and experts predict that will only grow. The reason for this gap is the result of many different factors. At the heart of the problem are root causes. The field can attract and retain workers by identifying these and working to overcome them.</p>
<p>In this post, we’ll look at the data, diagnose the root causes, and define how to close the gap.</p>
<h2>The Data on the Cyber Workforce Shortage</h2>
<p>There is a lot of data on the <a href="https://christianespinosa.com/blog/the-2023-cybersecurity-workforce-landscape/" target="_blank" rel="noopener">cybersecurity workforce landscape</a>. It’s a pervasive issue, so developing reports and surveys is in high demand to uncover the why. We’ll look at the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">ISC 2022 Cybersecurity Workforce Study</a> and the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">ISACA State of Cybersecurity 2022 Report</a>.</p>
<p>The workforce study detailed that the global cybersecurity workforce grew to over 4.6 million, which was an 11% year-over-year increase. Even with this increase, there are still 3.4 million jobs that are vacant. It’s something that’s keeping cyber leaders up at night. Survey respondents had this to say:</p>
<ul>
<li>Organizations with a significant staff shortage had more concerns about risk, with 74% stating it was extreme or moderate.</li>
<li>60% of organizations said they are struggling to keep up with turnover.</li>
<li>70% of companies have challenges with retention.</li>
<li>It takes, on average, three to six months to fill an empty role.</li>
<li>There is a correlation between cyber professionals not feeling their input is welcome and valued and low employee experience ratings.</li>
<li>Younger generations have new expectations in work, with this group more concerned about emotional health, Diversity, Equity, and Inclusion (DEI), and having a voice.</li>
</ul>
<h2>What Conclusions About the Workforce Gap Can We Make Based on the Data?</h2>
<p>So, why does this gap exist? It’s complicated, and many things driving it are outside your control. We can draw some conclusions from the data that diagnose what’s happening.</p>
<h3>More Threats Drive Demand for Cyber Professionals</h3>
<p>First, the demand for more cyber professionals would, of course, increase as cyber threats do. Cybersecurity is about identifying and mitigating risk, so it doesn’t exist without the threat landscape. It keeps us all gainfully employed but consider how much it has evolved in the past few years.</p>
<p><a href="https://christianespinosa.com/blog/ransomware-attacks-new-ways-to-exploit-old-vulnerabilities/" target="_blank" rel="noopener">Ransomware</a> is more prevalent than ever. The means to carry these out have become much more sophisticated. It’s a favorite tactic for hackers, mainly involving financial gain as the desired outcome. Cybercriminals are using old and new weaknesses to attempt to seize control of applications, data, and systems.</p>
<p>Cybercrime-as-a-service enables a new group of criminals to hire hackers on the dark web to do their bidding. You can now choose from a “menu” of attacks, from phishing to ransomware to AI-enabled cybercrimes. No one has to be a cyber genius to launch these attacks. Hacking is now more accessible—a commodity even. As a result, the threat landscape broadens.</p>
<p>Hacktivism is another emerging trend that’s increasing risk. For the first half of 2022, DDoS (distributed denial of service) attacks increased by <a href="https://www.radware.com/pleaseregister.aspx/?returnurl=18bf850e-6320-44a7-85e3-65f9ef072dc8" target="_blank" rel="noopener">203%</a> over 2021, with many of these fitting the hacktivism label. It’s a different motivation for these cyber criminals and impacts businesses even if they don’t have social or political ties.</p>
<p>Then you have all the <a href="https://christianespinosa.com/blog/will-ai-and-machine-learning-help-or-hurt-cybersecurity/" target="_blank" rel="noopener">advancements that AI brings to the hacker toolbox</a>. It enables them to improve phishing campaigns and send them out more quickly. It can help them gather data for attacks, create deepfakes, hide malware, and break passwords and CAPTCHAs.</p>
<p>These are just some highlights, but they represent all the risks and threats that cyber professionals must defend against every day. For organizations, it’s a driving need to hire more people and keep them.</p>
<h3>Retention Is a Concern, and Burnout Plays a Role</h3>
<p>The job of a cyber professional can have moments of high pressure and stress. Without a healthy culture to balance this and consistent communication, this can lead to burnout. If you don’t have enough people, then those you do have to end up with more and more on their plate. Many technical folks further disconnect from the job, considering it their biggest stressor. Being overwhelmed in this manner often ends in attrition.</p>
<p>Without focusing on evening workload, communication, collaboration, and a healthy culture, burnout will grow and play out repeatedly.</p>
<p>Burnout isn’t the only cause of <a href="https://christianespinosa.com/blog/cybersecurity-retention-how-to-combat-turnover-and-keep-employees-engaged/" target="_blank" rel="noopener">poor retention</a>. It’s also the environment. If it’s toxic, more people will leave. They have options with so many jobs available. Other things that contribute to this are compensation that’s not competitive, lack of promotion opportunities, no management support, and inflexible work policies. Regarding financial incentives, only 31% of organizations said they pay a competitive wage.</p>
<p>In short, you can’t attract or keep good employees if you don’t address burnout and retention.</p>
<h3>Cyber Professionals Need More Acknowledgement and Connectedness</h3>
<p>Your current and future employees have a lot of knowledge and expertise. Failure to acknowledge this or ask for their contributions to a challenge creates low morale. It isolates people who are often introverts worried about saying the wrong thing. If they keep this close to the vest, you also can’t understand their motivations and what they need to succeed.</p>
<p>The Workforce Study found that lack of support from leadership contributed to a lower employee experience. Improving this is something within your control. When workers feel valued for their input and part of something bigger, they are more engaged and open to learning and growing. Creating such a culture ensures that you can attract and retain great workers.</p>
<h3>Younger Generations Have Apprehension About the Industry</h3>
<p>Cybersecurity has a branding problem, as younger generations have new expectations about work and for whom they work. Currently, only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cyber workforce is 34 or younger</a>. It’s one of the most consequential drivers for the cybersecurity workforce shortage.</p>
<p>Cybersecurity needs a rebrand to attract these people. It should include things like improving culture, eliminating gatekeeping and blustering, being more communicative, embracing diversity, valuing the employee voice, and helping them grow professionally and personally.</p>
<p>One of the best ways to do this is with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step guide to transforming technical folks into excellent communicators and collaborators. It can be a key way to address many of the challenges related to the workforce gap.</p>
<h2>Using the Secure Methodology to Improve the Cybersecurity Workforce Shortage</h2>
<p>Here’s a preview of each step of the Secure Methodology, which I defined and designed in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. The title refers to how many cybersecurity professionals see themselves and how that can be a downfall.</p>
