<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/cybersecurity/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Sun, 17 Sep 2023 19:23:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>cybersecurity Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</title>
		<link>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/</link>
					<comments>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:09:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity skills gap]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2852</guid>

					<description><![CDATA[<p>The cybersecurity workforce landscape is at a serious threat level. Millions of jobs are unfilled, and most companies state they can’t find qualified cybersecurity job candidates. If we continue on this trajectory, risks will rise and jeopardize the data and networks of thousands of businesses. As an industry, we must change how we hire, recruit, [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/">How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="size-medium wp-image-2853 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-300x200.jpg" alt="cybersecurity training" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />The cybersecurity workforce landscape is at a serious threat level. Millions of jobs are unfilled, and most companies state they can’t find qualified cybersecurity job candidates. If we continue on this trajectory, risks will rise and jeopardize the data and networks of thousands of businesses.</p>
<p>As an industry, we must change how we hire, recruit, and develop cybersecurity talent. <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">Expanding how you consider someone qualified</a> is a necessary step. Seeing the potential in someone who doesn’t necessarily check all the boxes is one way to address the shortage. For this to work long-term, upskilling must be a part of your employee development strategy.</p>
<p>This upskilling includes hard and soft skills because cyber job candidates need both to thrive. Let’s review the current cybersecurity workforce challenges, the facts about the skills gap, and how to upskill new hires.</p>
<h2>Cybersecurity Workforce Challenges</h2>
<p>Cybersecurity job growth is a bright spot in the tech industry, with many opportunities for someone to have a career that pays a good wage and is in demand. However, the field is currently experiencing significant shortages.</p>
<p>According to the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">(ISC)2 2022 Cybersecurity Workforce Study</a>, the global cybersecurity workforce grew to over 4.6 million, which is an 11.1% year-over-year increase. Unfortunately, 3.4 million jobs remain empty. As a result, many companies and cyber firms are operating without enough people, which can directly impact risk.</p>
<p>So, why is the industry struggling with recruitment and retention? It’s a complicated ecosystem, so there’s no easy answer. The cybersecurity workforce shortage is the result of several trends and occurrences, including:</p>
<ul>
<li>The cyber threat landscape is rapidly expanding, driving the demand for cyber professionals in all industries and businesses. In part, this is a supply and demand issue.</li>
<li>People leave the industry due to <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a>. It’s a common problem in a high-stress environment, and most organizations aren’t doing enough to mitigate this. Without proper staffing, people have to do more work, which increases the feeling of burnout.</li>
<li>Younger generations aren’t choosing cybersecurity as a career. Only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cybersecurity workforce is 34 or younger</a>. The industry needs to find ways to connect with students to attract new people into the field.</li>
<li>Many organizations place too much emphasis on degrees and certifications, which often don’t correlate to having the right abilities, aptitudes, and attitudes. As a result, companies reject those who could be a better fit but need some upskilling.</li>
</ul>
<p>If the industry remains on this path, the shortages will only worsen. Intervention is necessary for the entire community. What you can do to ensure your data and networks remain under protection is to focus back on <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">skills-based hiring</a>.</p>
<h2>The Cybersecurity Skills Gap</h2>
<p>We can’t talk about the labor shortage without addressing the <a href="https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/" target="_blank" rel="noopener">cybersecurity skills gap</a>. It would be great if every cybersecurity job candidate had years of experience and an array of skills. However, cyber leaders agree that a skills gap exists. According to the same workforce study cited above, 55% of hiring managers say applicants don’t meet the criteria of being qualified. The deficit here includes:</p>
<ul>
<li>Hands-on training and experience</li>
<li>Credentials</li>
<li>Degrees</li>
<li>Recommendations</li>
</ul>
<p>These things don’t always indicate that the person can do the job. The same study also looked at specific skills with gaps, which are the ones that matter in terms of upskilling. The skills in demand and often lacking are:</p>
<ul>
<li>Soft skills (e.g., communication, leadership, adaptability)</li>
<li>Cloud computing</li>
<li>Security controls (e.g., network, application, endpoint, implementation)</li>
<li>Coding skills</li>
<li>Software development-related topics (e.g., machine code, testing, languages, deployment)</li>
<li>Data-related topics (e.g., characteristics, collection, classification, processing, structure)</li>
<li>Network-related topics (e.g., architecture, networking components)</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Computing devices (e.g., software, hardware, file systems)</li>
</ul>
<p>It’s a mix of soft and hard skills, but the latter was at the top of the list. It’s possible to develop both of these in an individual who has the desire to learn and evolve. Those abilities aren’t always apparent in technical folks. However, if they are willing and have a good foundation to start from, upskilling can be the key to keeping great people long-term and continuously improving.</p>
<p>So, what’s the upskilling plan?</p>
<h2>Building an Upskilling Plan for Cybersecurity Job Candidates</h2>
<p>The first part of the plan should start with a clean slate of qualifications. Define what is imperative and what someone can learn over time. Get to the root of what makes someone a good cyber professional and what attributes they should possess.</p>
<p>In upskilling, you’ll have two paths — technical and soft skill development.</p>
<h3>Addressing Technical Upskilling</h3>
<p>In looking back at the list of skills above, those in the technical category are pretty standard. That’s a good starting point, but you should also consider the future and add training around AI tools and use cases. The curriculum will evolve as the threat landscape does.</p>
<p>How will they learn these skills? You need to create a learning environment for employees. This can include hands-on training internally, certification classes that you determine as high-quality, and other resources. Making continuing skill development part of your recruitment and retention strategy can attract people to your company and ensure you keep high-performers.</p>
<p>The other part of this is soft skills, and the plan to develop these in technical folks can be more demanding and challenging.</p>
<h3>Improving Soft Skills in Cybersecurity</h3>
<p>Soft skill development is a path that requires commitment and consistency. It’s about behavior change, and there can be many growing pains. First and foremost, you want to find cybersecurity job candidates who are open to this. Sometimes that might not be obvious until you have a few conversations and try to understand what motivates them and if they can handle flexibility.</p>
<p>Transforming anyone into a better communicator and collaborator isn’t easy. With technical folks, it can be harder, as they often have fixed mindsets, see things as black-and-white, and believe they know all the answers. These people could have impressive technical prowess, but these attitudes won’t fit into a healthy culture where everyone is open and transparent. Are they lost causes? No, but again, they must want to change.</p>
<p>You can drive this change with guidance from the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step process that I developed because of the soft skill deficiency and recognizing its value in creating and maintaining a strong cybersecurity posture.</p>
<h2>The Secure Methodology: The Framework for Soft Upskilling</h2>