<h3>Awareness</h3>
<p>In this first step, people become aware of themselves and others. Through the exercises in the book, technical people can begin to understand their behavior and its effect on others. It can be a struggle for anyone, especially cyber professionals. Once they achieve <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, they can let go of fears about uncertainty and their place in the organization, which can counter burnout and improve the employee experience.</p>
<h3>Mindset</h3>
<p>Individuals have a <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">growth or fixed mindset</a>. When it’s fixed, they do not change. They accept their perspective and won’t work to evolve it. It’s a problem that will hamper recruitment, retention, and job satisfaction. If your culture presents a place to grow and adapt through a broader mindset, you can attract and keep people on staff.</p>
<h3>Acknowledgment</h3>
<p>We talked about <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a> earlier and how it feeds into the employee experience. By practicing acknowledgment, your team understands their importance and gets the feedback they crave. Involving your people in big decisions is another form of acknowledgment, and it can go a long way in positioning your company as a great place to work and thrive.</p>
<h3>Communication</h3>
<p>The fourth step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and it’s really the core of the Secure Methodology. We cannot fix the workforce shortage issue without clear, consistent, and meaningful communication. Communication starts in the recruitment phase with being transparent and open about cybersecurity. It also has to be a central part of everything you do with employees.</p>
<p>When it’s part of your culture, you’re building a collaborative and cooperative team. They’ll be able to engage better with each other and the business side. As a result, everyone can be on the same page and reduce the ambiguity that drives dissatisfaction and churn.</p>
<h3>Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is essential to supporting the overworked, which cyber professionals tend to be. It’s even more so with so many companies short-staffed. It’s the principle of concentrating on one task without any disruptions. It gives them time to focus and use critical thinking and problem-solving skills. The result of this could include improving stress levels and people being more comfortable in asking for help.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> within your cybersecurity culture means the ability to understand another’s perspectives and feelings. Developing this skill in technical people can encourage them to feel less frustrated with their customers (users). With attention toward empathy, people can learn to let go of blame and resentment, which often festers and creates burnout and attrition.</p>
<h3>Kaizen</h3>
<p>The last step is Kaizen, which means “change for the better.” It’s the ultimate objective of the Secure Methodology. It’s all about continuous improvement. A culture that embraces this will attract excellent candidates and keep them. There is no perfect in Kaizen, which the smartest people in the room are attempting to achieve. There is only the motto of constant improvement.</p>
<p>You can learn more about each step and how to use it to transform your organization and solve the workforce shortage problem by <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">reading my book</a>. <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Check out the Secure Methodology course</a>, too.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Diagnosing the Root Causes of the Cyber Workforce Shortage' data-link='https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Diagnosing the Root Causes of the Cyber Workforce Shortage' data-link='https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/">Diagnosing the Root Causes of the Cyber Workforce Shortage</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#8216;Qualified&#8217;</title>
		<link>https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 19:10:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[skills gap]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2840</guid>

					<description><![CDATA[<p>It’s no secret that the cybersecurity field has a talent shortage. Experts project that over 3.4 million jobs in the industry remain unfilled. The reasons behind this are numerous—burnout is churning people out, younger generations aren’t entering cybersecurity, and qualified candidates aren’t plentiful. The last one is worthy of discussion. As the industry evolves, so should the [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/">Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#8216;Qualified&#8217;</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#039;Qualified&#039;' data-link='https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2841 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-300x200.jpg" alt="cybersecurity skills" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />It’s no secret that the cybersecurity field has a talent shortage. Experts project that over <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">3.4 million jobs</a> in the industry remain unfilled. The reasons behind this are numerous—burnout is churning people out, younger generations aren’t entering cybersecurity, and qualified candidates aren’t plentiful. The last one is worthy of discussion. As the industry evolves, so should the idea of “qualified.” To do this, organizations need to shift to cybersecurity skills-based hiring.</p>
<h2>The Current Consensus on &#8216;Qualified&#8217;</h2>
<p>So, what does being qualified mean to those hiring cyber professionals? In the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">State of Cybersecurity 2022 Report</a> from ISACA, 55% of cyber leaders said applicants aren’t well qualified. They find people lacking in key areas, including prior hands-on experience, credentials, hands-on training, employer recommendations, degrees, and association memberships.</p>
<p>So, the question is—do these things demonstrate that someone will excel and thrive in cybersecurity? If you look further at the data from the study, the importance of what hiring managers seek doesn’t necessarily align with the skills they believe are most valuable. The most sought-after skills include hard and soft ones:</p>
<ul>
<li>Soft skills of communication, flexibility, and leadership</li>
<li>Cloud computing</li>
<li>Security controls regarding endpoints, networks, applications, and implementations</li>
<li>Coding skills</li>
<li>Software development-related topics, such as languages, machine code, testing, and deployment</li>
<li>Data-related topics</li>
<li>Network-related topics</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Computing devices, including hardware, software, and file systems</li>
</ul>
<p><a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">Soft skills</a> were at the top of the skills gap list. Technical aptitude is also vital, but just because someone has a degree or credential doesn’t mean they know how to apply them. Narrow-mindedness on this can actually lead to hiring “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>,” who look great on paper but don’t have the aptitudes or abilities to be successful.</p>
<p>In an environment where hiring is competitive and challenging, it’s time to readjust your definition of qualified with skills-based hiring in cybersecurity.</p>
<h2>What Is Skills-Based Hiring?</h2>