<p>Here’s a preview of each step and how you can leverage it to improve the soft skills of technical people:</p>
<h3>Awareness</h3>
<p>The guide starts with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, with the objective of being mindful of the self and others. When this is missing, people don’t see or understand how their behavior affects others. If this is rampant in a culture, conflict and resentment build. With exercises on reflection and perspective, people can get to a state of awareness that improves how they interact with others.</p>
<h3>Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is crucial in soft skills, and every person on your team needs an open one. A person cannot change without it. Key to this is defining someone’s motivations and why they respond as they do. In this step, the <a href="https://christianespinosa.com/blog/finding-your-purpose-in-life-understanding-the-7-levels-deep-exercise/" target="_blank" rel="noopener">7 Levels Deep Exercise</a> is a good foundation.</p>
<h3>Acknowledgment</h3>
<p>The third step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>. There are several layers to this step. First, it encompasses feedback and its value to cyber professionals. Your staff wants to hear from you about accomplishments and how they are helping the organization. Not all feedback will be positive, and accountability matters, but you should do this in one-on-one conversations. Ensuring that your team feels appreciated and valued will prompt them to adapt with less friction.</p>
<p>Second is acknowledging that cybersecurity is difficult and filled with uncertainty. You set the tone of the culture, and if you do this well, your team will follow, enhancing their people skills.</p>
<h3>Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the fourth step and the most essential soft skill for anyone. It’s never a bad investment to develop someone’s communication skills. Just be clear on what this means. Being a good communicator and articulate aren’t the same thing. Yes, what we say matters, but most communication isn’t verbal.</p>
<p>An excellent communicator is clear, concise, and transparent. They also recognize the needs of the audience and listen to them fully. Assessing candidates based on communication skills can involve prompting them to share real-life stories about how they used it to overcome challenges.</p>
<p>Listen for their use of geek speak or overly technical terms. This could be a red flag if they aren’t willing to drop the posturing.</p>
<h3>Monotasking</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>; it’s a soft skill you don’t hear much about. Most technical people have been doing the opposite — multitasking. Many believe this is a valuable trait. It is important to be able to juggle priorities, but blocking off specific time to concentrate on one task can make people more productive and eliminate feelings of being in fight-or-flight mode all the time. They will need to act quickly at times and move around priorities, but encouraging monotasking lets people think more critically and problem-solve more effectively.</p>
<h3>Empathy</h3>
<p>In the Secure Methodology, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">cognitive empathy</a> is the sixth step. This type of empathy is the ability to understand another’s feelings and perspectives. It’s crucial to a person’s ability to be a great communicator and collaborator. Much of this relates to stripping down egos and dynamics of “me vs. them.” You can’t have a successful cybersecurity strategy and team without empathy.</p>
<p>Human connection is vital in cybersecurity, and in this phase, you support people to become more empathetic.</p>
<h3>Kaizen</h3>
<p>The last step is kaizen. It’s a Japanese term meaning “continuous improvement.” It’s the step that never ends and focuses on adaptability and flexibility. When you reach this phase, your staff should be in a state where they want to continue to develop their soft skills and transfer them to others.</p>
<h2>Upskill Cybersecurity Job Candidates with the Secure Methodology</h2>
<p>The Secure Methodology provides a framework and tools to transform candidates lacking skills. It’s a proven way to change behavior, with benefits for the person and the organization.</p>
<p>Get more insights on each step by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. You can also explore how to apply it in the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/">How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</title>
		<link>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/</link>
					<comments>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:03:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2850</guid>

					<description><![CDATA[<p>Building a cybersecurity team comes with many challenges. So many factors are impacting the ability to do this effectively and efficiently. The cybersecurity workforce shortage means more competition for talent, but you can’t be confident all those vying for positions have the hard and soft skills to succeed and thrive. On top of all this, the threat [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/">How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2851 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-300x200.jpg" alt="cybersecurity team" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-1536x1025.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Building a cybersecurity team comes with many challenges. So many factors are impacting the ability to do this effectively and efficiently. The <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/" target="_blank" rel="noopener">cybersecurity workforce shortage</a> means more competition for talent, but you can’t be confident all those vying for positions have the hard and soft skills to succeed and thrive. On top of all this, the threat landscape keeps expanding as cybercriminals develop new tools and strategies to exploit weaknesses.</p>
<p>So, what can you do as a cybersecurity leader? As someone who’s been in the position, I have some insights to share on how to accomplish this. Keep reading for strategies, tips, and info about the Secure Methodology as a framework for constructing a cybersecurity team.</p>
<h2>Steps to Take to Build a Sustainable Cybersecurity Team</h2>
<p>Where should you start on this journey? Should you jump right into recruiting and hiring? I would urge you to first develop a strategy, define the tools you need, and create some principles for the culture you hope to cultivate.</p>
<p>To do this, follow these steps:</p>
<h3>Acknowledge that cybersecurity is a people problem and let that guide your strategy.</h3>
<p>It’s easy to blame the breaches and attacks in the cyber world on technology. Without it, there wouldn’t be an issue, but categorizing it only this way is a fallacy. Behind every attack is a person. Every defense also has human intelligence executing it, and most causes of cyber incidents relate to errors, mistakes, or intentions of someone.</p>
<p>It’s very much a people problem, and that fundamental principle should guide your team-building strategy. Yes, there are lots of great cyber tools out there that are leveraging AI and enabling automation. You need those, but the people charged with managing them need knowledge and skills to do so. Those skills must include soft ones, as the human issue in cybersecurity won’t find a resolution without staff that cannot communicate or collaborate.</p>
<p>There is a current soft skills gap in every industry, including cybersecurity. The people who are a good fit for your roles may not possess these. If they are curious to learn and motivated to evolve, they can be great additions to your team.</p>
<h3>Ensure the bad guys are cybercriminals, not internal.</h3>
<p>Another element of creating a cybersecurity team is to eliminate the “us vs. them” mentality that often happens between technical and business folks. You’re all on the same side, but much of that can get lost in translation. The business side may not take cybersecurity as seriously as they should, frustrating cyber professionals. There’s animosity on your side, too, as your team may resent others, especially when they have questions and challenges.</p>
<p>It&#8217;s critical to put the target back on the real enemy’s head. There must be balance and cooperation between business and technical groups. You don’t want to bring someone on who fails to understand the perspective of others. Employees like this will degrade the trust and credibility of your team and do anything to avoid being wrong. You can spot this in how they respond to queries about collaborating and if they do a lot of posturing.</p>
<h3>Look for a wide range of skills.</h3>
<p>You have to define the requirements you want in your team, which should include various abilities and aptitudes. In doing so, you have to <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">shift your definition of qualified</a>. The majority of cyber leaders believe applicants don’t have the right qualifications, according to the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">State of Cybersecurity 2022 report.</a> What they say people lack includes hands-on experience and training along with credentials and degrees.</p>
<p>The hands-on part makes sense because you want people to have real-world interactions. One cannot get this without opportunity. It’s especially true for younger generations, who we need to join the field. These people could be bright and eager to learn, making them excellent hires.</p>
<p>Credentials and degrees can demonstrate skill sets but not always. Often, people look great on paper because of these achievements but lack the knowledge to apply what they learned in classes. The learning may also be insufficient, especially for courses that validate aptitude based on multiple-choice tests. You can only be confident in one thing for those passing these — they can memorize answers. Beware of these “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>.”</p>
<p>Instead, use skills-based hiring models. This approach focuses on a candidate with specific competencies that directly relate to the work. It involves soft and hard skills.</p>
<h3>Develop your recruitment strategy on skills-based hiring.</h3>
<p>Building a strong, multi-dimensional team requires a mix of people. Not everyone has to be strong in everything. You can create a staff who can learn from each other and you.</p>
<p>With skills-based hiring, you can:</p>
<ul>
<li>Identify people with abundant soft skills and a desire to improve their technical skills.</li>
<li>Find candidates who have familiarity in all areas of cybersecurity but don’t have real-world experience yet and develop them.</li>
<li>Attract people newly entering the workforce and those starting over, which can help you build that right mix.</li>
<li>Assess people holistically instead of only looking at their technical aptitude.</li>
<li>Reduce barriers for people getting a shot at a cyber career who didn’t attend college.</li>
</ul>
<p>Putting together a team of cyber professionals in this manner can lead to a strong and healthy culture. It can also decrease risk and ensure that <a href="https://christianespinosa.com/blog/why-cybersecurity-deserves-a-seat-at-the-leadership-table/" target="_blank" rel="noopener">cybersecurity has a seat at the table</a> to influence business decisions. You simply won’t be able to do that if you hire with bias found in the old ideals of “qualified.”</p>
<p>All these ideas and opportunities align directly with the Secure Methodology, which is a seven-step process of transforming people with purely technical and closed mindsets into great communicators and partners.</p>
<h2>The Secure Methodology and Building Your Cybersecurity Team</h2>
<p>The Secure Methodology is the foundation for creating and maintaining a team that thrives and is adaptable. I based it on my own experiences and observations of what was going wrong in cybersecurity, which is a people problem.</p>
<p>Here’s a glimpse of each step and how it can support your hiring strategy:</p>
<h3>Awareness</h3>
<p>The process kicks off with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>. It pertains to both self and others. Without it, people don’t understand the impact of their behavior on relationships and communication. It’s about opening up people’s blind spots.</p>
<p>Will every candidate already have awareness? And how do you evaluate this? Most people lack awareness to some extent, so it often requires development. You can assess someone’s state of awareness or willingness to get there by asking them to reflect and tell you about a challenging time and how they handled their interactions with others.</p>
<h3>Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is critical for anyone’s ability to grow and evolve. Those with a fixed mindset will resist any type of change. It’s a problem for technical people because they desire absolutes, but cybersecurity is a dynamic and volatile field! It’s kind of a paradox, so be observant of how people communicate about themselves and their experiences. This can give you a good idea of how open their mindset is and if they’ll be a good fit for your team.</p>
<h3>Acknowledgment</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>, which you’ll want to make a pillar of your culture. Technical employees crave feedback and understanding of their place in the business. Of course, they must also be receptive to it because it won’t always be positive. You also want to know if someone can acknowledge the work and contributions of others within the group or outside of it.</p>
<h3>Communication</h3>
<p>The fourth step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and it’s the most important concept when creating a team. We can’t do anything well without honest, transparent, and consistent communication.</p>
<p>Being a good communicator doesn’t just mean being articulate. In the world of cybersecurity, your team must be clear about what they need, the challenges they face, and what’s really happening in the threat landscape. They also have to be active listeners to be good collaborators.</p>
<p>You can likely assess someone’s communication skills within the context of your conversations. Look for those who can clearly express big ideas and don’t use geek speak. If they show signs of this and seem to be listening to you, it’s a good sign, and you can continue to help them master this skill.</p>
<h3>Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is the fifth step, and it means concentrating on one task or project at a time without disruptions. It’s hard to find anyone who monotasks much in the workforce, where we seem always to be doing five things at once.</p>
<p>You can talk about monotasking in interviews to see someone’s reaction to it. Do they think it’s bad for productivity or impossible? Emphasize that you believe it to be a critical component of the workday because it enables critical thinking and problem solving, which are two huge assets in cybersecurity.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is the sixth step, and in this connotation, it means the ability to understand someone’s perspective and feelings. It’s one of the hardest things for anyone to build, and yes, we must learn it. We are not innately empathetic. Achieving this can help with stress, burnout, and frustration toward others.</p>
<p>In speaking with prospective hires, ask them about a time when empathy would have been a good response to a problem. The answers they give can reveal a lot about their inner workings.</p>
<h3>Kaizen</h3>
<p>The last step is Kaizen. It’s a Japanese term that means “change for the better.” It never ends because continuous improvement is forever. When hiring, you want to put people on your team who believes in this approach to work.</p>
<p>Ready to learn more about the Secure Methodology? Start by reading <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a> and explore the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/">How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does Your Cyber Team Truly Understand Your Threat Landscape?</title>
		<link>https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/</link>
					<comments>https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 01:10:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[threat landscape]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2832</guid>

					<description><![CDATA[<p>Cyber professionals often lack the full knowledge of the threat landscape because of their own fears, lack of perspective, and hubris. As a result of these blind spots, poor decision-making and more risk become a problem. This internal misalignment and struggle put your cybersecurity strategy and resilience in jeopardy. The problem isn’t usually that they [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/">Does Your Cyber Team Truly Understand Your Threat Landscape?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Does Your Cyber Team Truly Understand Your Threat Landscape?' data-link='https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2833 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495-300x247.jpg" alt="cybersecurity threat landscape" width="300" height="247" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495-300x247.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495-1024x843.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495-768x632.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495-1536x1265.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495-640x527.jpg 640w, https://christianespinosa.com/wp-content/uploads/2023/07/irham-setyaki-QGDsM8qwkEA-unsplash-scaled-e1689556162495.jpg 1779w" sizes="(max-width: 300px) 100vw, 300px" />Cyber professionals often lack the full knowledge of the threat landscape because of their own fears, lack of perspective, and hubris. As a result of these blind spots, poor decision-making and more risk become a problem. This internal misalignment and struggle put your cybersecurity strategy and resilience in jeopardy.</p>