<p>Skills-based hiring is an approach to recruitment that focuses on someone having specific competencies and aptitudes. It’s a new method that shifts the emphasis from traditional screening using education, credentials, and previous experience.</p>
<p>It seeks to look at someone holistically, considering their abilities, attitudes, and adaptability. Hiring based on skills makes a lot of sense for cybersecurity. A good example of this would be that an individual has proficiency in programming languages but doesn’t have a degree in computer science. Another example would be that a person has immense knowledge of cloud computing but not a certification.</p>
<p>Skills-based hiring also looks at potential candidates beyond their technical prowess. Since it looks at someone’s complete profile, you can also evaluate their soft skills, which are desperately needed!</p>
<h2>Experts Are Adamant About Skills-Based Hiring in Cybersecurity</h2>
<p>The push to hire based on skills is something that experts are recommending and urging. At a recent House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection hearing, many were there to discuss the workforce shortages. Their advice—<a href="https://www.meritalk.com/articles/cyber-workforce-experts-pound-table-for-skills-based-hiring/" target="_blank" rel="noopener">stop requiring college degrees</a>. The group said that to strengthen the cyber pipeline, the Federal government needs to take the lead in skills-based cybersecurity hiring.</p>
<p>Companies that are sounding the alarm on cybersecurity deficits can take on this new way of hiring. They could even fund skill development when they see someone with potential. Those people could come from many different places—military veterans, people seeking to change careers, new high school graduates, and even internal folks interested in the field. If there’s passion, curiosity, and appeal, you can nurture that to develop the person.</p>
<h2>Why Is Skills-Based Hiring the Future of Cybersecurity?</h2>
<p>The future of cybersecurity looks a little stark for the good guys. If you don’t have enough skilled employees, you’re automatically more at risk. While you can close some gaps with automation, human-in-the-loop will always be a strong component of all cyber operations. If the field makes this needed progression toward skills-based hiring, the future looks more manageable and optimistic.</p>
<p>Skills-based hiring finds those you may overlook or discount. It also has much to do with cultural fit and someone’s ability to be agile and flexible. A college degree, experience, or credentials don’t necessarily demonstrate any of these things. Further, if you hire based on skills—hard and soft—you are more likely to retain that person long-term.</p>
<p>By using cybersecurity skills-based hiring, you can:</p>
<ul>
<li><strong>Discover people with talent and a growth mindset</strong>: When you focus on what someone can do and their range of attributes, you’re likely to find great candidates. They don’t fit the familiar mold, but that can be a good thing. If they have technical knowledge and possess a <a href="https://christianespinosa.com/blog/fixed-vs-growth-mindset/" target="_blank" rel="noopener">growth mindset</a>, they could become superstars with some skill development and coaching.</li>
<li><strong>Attract younger generations</strong>: Currently, only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cyber workforce is 34 or younger</a>. It’s not sustainable, so the urgency to get Gen Z to give cybersecurity a chance is huge. This generation and those even younger have different expectations about work and may avoid cybersecurity because they believe it to be rigid, stale, stuffy, and unchanged. Skills-based hiring allows you to change this false narrative by emphasizing the importance of soft and hard skills. If you’re creating a culture around skills, it should also be one of transparent communication, collaboration, and continuous improvement. Gen Z will find this much more attractive.</li>
<li><strong>Create equity in hiring practices</strong>: If you’re following the skills when you recruit, you’ll be able to streamline the process and ensure that candidates get the same treatment regardless of their resumes. It makes it more equitable as well. The cyber field has not always been accessible or friendly to all demographics. For example, women represent a small number of cyber professionals. If you reimagine how you hire based on specific skills, you may see more female candidates.</li>
<li><strong>Develop people over time</strong>: Skills-based hiring is also an investment in your people. You make them part of your team with expectations and requirements. This could include technical courses, hands-on training, and soft skill development. With this approach, you are making it clear that you want the person to be accessible, and you will give them the resources they need to do so. Such a strategy improves employee satisfaction and retention.</li>
</ul>
<p>With all this to gain, the next step is implementing skills-based hiring.</p>
<h2>How Do You Shift to Skills-Based Hiring in Cybersecurity?</h2>
<p>If you want to go in this direction, you’ll need to work on a few areas so you can recruit and hire smarter. It’s not a massive change if you’ve already been assessing skills over diplomas and certifications. It will, however, require you to eliminate old ways of thinking about cybersecurity.</p>
<p>It’s a cultural shift where you want to banish all the stereotypes associated with technical folks—they’re bad communicators and collaborators who only see the world of ones and zeros. Yes, people in technical fields tend to be more pragmatic and logical, but they often don’t deserve the other labels. Your job is finding people outside the box who want to evolve cybersecurity with you.</p>
<p>Here are some tips:</p>
<ul>
<li><strong>Redefine your job descriptions and requirements</strong>: Start by eliminating the need for a four-year degree and specific certifications. Instead, focus on core competencies, soft skills, personality, communication capabilities, and drive. If there are specific things the person needs to be proficient in, emphasize those, but don’t limit this expertise to having a degree or certification.</li>
<li><strong>Look for internal talent</strong>: Internally posting new jobs is a typical step, but if you do, add some context about whom you’re looking for beyond technical skills. There could be some smart and capable people that want to move into cybersecurity but don’t know how to start. Create relationships with those folks and work out a plan to upskill and reskill them.</li>
<li><strong>Use assessments to evaluate technical and personal skills</strong>: You need people to demonstrate they have the abilities you desire. You can assess them with different tests to understand how they’ll perform. Don’t limit this to only technical skills. You also want to know about their ability to communicate, lead, problem-solve, and think critically.</li>
<li><strong>Get to know people during the interview process</strong>: This part of hiring can be challenging for you and candidates. They’re nervous, and you’re cautious. I urge you to get to know the person and their philosophy on cybersecurity and why they want to be in the industry. You can learn so much from someone when you ask their opinion and perspective. You’ll be able to recognize genuine interest and desire from these discussions.</li>
</ul>
<h2>Skills-Based Hiring in Cybersecurity: Keep Developing Your People</h2>