<p>The problem isn’t usually that they don’t have robust technical skills and aptitude regarding threats. It’s much more than that. To ensure your team understands the threat landscape, they must be more aware. Achieving this requires a commitment to change and adapt, which may seem like a goal that’s impossible to reach. However, there are ways to develop soft skills in cyber professionals with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<p>In this post, we’ll discuss the current state of threat landscapes, the challenges that cyber teams face, and how the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">Secure Methodology</a> can help evolve technical folks.</p>
<h2>The State of Threat Landscapes</h2>
<p>The threat landscape describes the complete ecosystem of cyber threats, both potential and known, for an organization. It’s a volatile, ever-changing environment, which means those in charge of cybersecurity must be adaptable and agile. There’s a lot of uncertainty, which can be difficult for technical professionals who crave the certain. This clash of mindsets is a hurdle you must overcome to succeed.</p>
<p>Additionally, some major trends are shifting and changing the threat landscape.</p>
<h3>Cybercrime-as-a-Service Expands the Threat Landscape</h3>
<p>A big trend in cybersecurity is the cybercrime marketplace, where hacking is now a managed service. Because of this trend, cybercriminals no longer have to be technical experts. It’s now a billion-dollar business, and the barrier to entry for hacking just got lower.</p>
<p>The threat landscape is now much greater, with hackers for hire that can lead to malware attacks, ransomware, more phishing emails, and cyber extortion schemes.</p>
<p>You may be surprised to know that cybercrime-as-a-service is very sophisticated. It delivers templates that are usable for content encryption, inspection blocking, and hidden URLs in attachments. So, the threats aren’t different; they are just more voluminous.</p>
<p>Cybercrime-as-a-service is a challenging concept to combat, and it requires technical people to look beyond the black-and-white of the cyber war. To defend against the increasing number of attacks, cyber professionals have to communicate with many parties effectively, understand the hacker perspective, adapt their mindsets, and be better collaborators.</p>
<h3>AI Complicates the Threat Landscape</h3>
<p>There is a good and bad side to <a href="https://christianespinosa.com/blog/will-ai-and-machine-learning-help-or-hurt-cybersecurity/" target="_blank" rel="noopener">AI in cybersecurity</a>. It can be a valuable tool in identifying threats and responding to them. It enables automation around monitoring to augment human intelligence. Its capabilities as a mechanism to thwart attacks include:</p>
<ul>
<li>Detecting fraud and anomalies</li>
<li>Filtering spam emails to reduce phishing attacks ending up in inboxes</li>
<li>Identifying botnets</li>
<li>Managing vulnerabilities</li>
<li>Allowing for better usage of anti-malware</li>
<li>Preventing data leaks</li>
<li>Boosting data automation and intelligence gathering</li>
</ul>
<p>There’s also the downside, as hackers can apply the technology to expand the threat landscape. They can use it to gather data to better profile victims for social engineering. It’s also a means to launch <a href="https://christianespinosa.com/blog/ransomware-should-you-pay/" target="_blank" rel="noopener">ransomware</a> attacks, which are becoming increasingly prolific. In fact, <a href="https://www.cyberark.com/threat-landscape/" target="_blank" rel="noopener">89% of organizations</a> relayed they were a target of ransomware in 2022. Hackers can use it to develop realistic phishing scams, create deep fakes for voice phishing, hide malware, and break passwords and CAPTCHAs.</p>
<p>Understanding the two sides of AI’s capabilities is critical for your cyber team to understand the entire threat landscape and what’s possible. Again, it will require some mindset shifts for them to include innovations in cyberattacks.</p>
<h3>Identity Risk Becomes Even More Urgent</h3>
<p>According to the <a href="https://www.cyberark.com/threat-landscape/" target="_blank" rel="noopener">2023 Identity Security Threat Landscape Report</a>, credential compromise was the top area of risk for respondents. Several factors are influencing this risk growth. Access for employees can have loopholes and not be adequately secured, something 63% of organizations said was the case.</p>
<p>Strategies to combat this beyond the foundational aspects of IAM (identity and access management) involve moving to a <a href="https://christianespinosa.com/blog/what-is-zero-trust-architecture-and-why-should-your-organization-shift-to-it/" target="_blank" rel="noopener">zero trust architecture</a>. It’s the strategic approach of mitigating identity risk by eliminating implicit trust and transitioning to continuous validation. Applying this framework to this risk area will be a change for cyber professionals, but it gets them back to the core questions of: what are you trying to protect, and from whom? It simplifies a complicated landscape and can assist technical folks in evolving their perspectives and mindsets.</p>
<p>Next, let’s look at more challenges your cyber team may face regarding awareness of the threat landscape.</p>
<h2>Why Are Technical Folks Blind to Many Areas of Threat?</h2>
<p>As noted earlier, the blind spots often have little to do with technological knowledge. However, it can still be a problem. It’s a consequence of the paper tiger syndrome in cybersecurity. <a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">Paper tigers</a> are people who appear very qualified on paper with lists of certifications. In reality, they don’t often have strong skill sets and are really just good at memorizing information for a multiple-choice quiz.</p>
<p>Most of the disconnect has to do with failings in soft skills. While many technical folks do a great job in communicating and collaborating, it’s also a gap for many. Here’s why it’s a problem:</p>
<ul>
<li>Cyber professionals tend to think in black and white. Yet, most everything is gray. They have a fixed mindset that there is one correct answer and approach to threats without opening their minds to the changing landscape. It causes them to lose perspective on how hackers are planning attacks. It goes back to the idea of technical people being most comfortable with certainty, and they’ll need to shift to accepting the uncertainty.</li>
<li>Cyber professionals can have fears and insecurities about their abilities and don’t want that to be apparent to anyone. They have a misconception in their thinking that not knowing the answer is a sign of weakness. Except, the threat landscape is something no one could possibly know every corner of. To avoid this discomfort, they’ll posture in how they speak and be unable to listen to others.</li>
<li>Communication can be difficult for your team. They rely a lot on jargon and geek speak, which is alienating and condescending. Communication is the most critical skill your team needs, and its ongoing development is crucial to better understanding the threat landscape.</li>
<li>Communication isn’t easy for them, especially if they posture and use jargon. When they do, they alienate others quickly and live up to their reputation. <a href="https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/" target="_blank" rel="noopener">Communication</a> is the single most crucial skill a cyber professional can possess.</li>
<li>Technical people also often lack awareness of themselves and others. Many don’t even realize this, and it clouds their perspective regarding where threats are and how they’re changing. They may also be unable to comprehend the business side of things and how the threat landscape correlates to this. They believe themselves to be outsiders when they need to be collaborators.</li>
</ul>
<p>All these things make it a challenging journey for cyber leaders and managing the threat landscape. You can find some support for developing the people skills of your team with the Secure Methodology.</p>
<h2>Using the Secure Methodology to Address Threat Landscape Gaps</h2>
<p>For your team to be in the best position to defend against threats, they need to work on their people skills. The Secure Methodology is a seven-step process for doing this. Here’s a preview of each step and how it can help address threat landscape gaps:</p>
<ul>
<li><a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>: Being aware of themselves and others is the first phase of the framework. It’s about opening them up to new perspectives — those of their peers, the business, and even hackers. Coaching and understanding motivations are key to turning the light on in technical folks.</li>
<li><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a>: From awareness, you move to mindset. The idea is to move from a fixed one to a growth one. Cyber professionals have to free themselves from black-and-white thinking and embrace the gray. Reflection and accountability are essential in this step.</li>
<li><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a>: In this step, you play a big role. Being able to acknowledge team members for their efforts and work creates a more positive culture instead of one of blame. Positive reinforcement builds trust and rapport, which your team needs to be effective against threats.</li>
<li><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a>: Having these skills is essential in every part of a cyber professional’s job. When it’s absent or poor, risk and threats increase. Developing communication aptitude involves simplifying language, losing the geek speak, and learning how to listen.</li>
<li><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a>: Most people think multitasking is the key to productivity. It’s actually a concept that can lead to errors and mistakes. Encouraging your team to focus on one task at a time blocks out distractions and allows them to think deeper about threats.</li>
<li><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a>: In this step, you want to help people be able to put themselves in the shoes of others. It builds on what they learn in awareness, mindset, and communication. A technical professional who has empathy translates to an excellent collaborator.</li>
<li>Kaizen: This is a Japanese term that translates to “continuous improvement.” By using this approach, you align with cybersecurity fundamentals to constantly improve defenses and strategies. It’s a continuous state of evolving and adapting, just like the threat landscape.</li>
</ul>
<p>With these seven steps, you can build a team that’s more in tune with the threats of today and tomorrow. Learn more about how to apply it to your organization by <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">checking out the Secure Methodology course.</a></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Does Your Cyber Team Truly Understand Your Threat Landscape?' data-link='https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Does Your Cyber Team Truly Understand Your Threat Landscape?' data-link='https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/">Does Your Cyber Team Truly Understand Your Threat Landscape?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is Your Cybersecurity Budget Limited? How to Do More with Less</title>
		<link>https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/</link>
					<comments>https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 17 Jul 2023 01:00:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2830</guid>

					<description><![CDATA[<p>Having to do more with less is a common quandary for any industry or department. When cuts have to be made, companies look for any opportunities, and sometimes limited funding can significantly impact operations and performance. Cybersecurity budgets are not immune from this. Even though organizations understand the gravity of investing in cybersecurity, they often [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/">Is Your Cybersecurity Budget Limited? How to Do More with Less</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Is Your Cybersecurity Budget Limited? How to Do More with Less' data-link='https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2831 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-300x225.jpg" alt="Cybersecurity - more with less" width="300" height="225" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-300x225.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-1024x768.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-768x576.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-1536x1152.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-2048x1536.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/07/etienne-girardet-fti002hQCCA-unsplash-640x480.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Having to do more with less is a common quandary for any industry or department. When cuts have to be made, companies look for any opportunities, and sometimes limited funding can significantly impact operations and performance. Cybersecurity budgets are not immune from this. Even though organizations understand the gravity of investing in cybersecurity, they often have no choice but to curb spending.</p>
<p>As a result, you may not have the resources to hire more team members, adopt new tools, or complete major projects like migrations. It’s not a comfortable place for any cybersecurity leaders, but it’s also not something that has to paralyze your strategies and development of employees.</p>
<p>Let’s look at the state of cybersecurity budgets and how changes in the way you manage your team can help you do more with less.</p>
<h2>The State of Cybersecurity Budgets</h2>
<p>Overall, Gartner predicts that spending on security will increase by <a href="https://www.gartner.com/en/documents/4016190" target="_blank" rel="noopener">11%</a> through 2026. However, that’s a macro-level perspective. What’s happening inside your organization may not reflect this. You could actually see slight increases in your spending capacity, but that doesn’t mean you have “enough” budget. Factors like inflation and the need to be more competitive with compensation can quickly eat up any new dollars.</p>
<p>Additionally, more cyber spending doesn’t make threats or risks disappear. Strategically using your budget may, however. There aren’t enough dollars in the world to curtail the bombardment of cyberattacks companies face every day. That’s especially true for SMBs with smaller budgets and less human capital. They are often the target of hackers, as illustrated in the <a href="https://www.verizon.com/business/resources/reports/dbir/2023/" target="_blank" rel="noopener">Verizon 2023 Data Breach Investigations Report</a>. It documented 699 incidents in the year prior that occurred for companies with less than 1,000 employees.</p>
<p>SMBs are more likely to face limited budgets. Rising costs all around operations can impact spending more significantly than larger companies. No matter the size of the company or its capital, tightening budgets is a growing concern. So, how can you focus your spending on the areas that matter?</p>
<h2>Where to Focus Your Company’s Limited Cyber Budget</h2>
<p>There are several categories worth investing in to ensure systems stay secure. Those can include both human and machine intelligence. These are my recommendations for any SMB that needs to make the best decisions regarding cybersecurity spending.</p>
<h3>Controls That Can Successfully Defend Against Threats</h3>
<p>In order to know what controls will deliver the best ROI, you have to assess your threats and vulnerabilities. A risk assessment is a good first step in deciding on budget allocation. Once you have a picture of your position and the threat landscape, you can make data-driven decisions about controls.</p>
<p>Knowing more precisely how a hacker might try to infiltrate can guide you to controls that work best for those scenarios. A risk assessment is a good starting point or place to restart cybersecurity efforts. Then you have to make comparisons in the categories of controls you want to employ, looking at their features, costs, and other factors.</p>
<p>When building your tech stack, you’ll also have to consider the people you need to lead the efforts around controls and do further analysis based on data. When choosing those team members, assess their soft skills in the same way you do the hard skills. Leading such a project requires great communication, collaboration, perspective, and flexibility. Technical people often struggle with these things. So much so that it can increase your risk.</p>
<p>Next, you’ll finalize recommendations and move forward with procurement.</p>
<h3>Protecting Public-Facing Applications</h3>