<p>Hiring based on skills fits the field of cybersecurity well. After all, you want employees to be able to deal with a dynamic environment. When you hire this way, you’re likely to find people with the right mix of abilities who want to be there for all the right reasons. Once they are on staff, keep developing them with an emphasis on soft skills. It’s not an easy journey, but you can find lots of advice on how to do this in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, which features the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step framework for improving and building these capabilities in technical folks. <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">Check it out by getting your copy today.</a></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#039;Qualified&#039;' data-link='https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#039;Qualified&#039;' data-link='https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/">Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#8216;Qualified&#8217;</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Organizations Should Rethink What Cyber Leadership Means</title>
		<link>https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/</link>
					<comments>https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 17:29:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cyber leadership]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2838</guid>

					<description><![CDATA[<p>In the cybersecurity landscape, it’s easy to label those in leadership positions as technical folks. Technical aptitude and expertise do matter in the field. However, cyber leadership in today’s climate has evolved to become a multifaceted role that requires communication, collaboration, and creativity. As a result of the many factors impacting cybersecurity, from talent shortages [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/">Why Organizations Should Rethink What Cyber Leadership Means</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Organizations Should Rethink What Cyber Leadership Means' data-link='https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2839 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-300x200.jpg" alt="cybersecurity leadership" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-1024x684.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-768x513.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-1536x1025.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-2048x1367.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/07/christina-wocintechchat-com-j64-40UYDu0-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />In the cybersecurity landscape, it’s easy to label those in leadership positions as technical folks. Technical aptitude and expertise do matter in the field. However, cyber leadership in today’s climate has evolved to become a multifaceted role that requires communication, collaboration, and creativity.</p>
<p>As a result of the many factors impacting cybersecurity, from talent shortages to an increasingly sophisticated hacker network, organizations must rethink what cybersecurity leadership means. It’s pertinent to today and what will come tomorrow.</p>
<p>In this post, we’ll cover the maturity and changes present in cybersecurity leadership, areas in need of attention, and how those leading these efforts can create a healthy and thriving culture.</p>
<h2>Is Cybersecurity Leadership Getting the Standing It Should?</h2>
<p>It’s a fair question with many answers. Often, enterprises treat cybersecurity as a back-office part of a company. They don’t want to call too much attention to it internally or externally. The C-suite wants to quell any concerns about being cyber secure, but they don’t want to know the details.</p>
<p>This is a key problem, and it leads to greater risk. <a href="https://christianespinosa.com/blog/why-cybersecurity-deserves-a-seat-at-the-leadership-table/" target="_blank" rel="noopener">Cybersecurity deserves a seat at the leadership table</a>. Without this visibility, risk seems abstract. Cyber leaders have to convey the threat landscape as something real and imminent.</p>
<p>These will only grow as the business does. Many areas of emphasis related to business objectives must have security in mind. <a href="https://christianespinosa.com/blog/cyber-risk-and-digital-transformation-the-gap-is-growing/" target="_blank" rel="noopener">Digital transformation</a> initiatives, for instance, focus on modernization, agility, and automation. They all have a cybersecurity component. Additionally, the amount of data companies generate, collect, use, and store is massive. It’s the new fuel for companies to innovate and be more data-driven in decision-making. Unfortunately, it’s also very appealing to cybercriminals.</p>
<p>So, the first part of rethinking cyber leadership is ensuring they have a voice. Involving cybersecurity early and often in strategic plans is a must. For an organization to succeed here, it can’t be an afterthought.</p>
<p>Once they have a seat, maintaining attention means escaping the stereotype that cyber leaders only have technical aptitudes.</p>
<h2>Cyber Leaders Must Have an Array of Skills to Shift Organizations into Cyber Resilience</h2>
<p>Historically, many organizations have treated cyber leaders like <a href="https://christianespinosa.com/blog/a-ciso-isnt-a-technical-role/" target="_blank" rel="noopener">CISOs</a> (Chief Information Security Officers) as technical resources. They’ve never expected more, but they should. Those in these positions need a hard skill foundation, but there’s much more to winning the cybersecurity war than these abilities.</p>
<p>CISOs have the responsibility of securing a business. It’s a tall order that can’t be met with such technical proficiency. They must make strategic decisions about business models, digitization, resources (human and technology), accessibility, network infrastructure, compliance, and more. These determinations don’t occur in a vacuum. Many stakeholders need to provide insights and recommendations. Gathering this intel, working through challenges, and creating value come from mastering soft skills.</p>
<p>Having these attributes isn’t always easy for cyber leaders. It’s a continuous journey of developing these skills. An open, flexible mindset is imperative. When those at this level have a well-rounded skill set, an organization can operate more intently and proactively regarding cyber threats.</p>
<p>Here are some ways that cyber leaders can use their entire range of skills to keep their organization secure:</p>
<ul>
<li><strong>Develop a cybersecurity strategy that’s more than technical.</strong> The foundation for cybersecurity is a good strategy. However, it can’t be solely technical in nature. It needs to align with business objectives and account for every kind of risk. The business context will typically drive what to prioritize. You may deal with competing ones from different lines of business. Thus, you’ll need to be an active listener in hearing from these folks and then use transparent communication to convey your best course.</li>
<li><strong>Ensure cybersecurity always has influence.</strong> Anything dealing with data, network, and application security needs your expertise. Your effect should be across the enterprise to ensure a security-first approach. Some groups may see your role as one that inhibits innovation. It’s another misconception you’ll need to correct. The real issue is when no one invites cybersecurity to the discussion until much later.</li>
<li><strong>Be a storyteller.</strong> When interacting with other leaders in a company, cybersecurity heads have to evolve from technical presenters. It’s not just &#8220;Here are the facts, and this is why we’re right.&#8221; That doesn’t go very far in getting consensus and buy-in. When you get the opportunity to inject your expertise, talk to people on a human level rather than a technical one. Adjusting how you communicate will help people connect the dots on the business side. They won’t see you as someone here to spoil all their plans but as a partner invested in their success.</li>
<li><strong>Use conflict management skills to fight friction and tension.</strong> Cybersecurity is a serious business. Suffering a breach or attack has monetary and reputational consequences. Business leaders get that but rarely agree on how much money and resources should be allocated. There will also be disagreements about how to weave cybersecurity into the company’s digital footprint. Thus, there will be lots of negotiations, and they may be hostile at times. Cyber leaders must become good at conflict management and diplomacy to get everyone on the same page.</li>
<li><strong>Build a team that will follow your lead in honing people skills.</strong> Another area of responsibility is the staff you manage and develop. As noted, cybersecurity has a significant talent gap, with many open positions available and growing. Recruiting the right people and keeping them is critical for your role as a leader. You need a team that will be able to communicate and collaborate. When you assemble this group that encompasses hard and soft skills, you’ll be able to do much more to influence and cultivate a healthy cyber culture.</li>
</ul>
<p>So, how can you improve your own soft skills and those of your team to help you navigate cybersecurity’s future? The Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> can help.</p>
<h2>The Secure Methodology Supports and Empowers Cyber Leaders</h2>
<p>The Secure Methodology is a seven-step framework that transforms technical folks into communicators and collaborators. I developed it as a way for companies to develop their people in a way that would drive growth for individuals, teams, and businesses. It can be an excellent guide for empowerment and support. Here’s a quick preview of its pillars:</p>
<ul>
<li><strong>Awareness.</strong> Cyber professionals often lack understanding of themselves and others, and that causes conflict and obstacles to progress. Helping them move toward <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a> widens their perspectives, which is crucial for organizations as they improve cybersecurity processes, policies, and strategies.</li>
<li><strong>Mindset.</strong> Enabling people to grow from a <a href="https://christianespinosa.com/blog/fixed-vs-growth-mindset/" target="_blank" rel="noopener">fixed to a growth mindset</a> ensures they consider the future and how to tackle emerging threats. This is so key for cyber leaders and teams to grasp. There’s no communication, collaboration, or innovation when the mindset is closed. Instead, cybersecurity operates in a silo, never changing or adapting. It creates much frustration on the business side and accelerates risk. Shifting mindset isn’t easy. With a commitment to it and by following the exercises, you can begin to see real change here.</li>
<li><strong>Acknowledgment.</strong> As a cyber leader, you have ultimate control over this. It starts with how you treat your employees when they do something right and something wrong. Appreciation for when they perform well and win over cybercriminals should be consistent and often. When they receive this positive response, they feel they are part of something, and the need to adapt their perspectives seems less scary. Accountability for bad performance or mistakes is important, too, but this should happen in private. It should involve going through the issue and determining what went wrong so there isn’t a repeat of this.</li>
<li><strong>Communication.</strong> Being a great communicator and encouraging this in your staff is the number one people skill to have. When <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a> is transparent, honest, and free of jargon, there’s no ambiguity. Speaking inclusively within the team and outside of it sets you up to be a strong leader for the enterprise. Practice this every day with your team.</li>
<li><strong>Monotasking.</strong> In <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>, a worker focuses on one task, and it’s something rarely used in any role. Most think we should all be multitasking, but that misconception leads to errors and mistakes. Concentration matters, and this is something to champion for yourself, your team, and the entire enterprise.</li>
<li><strong>Empathy.</strong> <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Cognitive empathy</a> means you understand another’s feelings and perspective. While it seems pretty basic, it’s not as prevalent as we would like. When your cyber team does act with this in mind, it supports awareness, mindset, and communication. Encouraging an empathetic culture will be crucial to growth and evolution.</li>
<li><strong>Kaizen.</strong> This Japanese term means “continuous improvement,” and any cyber leader will flourish with this perspective. Making it part of your philosophy will ensure the continued progression of cyber leadership as a key to a company’s future success.</li>
</ul>
<p>The Secure Methodology is an agent of change. Change is the hardest part of any job, but it’s necessary in cybersecurity because of the dynamic nature of the field. By applying it to your cybersecurity culture, you can impact how the enterprise views you and the influence you have. You can learn more about it by reading my book, <em><a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">The Smartest Person in the Room</a></em>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Organizations Should Rethink What Cyber Leadership Means' data-link='https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Why Organizations Should Rethink What Cyber Leadership Means' data-link='https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/">Why Organizations Should Rethink What Cyber Leadership Means</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/why-organizations-should-rethink-what-cyber-leadership-means/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Isn’t Black and White: Why Cyber Leaders and Their Teams Must Embrace the Gray</title>
		<link>https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 01:18:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity leaders]]></category>
		<category><![CDATA[gray]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2836</guid>

					<description><![CDATA[<p>One of the biggest risks you face in cybersecurity has little to do with cybercriminals and the myriad of ways they attack your organization. A threat that looms within many cyber teams is that many technical people see the landscape as black and white, meaning they have a narrow view of cybersecurity and don’t want [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/">Cybersecurity Isn’t Black and White: Why Cyber Leaders and Their Teams Must Embrace the Gray</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Isn’t Black and White: Why Cyber Leaders and Their Teams Must Embrace the Gray' data-link='https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2837 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/scott-webb-PkJOP7JfVfk-unsplash-300x200.jpg" alt="cybersecurity leaders gray" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/scott-webb-PkJOP7JfVfk-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/scott-webb-PkJOP7JfVfk-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/scott-webb-PkJOP7JfVfk-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/scott-webb-PkJOP7JfVfk-unsplash-1536x1025.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/scott-webb-PkJOP7JfVfk-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />One of the biggest risks you face in cybersecurity has little to do with cybercriminals and the myriad of ways they attack your organization. A threat that looms within many cyber teams is that many technical people see the landscape as black and white, meaning they have a narrow view of cybersecurity and don’t want to welcome new ideas or approaches. Such thinking puts cyber leaders and their staff in a perilous position.</p>