<p>Whatever is in the public domain can be risky in cybersecurity. Vulnerabilities in these assets are the <a href="https://www.mandiant.com/resources/blog/m-trends-2023" target="_blank" rel="noopener">most common initial access technique hackers take</a>. This part of your digital footprint is what the business side depends on for awareness, lead generation, and revenue. It’s a tricky situation that can often have different departments on two different sides of the argument. There are some ways to resolve this and another place to spend budget money—web application penetration testing.</p>
<p><a href="https://bluegoatcyber.com/blog/what-is-web-application-penetration-testing-and-what-are-its-benefits/" target="_blank" rel="noopener">Web application penetration testing</a> is a method of simulating cyberattacks to access sensitive data. This test assesses all elements of your web applications—the architecture, design, and configuration. It’s inclusive of anything delivered over the internet through a browser interface. Hiring a firm to perform these tests should be on your budget list. Depending on your industry and compliance requirements, you may do these twice a year or more.</p>
<p>There are different options for web application penetrating testing: Black Box, Gray Box, and White Box. The differences are the levels of access the ethical hackers have. Most start with Black Box because testers know nothing about the company, so they’re just like hackers looking for public-facing information to exploit.</p>
<p>The more exposed your company is in the media and digitally, the more you could be at risk. So, earmark the budget for these exercises. Make sure they deliver the best value by remediating what the testers find and having conversations about how to avoid these things in the future. Conversations like these are essential for people to become better at their job and more connected to it.</p>
<h2>Building More Redundancy to Deepen Your Defenses</h2>
<p>The next area that should be on your budget is redundancy and contingencies. <a href="https://christianespinosa.com/blog/ransomware-attacks-new-ways-to-exploit-old-vulnerabilities/" target="_blank" rel="noopener">Ransomware</a> is a bigger threat than ever, and SMBs have had their share of situations. The best defense will be prevention, which you’re investing in with controls and pen testing. These dollars are all about the “what-if” scenarios.</p>
<p>These redundant capabilities won’t have a connection to your main network. Keeping them separate is the best way to avoid malware spreading. Most attacks spread throughout the entire enterprise. Hackers are using command and scripting activity, which are also things you can monitor for and then be able to detect and respond to the threat.</p>
<p>Within this category of spending, you’ll have cloud computing, monitoring, hosting, and other fees associated with having redundant operations. Make prudent decisions about what needs to move over and what doesn’t. Work through scenarios and threat contingencies with your team to make decisions.</p>
<h2>Behavioral Tracking with Advanced AI</h2>
<p>AI is weaving its way into cybersecurity in many ways. Much of what AI can do is monitor and spot patterns or anomalies. The technology is advancing, and AI can now analyze data collected regarding online behaviors. Tracking the behavioral movements of hackers seems a little futuristic, but it’s the next logical step. This technology is really augmenting your team. The AI cleans up the data and gives raw results, which your team can decipher to continue to understand attack methods and defend against them.</p>
<p>There’s another way that AI is worth investing in with your budget.</p>
<h2>Automation Increases Productivity and Has a Strong ROI</h2>
<p>Automation tools that assist with managing, validating, remediating, and tracking your security should be on your budget. They leverage things like RPA (robotic process automation) and AI to deliver digital robots that can do a lot of manual, repetitive tasks so your people can focus on more strategic work.</p>
<p>There are many different things that you can automate. You’ll need to understand your end goal and the processes related to them to determine what to adopt. Some categories include:</p>
<ul>
<li>Software updates for devices connected to the network</li>
<li>Tracking asset posture</li>
<li>Monitoring and alerting</li>
<li>Network Intrusion Detection Systems (NIDS)</li>
<li>Network Intrusion Prevention Systems (NIPS)</li>
<li>Security logging tools</li>
<li>Data aggregation</li>
</ul>
<p>Focus on the most labor-intensive processes that rarely deviate when selecting automation tools. Get feedback from your team on the tasks they’d most like to move to automation when deciding where to spend these budget dollars.</p>
<h2>Investing in Your Team in Traditional and Nontraditional Ways</h2>
<p>Using cybersecurity budget dollars to upskill, train, and certify your staff is always a wise investment. For one, they become better at their job. They also can appreciate the acknowledgment that they are worth upskilling, which can support longer retention and less turnover. You can do this with those at all levels, from junior roles to senior ones. Cybersecurity is a dynamic, ever-changing ecosystem, and your good guys need to be learning more ways to outwit the bad guys.</p>
<p>Along with technical skills, you should consider helping them develop soft skills. They pay off just as much as hard ones. When technical people are better communicators and have greater awareness, everyone can be more efficient and effective. In such a high-stress environment, people that have people skills are immeasurably valuable.</p>
<p>So, how do you develop technical people into excellent communicators and collaborators? <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">The Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> is a concept I created that includes seven steps to do just that. This kind of investment in people demonstrates that you want them to be successful and contribute. It’s a great framework for any cybersecurity leader to adopt. You don’t need a huge budget to do this. You’ll likely invest more time, but it’s worth the work. The return on this investment is positive for your people and the business&#8217;s ability to mitigate risk.</p>
<p>You can learn more about it by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">The Smartest Person in the Room</a>, and checking out the <a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Secure Methodology Course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Is Your Cybersecurity Budget Limited? How to Do More with Less' data-link='https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Is Your Cybersecurity Budget Limited? How to Do More with Less' data-link='https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/">Is Your Cybersecurity Budget Limited? How to Do More with Less</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/is-your-cybersecurity-budget-limited-how-to-do-more-with-less/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology</title>
		<link>https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Feb 2023 17:20:06 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity workforce]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2800</guid>

					<description><![CDATA[<p>Finding qualified and skilled talent has been a struggle in cybersecurity for years. According to data, that’s only getting harder. Exasperating the cybersecurity workforce shortage is the fact that retaining employees is challenging. Cybersecurity workforce retention is as important as your recruitment strategies. So, how do you keep cyber professionals on the job? It’s not [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/">Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology' data-link='https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2801 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-300x200.jpg" alt="cybersecurity jobs" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Finding qualified and skilled talent has been a struggle in cybersecurity for years. According to data, that’s only getting harder. Exasperating the cybersecurity workforce shortage is the fact that retaining employees is challenging. Cybersecurity workforce retention is as important as your recruitment strategies.</p>
<p>So, how do you keep cyber professionals on the job? It’s not an easy answer, as so many factors impact this. However, you can build a retention plan alongside your recruitment strategy. In this post, we’ll uncover why turnover occurs and how to create a culture and environment that will make them stay.</p>
<h2>The Cybersecurity Workforce Retention: State of the Industry</h2>