<p>The reality is that cybersecurity lives mostly in the gray. There’s uncertainty in the gray, and cyber professionals often feel very uncomfortable in such a space. Getting down to the why behind this is important for your risk posture and ability to beat the hackers. Let’s talk about the dangers of black-and-white thinking and how you transition your team to embrace the gray with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<h2>Why Black-and-White Thinking Increases Risk</h2>
<p>Black-and-white thinking isn’t sustainable for any job. It becomes even more of a problem when working in a dynamic ecosystem like cybersecurity. There are so many factors and components that impact it, so it’s critical for those working on it to be flexible and adaptable. However, that’s a tall order for many technical people. Here’s why.</p>
<h3>Black-and-White Perspectives Hinder Communication and Collaboration</h3>
<p>Communication and collaboration are key people skills that technical folks need to thrive in cybersecurity. It’s rather hard to create this kind of culture when people think in a binary manner. It’s difficult for communication and collaboration to be transparent and open when those participating are stuck in a <a href="https://christianespinosa.com/blog/fixed-vs-growth-mindset/" target="_blank" rel="noopener">fixed mindset</a>.</p>
<p>They’ve been applying this perspective well in the technical aspects of cybersecurity. Sometimes there are right and wrong answers. So, there’s no discussion necessary because it’s math and science, and these disciplines can be black and white.</p>
<p>Cybersecurity is much more than the math and science elements. It’s evolving and constantly changing. So, people have to ask questions and use people skills like problem-solving and critical thinking. It seems simple, but black-and-white thinkers will find it difficult because they have to challenge their own conclusions. Often, they lack the ability to be curious and will resort to what they know and stay in that lane. As a result, hackers can get the upper hand because they are more agile in their strategies.</p>
<p>The damage that a lack of communication does can be immense. Communication is the foundation for every successful cyber team. Without it, there are only assumptions and misconceptions. There’s no transparency, which affects every area of cybersecurity. You’ll have an internal group that’s working in silos, and their interactions with other departments will be disastrous, earning your team a <a href="https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/" target="_blank" rel="noopener">bad reputation</a>.</p>
<h3>Black-and-White Thinking Covers Up Insecurities</h3>
<p>Most cyber professionals seem to be very secure in their knowledge and ability to understand the threat landscape. Sometimes that’s just a facade for their insecurities. They desire everything to be certain; when it’s not, their response is not to communicate and collaborate. Rather, they will posture and use geek speak to cover up the fact that they don’t know all the answers. They’ll figure it out on their own or not at all. Insecurities are another weakness that has nothing to do with your cyber framework.</p>
<h3>Black-and-White Thinking Leads to Burnout and Attrition</h3>
<p>There are other hidden dangers of black-and-white thinking that impact those in this mindset and others working with them. If someone is so rigid in how they view the cyber landscape and the protection of networks and data, they may keep losing battles with hackers. They then put more pressure on themselves to be more aggressive without understanding or discussing the root causes. As a result, people end up feeling <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a>. It’s a pervasive problem for cyber professionals. This unsustainable level of stress is why <a href="https://www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cybersecurity-leaders-will-change-jobs-by-2025" target="_blank" rel="noopener">nearly half of all security leaders will change jobs by 2025</a>.</p>
<p>Burnout can lead to attrition, but many black-and-white thinkers will stay on their path and won’t succumb to burnout. Doing so will only make things worse and can be a catalyst for more errors and weaknesses.</p>
<p>Solving burnout is something cyber leaders deal with, and it’s not an easy task. It’s not just the black-and-white thinkers that feel the effects. Their colleagues become frustrated with their inability to be insightful and reflective. This creates a cybersecurity culture that’s unhealthy and toxic, so those high performers will leave you as well.</p>
<p>Recruitment is something you’re struggling with, and this only makes it worse. Before you rebuild the team, you need to work on the culture and expectations and move people to the gray. There are many approaches you can take to this significant problem. Most of those are traditional options, but they don’t work much of the time. There are opportunities beyond this, and that’s why I developed the Secure Methodology.</p>
<h2>Changing Black-and-White Thinkers with the Secure Methodology</h2>
<p>The Secure Methodology is a seven-step guide for cyber professionals to embrace people skills and develop them. When someone goes through the process, they’ll have the tools and perspectives that welcome the gray parts of cybersecurity. Here’s a preview of those seven steps and how they can impact black-and-white thinking.</p>
<h3>Awareness</h3>
<p>The Secure Methodology begins with helping people be aware of themselves and others. When <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a> is absent, it creates blind spots and causes friction between staff. When people aren’t aware, they live in a black-and-white box and can’t communicate effectively.</p>
<p>A mind has to be open to new perspectives to achieve awareness. You can use coaching methods to work on communication and gain insight into their motivations. The exercises in this step open up eyes to the gray.</p>
<h3>Mindset</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindset</a>, and when it’s fixed, there’s no room for the gray. Shifting mindset to be one of growth requires accountability. People have to realize that a fixed mindset is really a trap. You can help open it with reflection, asking questions, and urging them to be faster in decision-making.</p>
<h3>Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is a problem for many organizations and departments. When it’s not present, employees can disengage and become resentful. If the only acknowledgment people receive is negative, it feeds into black-and-white thinking.</p>
<p>Another aspect of a lack of acknowledgment is that you aren’t demonstrating that cybersecurity is complicated and that no one could possibly know all the answers. In black-and-white minds, the complexity grows, and they lose their ability to have simple conversations. To rectify this situation, you’ll need to recognize your folks in a positive way. In turn, that builds trust and rapport.</p>
<h3>Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is step four, but it’s critical to every stage. We looked at why technical folks have such trouble with communication. If they have to be open and inclusive communicators, it breaks down their black-and-white layers, which feels uncomfortable.</p>