<p>A study from the ISACA found that <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">60%</a> of cyber leaders said it was difficult to retain cybersecurity professionals, up 7% year-over-year. The survey outlined why it’s happening, with these being the top reasons:</p>
<ul>
<li>Recruited by other companies (59%)</li>
<li>Compensation and incentives (48%)</li>
<li>Few promotion and development opportunities (47%)</li>
<li>The high stress of the job (45%)</li>
<li>No management support (34%)</li>
</ul>
<p>Some of these challenges are easier to combat than others. Currently, cybersecurity jobs are greater than those available to fill them. A study estimated that over <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">3.4 million cyber jobs</a> are available, which will only increase. As a result, other companies will try to lure away your employees, even if they aren’t actively looking for another job. How they respond to this will depend on how they feel about working for you in terms of money, autonomy, support, and satisfaction.</p>
<p>Compensation is another tricky area. Competitors may be offering more money. While that’s a critical part of why people work, money may not be the top factor in retention. Regardless, depending on their experience, role, and market, you should pay your team a fair wage. With the cost of living increasing, you must keep up with this.</p>
<p>Next is development, which is something you can control. Continuing to train and upskill your team shows you’re investing in them and their future. You should also be clear with them about the opportunities to advance.</p>
<p>Stress is inevitable in almost any job. Cybersecurity is a dynamic industry with fire drills all the time. Focusing on ways to destress workers should be part of your culture. It could be rewarding your team with social or team-building activities. Having an open door for employees to share their experiences with you and their stress can also be helpful.</p>
<p>Finally, you have complete purview over management support. As a leader, you have to earn and keep the respect of your team. Being a great leader requires you to communicate honestly, listen intently, acknowledge their work, and support them in any way you can.</p>
<p>Addressing these common reasons for turnover is critical for your organization because its impact is considerable.</p>
<h2>The Impact of Turnover</h2>
<p>An inability to retain staff affects many aspects of operations. Being understaffed creates more risk because everyone’s stretched thin. It’s easy to miss key things when someone is overwhelmed. Turnover also prevents your ability to be more strategic because you’re in a reactive mode versus a proactive one. Productivity suffers as well.</p>
<p>Turnover also costs you money. The average cost of hire is <a href="https://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/the-real-costs-of-recruitment.aspx" target="_blank" rel="noopener">$4,700</a> and could be even greater considering how in demand these roles are. It’s in your best interest to retain your technical folks, which isn’t easy. You may be looking at many methods to decrease turnover, including increasing wages and benefits, allowing for flexible work, asking for feedback from your team to propel improvement, and providing the right tools to do the job.</p>
<p>Those are all good things to have, but retention has much to do with engagement, satisfaction, feeling valued, and having respect for leadership. These things can mean more than money, which is why applying the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> to cybersecurity workforce retention makes sense. It’s a seven-step guide that defines a roadmap to transform technical people into highly communicative and collaborative professionals.</p>
<p>Let’s see how each step can support retention.</p>
<h2>Applying the Secure Methodology to Cybersecurity Workforce Retention</h2>
<p>With every step of the Secure Methodology, there are lessons to learn that impact retention. Here’s how to use these in your organization.</p>
<h3>Step One: Awareness</h3>
<p>Tapping into <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a> is an important attribute to have in life and work. We all have blind spots, but some are bigger than others. Without being aware of these, there are consequences. It negatively impacts relationships and erodes trust. Without being aware, your team doesn’t realize how their behavior affects others and the environment. Things can become toxic very fast. If those things are lacking, it’s easy to see why some would want to leave.</p>
<p>Awareness means being cognizant of your blind spots and working to address them. A more aware team will be more collaborative and communicative. Here are some ways that this can support retention:</p>
<h4>Coaching</h4>
<p>Coaching is vital to broadening awareness. If you can open the eyes of your team in a conducive way, they may have “aha” moments. Shifting their stance from being self-centered allows people to get a better perspective.</p>
<h4>Language</h4>
<p>Using specific, relatable language helps technical people better understand expectations and culture. When there’s no confusion about where everyone should focus, they will likely feel more empowered.</p>
<h4>Motivation</h4>
<p>Understanding motivations is critical to unlocking awareness. Tapping into what makes them tick helps strip away some of the technical posturing cyber professionals often do. Knowing their motivations allows you to personalize how you support and coach them.</p>
<h3>Step Two: Mindset</h3>
<p>There are two types of <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindsets</a> — fixed and open. Many technical folks have fixed mindsets with no desire to change, learn, or grow. However, it doesn’t mean they have to stay that way. Fixed mindsets are poisonous to retention. Even if one in the group is this way, it can taint it for others. When we’re fixed, we refuse to move.</p>
<p>A growth mindset is freeing and enables people to be flexible and adaptable, which is necessary for cybersecurity. Evolving a fixed mindset to a growth one is possible, but it requires commitment from you and the employee.</p>
<p>Some key results of a fixed mindset include:</p>
<ul>
<li>The ability to reflect on situations and understand how to handle it differently.</li>
<li>Healthier and consistent communication.</li>
<li>A culture that welcomes growth personally and professionally.</li>
<li>Growth mindsets can be a significant reason employees stay with your organization.</li>
</ul>
<h3>Step Three: Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is scarce in technical fields. Yet, it’s so crucial to retention. Your employees want appreciation for the work they do. Its absence is because most cyber leaders only respond to things when they go wrong. The small wins everyday matter so much to your people, so you must become vigilant about feedback.</p>
<p>Your approach to acknowledgment should include:</p>
<ul>
<li>Being positive by looking at what went right first</li>
<li>Specificity in your feedback</li>
<li>Immediately offering feedback in the moment</li>
<li>Praise in public and relay ways to improve in private</li>
<li>Consistency in how you address acknowledgment</li>
</ul>
<p>Lack of appreciation and lack of feeling valued are two primary reasons why people leave their jobs. If your people don’t receive acknowledgment, they’ll actively seek another job.</p>
<h3>Step Four: Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is part of every step in the Secure Methodology, along with having its own step. It is, without a doubt, the most critical part of a thriving culture and support to retention. You probably know there are communication issues among your technical folks. It doesn’t mean they aren’t articulate. Rather, their communication styles are often too aggressive, overly complicated with geek speak, and always on the defense. They also suck at listening, the other component of communication.</p>
<p>This storm of dysfunction will have people, often your best, running away from your organization. Thus, it’s critical to make communication the foundation of your culture and retention strategy. Here’s how to use it:</p>
<ul>
<li>Be honest and transparent as a leader.</li>
<li>Move away from overly technical language and simplify the message.</li>
<li>Encourage open discussion and dialogue that’s respectful.</li>
<li>Praise your people when they make adjustments in communication.</li>
<li>Practice active listening in exercises, so they grasp how crucial it is.</li>
</ul>
<p>If you can lay out these tenets, your people will likely see the value and follow you. If some still don’t realize it, they may be dragging others down. In some cases, you may have to let those folks go, so they don’t make it unbearable for everyone else.</p>