<p>Transforming these people into effective communicators requires a lot of work from them and you. There are exercises that can be helpful, and you should continue to introduce these to your team. Ensure that the geek speak fades, replaced by inclusive language that involves active listening.</p>
<h3>Monotasking</h3>
<p>Is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a> really a good thing? After all, most people praise the ability to multitask. However, multitasking often leads to errors and mistakes. Black-and-white minds can multitask just fine because they operate within a specific set of parameters. But these behaviors feed into burnout and anxiety.</p>
<p>Encouraging your team to monotask can help them be more reflective in the decisions they make because there are no distractions. They’ll also be more productive in the long term. Advise your staff to block off certain parts of the day to monotask and concentrate on one specific objective. It can give them a better sense of balance as well.</p>
<h3>Empathy</h3>
<p>Black-and-white mindsets have little room for empathy, but it’s critical to any culture. The type of empathy you need to cultivate is enabling people to see the perspectives of others. It can also help reduce feelings of us vs. them in your organization.</p>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is a vital soft skill, but it’s something we have to learn and develop. Walking people through this phase can make them better cyber professionals and people. There are activities in this step to foster this transition.</p>
<h3>Kaizen</h3>
<p>The last step is a Japanese term meaning “continuous improvement.” As a stage in the Secure Methodology, the focus is root cause analysis. This requires critical thinking and the ability to see the gray. When you practice root cause analysis, you have visibility into the challenges and how to address them. This stage never ends, as people must continue to change and adapt.</p>
<h2>Start Your Journey to Embracing the Gray with the Secure Methodology</h2>
<p>The path toward having gray thinkers will have detours and barriers. The Secure Methodology has a journey with those bumps in mind. It can be a valuable tool in developing your people and keeping your organization more secure.</p>
<p><a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Learn more about it by checking out the Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Isn’t Black and White: Why Cyber Leaders and Their Teams Must Embrace the Gray' data-link='https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity Isn’t Black and White: Why Cyber Leaders and Their Teams Must Embrace the Gray' data-link='https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/">Cybersecurity Isn’t Black and White: Why Cyber Leaders and Their Teams Must Embrace the Gray</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is the Cybersecurity Skills Gap Fact or Fiction? It Depends on the Skills</title>
		<link>https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/</link>
					<comments>https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 01:14:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity skills gap]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2834</guid>

					<description><![CDATA[<p>In the conversation revolving around cybersecurity and the shortage of workers, one thing that gets tossed around a lot is the cybersecurity skills gap. Many cybersecurity leaders are feeling the pinch to recruit and retain workers that have the right abilities, but is this fact or fiction? The answer is that it depends on the [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/">Is the Cybersecurity Skills Gap Fact or Fiction? It Depends on the Skills</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Is the Cybersecurity Skills Gap Fact or Fiction? It Depends on the Skills' data-link='https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2835 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-300x200.jpg" alt="cybersecurity skills gap" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/07/suad-kamardeen-MYKAZlzW6Nw-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />In the conversation revolving around cybersecurity and the shortage of workers, one thing that gets tossed around a lot is the cybersecurity skills gap. Many cybersecurity leaders are feeling the pinch to recruit and retain workers that have the right abilities, but is this fact or fiction?</p>
<p>The answer is that it depends on the skills desired for the position and involves technical and people skills. So, where are the biggest gaps, and how can you develop these in your people?</p>
<p>In this post, we’ll dive into some data related to the cybersecurity skills gaps. Then, we’ll look at solutions to bridge it.</p>
<h2>What Are Cybersecurity Leaders Saying About the Skills Gap?</h2>
<p>The profession of cybersecurity is in a state of decline. The <a href="https://www.isc2.org/Research/Workforce-Study" target="_blank" rel="noopener">2022 (ISC)² Cybersecurity Workforce Study</a> reported that the industry needs 410,695 people to meet demand in the U.S. This shortage of workers is a cause of great concern for many reasons, including that it’s putting organizations at greater risk of cyberattacks. In fact, 74% of survey respondents said the problem is at least a moderate risk. The leading reason for the gap, according to the report, is a lack of qualified talent. As a result, 62% of organizations are investing in recruiting and hiring, and another 64% are doing the same for training.</p>
<h3>What Do People Need to Be Qualified?</h3>
<p>So, what skills are these people without that defines them as not qualified? If you look at education, 88% of cyber professionals responding to the workforce study had at least a bachelor’s degree, with 48% having a master’s or higher. This would indicate proficiency and deep knowledge of hard skills. When asked about the qualifications that are the most important, hiring managers ranked these the highest:</p>
<ul>
<li>Strong problem-solving skills</li>
<li>Relevant IT or cybersecurity experience</li>
<li>Knowledge of basic and advanced cybersecurity concepts</li>
<li>Strategic thinking skills</li>
</ul>
<p>Cybersecurity certifications trended down as a must-have for employment, as did educational requirements. What we can gather from this data is that attractive qualifications have shifted to focus on soft skills, experience, and fundamentals.</p>
<p>Another report from the ISACA revealed that <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">55% of cybersecurity leaders</a> believe candidates aren’t qualified. Those respondents did emphasize experience and training but also prioritized education and certifications. These responses are somewhat in conflict, specifically prioritizing credentials and education. These will always be things that can demonstrate a person’s technical aptitude. It depends on the degree and the certification, as often these people can be <a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>—they look great on paper but don’t have the practical knowledge to be effective and high performing.</p>
<p>Qualified ultimately comes down to the skills someone possesses. These can be the result of earning a degree or certification. Others we learn through life and work experience. So, where is the real skills gap?</p>
<h2>The Cybersecurity Skills Gap Reality: It’s More About the People Skills</h2>
<p>A cyber professional can be the literal smartest person in the room when it comes to understanding all the technical aspects. They may be up-to-date on the attacks hackers are launching, the latest cybersecurity automation tools, and have superior knowledge about the cloud or controls. From the ISACA report, cyber managers listed these as the most significant skills gaps:</p>
<ul>
<li>Interpersonal skills, including critical thinking, problem-solving, collaboration, and attention to detail</li>
<li>Cloud computing</li>
<li>Security controls knowledge related to endpoints, networks, applications, and implementation</li>
<li>Coding abilities</li>
<li>Software development capabilities such as languages, machine code, testing, and deployment</li>
<li>Data-focused areas such as classification, collection, processing, and structure</li>
<li>Network aptitudes regarding architecture and network components</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Hardware, software, and file system devices</li>
</ul>
<p>This list has soft and technical skills but soft was at the top for cyber leaders. Looking more specifically at the <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">interpersonal skills</a> they favor, it aligns with qualifications.</p>
<p>They need people to apply their cybersecurity knowledge with better people skills to ensure teams can work together to solve problems and not let things fall through the cracks. To do this, technical folks must be great communicators and collaborators, which is often tricky. Are these even skill sets someone can develop?</p>
<p>When assessing the cybersecurity skills gap, soft skills are the biggest challenge. So, how do you bridge the gap? There are many strategies to take that require a shift in perspective regarding talent acquisition and improving the abilities of your current staff.</p>
<h2>Bridging the Cybersecurity Skills Gap Strategies</h2>
<p>There are two concepts at play. First, you need a recruitment strategy to find and develop people with hard and soft skills who demonstrate great potential. Second, you need a plan to help current employees grow their people skills, so they can thrive and be successful.</p>
<h3>Reframing Your Recruitment Strategy</h3>
<p>If you want to improve your talent acquisition pipeline, you’ll need to adjust your parameters. A focus on skills-based hiring is the first step. In this framework, you’re putting less importance on a degree and more on the person’s ability to do the work based on their attributes.</p>
<p>To do this, you have to look at more than their resume. Not every person is going to have every qualification, especially hands-on experience. They can’t get it if no one gives them a shot. You can use some different assessments to understand someone’s potential.</p>
<p>Once you begin interviewing, you’ll have the opportunity to evaluate their communication and problem-solving skills by asking questions about these two things, such as:</p>
<ul>
<li>How did you communicate with stakeholders regarding a challenge in a project?</li>
<li>In what ways do you use critical thinking when faced with a problem?</li>
</ul>
<p>They could be a great performer in your organization if you see something in them. If they don’t have every credential you expect, you can help them obtain it while they learn on the job.</p>
<p>Remember that new people may be entering cybersecurity as their second act. They may have a lot of great experience in other fields that are transferrable soft skills. These are people likely worth adding to your team. If they have the motivation and desire, they will continue to hone their technical skills.</p>
<p>Continuing to Develop People Skills for All Your Technical Folks</p>
<p>Whether someone started yesterday or 10 years ago, they must continue a journey to improve their soft skills. A lack of focus on this can have detrimental consequences. You may have enough people that know cyber in theory, but their inability to connect and communicate can elevate risk.</p>
<p>As a framework to do this, I developed the <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step process that cyber leaders can use to transform black-and-white technical people into those that see the gray in situations by becoming better at interpersonal skills.</p>
<p>Here’s a preview of the steps and how they bridge the cybersecurity skills gap.</p>
<h4>Awareness</h4>
<p>The journey starts with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>, which applies to the self and others. When this isn’t present, people do not understand their behaviors or that they are causing conflict, friction, and resentment. Moving people into an awareness state helps them gain more respect for others, which is key to a high-performing team.</p>
<h4>Mindset</h4>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is the next step; the goal is to move a person from a fixed mindset to a growth one. With this shift, people become more open and willing to see the many sides of an issue. Supporting this with the 7 Levels Deep exercise is a good foundation.</p>
<p>Acknowledgment</p>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is something cyber leaders must initiate. When you acknowledge people for their work, you’re creating a culture of trust and transparency. It can be a good tactic to combat burnout, or the persistent thinking cyber professionals have that they must know everything and can do anything. If people admit they don’t know, they can be open to learning and growing.</p>
<h4>Communication</h4>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the most vital soft skill and is part of every exchange we have in life. Technical folks that rely on geek speak and non-inclusive language aren’t good communicators. In fact, most people will feel they are being condescending and rude. That’s not the communication skills you want to see in your people! In this stage, you apply activities and exercises that focus on listening as much as talking. If you prioritize communication, it becomes part of your culture and is in continuous development.</p>
<h4>Monotasking</h4>
<p>You may not think that <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is a preferred skill. After all, most people are multitasking all day long, but it can lead to more stress and errors. Introducing the concept to your team may be met with resistance. Explain why working without distractions is important, as it builds the attention to detail skill set that matters considerably in cybersecurity.</p>
<h4>Empathy</h4>
<p>In the Secure Methodology, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">cognitive empathy</a> is the focus. It describes when you can understand another’s feelings and points of view. This capability is crucial in communication and collaboration. Seeking this out in new hires and working to help people improve it are a big win in the skills gap.</p>
<h4>Kaizen</h4>
<p>Kaizen is a Japanese term meaning “continuous improvement.” It’s a step that’s never over, as you want your staff to continue to improve their hard and soft skills. To align with this, they must be comfortable with adaptability and flexibility.</p>
<h2>The Cybersecurity Soft Skills Gap Is Fact; Close It With the Secure Methodology</h2>
<p>Closing the skills gap takes time and commitment. With the Secure Methodology, you have a framework to support your efforts. <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Get more details on how it helps by learning about the Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Is the Cybersecurity Skills Gap Fact or Fiction? It Depends on the Skills' data-link='https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Is the Cybersecurity Skills Gap Fact or Fiction? It Depends on the Skills' data-link='https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/">Is the Cybersecurity Skills Gap Fact or Fiction? It Depends on the Skills</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