<h3>Step Five: Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is focusing on one thing, the opposite of multitasking. Many describe multitasking as an excellent quality, but it can actually hamper productivity. Forcing multitasking can make your people feel pulled in many directions. Those feelings create animosity and dissatisfaction. So, remove this pressure and instead recommend blocking time for specific tasks, meetings without distractions, and saying “no” to some things that aren’t urgent.</p>
<h3>Step Six: Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is a valuable quality to have. In terms of cybersecurity, cognitive empathy is essential for a healthy environment. It means that others can understand the feelings and perspectives of others. Without it, you have no team or human connection, and you need those to retain your people. All the things you put in place to get to this step support the building of empathy. Developing this in your team enables a trust factor and creates more satisfaction.</p>
<h3>Step Seven: Kaizen</h3>
<p>The final step is kaizen, which is a Japanese term. When translated into English, it means “continuous improvement.” So, this step isn’t an end to the journey; it’s how to sustain it. If your team believes in this process, they’ll want to continue identifying ways to improve and follow through with them. When kaizen is part of your <a href="https://christianespinosa.com/blog/the-cyber-threat-no-one-talks-about-the-absence-of-a-cybersecurity-culture/" target="_blank" rel="noopener">cybersecurity culture</a>, your technical folks will evolve and realize that this is where they can continue learning and growing.</p>
<p>Retaining your workforce won’t be easy. With the Secure Methodology, you have a framework. You can go more in-depth by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and viewing the <a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology' data-link='https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology' data-link='https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/">Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity and Meaningful Work: Why New Generations Entering the Field Want Purpose</title>
		<link>https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 18 Dec 2022 16:17:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[career]]></category>
		<category><![CDATA[core values]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[gen z]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[purpose]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2785</guid>

					<description><![CDATA[<p>The cybersecurity talent pipeline is facing the same challenges as many industries. A strong job market and low unemployment mean that many well-qualified professionals aren’t actively seeking new jobs. As a result, cybersecurity needs to look to the latest generation entering the workforce, Gen Z. Gen Z is a unique generation, which makes the ability [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/">Cybersecurity and Meaningful Work: Why New Generations Entering the Field Want Purpose</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity and Meaningful Work: Why New Generations Entering the Field Want Purpose' data-link='https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2786 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-300x202.jpg" alt="Cybersecurity Purpose - Christian Espinosa" width="300" height="202" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-300x202.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-1024x690.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-768x517.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-1536x1035.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-2048x1380.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2022/12/jamie-street-_94HLr_QXo8-unsplash-640x431.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />The cybersecurity talent pipeline is facing the same challenges as many industries. A strong job market and low unemployment mean that many well-qualified professionals aren’t actively seeking new jobs. As a result, cybersecurity needs to look to the latest generation entering the workforce, Gen Z. Gen Z is a unique generation, which makes the ability to <a href="https://christianespinosa.com/blog/how-to-recruit-and-hire-cybersecurity-professionals-to-help-you-win-the-cybersecurity-war/" target="_blank" rel="noopener">recruit and retain</a> them much different. They have new ideas about work and that it should be more than a job and provide them with purpose and fulfillment—a trending topic in the world of HR known as meaningful work.</p>
<p>In this post, we’ll examine the Gen Z demographic, what matters to them, the concept of meaningful work, and how cybersecurity leaders can use this information to connect with a new generation of workers.</p>
<h2>All About Gen Z and Their Entrance into the Workforce</h2>
<p>Gen Z describes individuals born between 1997 and 2012. They currently make up almost <a href="https://www.statista.com/statistics/797321/us-population-by-generation/" target="_blank" rel="noopener">21% of the U.S. population</a>. The oldest of this group have entered the job market, with many more to come in the next few years.</p>
<p>Gen Z is described as the most <a href="https://www.pewresearch.org/social-trends/2018/11/15/early-benchmarks-show-post-millennials-on-track-to-be-most-diverse-best-educated-generation-yet/" target="_blank" rel="noopener">racially and ethnically diverse generation</a>. They are also digital natives who have had a device in their hands most of their lives. This demographic has also been through many major events during their young lives, including the war on terror, a major recession where they witnessed parents and family members lose jobs, and the pandemic.</p>
<p>All these factors shape how they view work and what’s important to them. They are often adamant about work-life balance, flexibility, autonomy, and having modern technology as part of their job. In addition to these expectations, they also want to work for organizations that share their values. In fact, <a href="https://www2.deloitte.com/us/en/pages/consumer-business/articles/understanding-generation-z-in-the-workplace.html" target="_blank" rel="noopener">77% of Gen Z</a> said this was important in response to a survey conducted by Deloitte. Another thing they value highly in an employer is diversity, equity, and inclusion (DEI), which <a href="https://tallo.com/blog/gen-z-workplace-diversity-equity-inclusion/" target="_blank" rel="noopener">87% agreed</a> was critical when considering jobs.</p>
<p>Gen Z also cares about company culture. Cybersecurity should be very culture-focused, which could entice them. Overall, they want to work for a company that cares about their well-being.</p>
<p>Work for them isn’t about a “grind” or purely a transactional relationship. They desire meaningful work, and if it’s not present, they’ll have no problem moving to the next opportunity. Long gone are the days when employees worked for a single company their entire lives.</p>
<p>As a cybersecurity leader, ingesting this information about Gen Z may give you pause. Yet, they have some key attributes that make them attractive as workers beyond technical skills.</p>
<h2>How Gen Z Workers Can Benefit Cybersecurity</h2>
<p>Gen Z had a big head start on technology aptitude. It’s been part of their lives forever, and they’ve been early adopters. Beyond these skills, cybersecurity leaders are placing more emphasis on people skills, which is the central message in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. These can be very hard to develop in older workers that have been in the industry for years.</p>
<p>The nature of Gen Z’s life experiences naturally predisposes them to value being communicators and collaborators. The stereotype of this group as never putting down their phones and being detached in communication isn’t accurate. They do love tech and spend lots of time on social media, but it’s not their entire personality.</p>
<p>Since they sincerely care about the world around them, they also understand the value of having strong interpersonal skills. Some might not be as confident in soft skills, but they won’t “fight” you on realizing the need to develop them as older generations may. As a result, they may be more amenable to participating in exercises, programs, and activities that will help them cultivate better <a href="https://christianespinosa.com/blog/5-people-skills-every-successful-cybersecurity-professional-possesses/" target="_blank" rel="noopener">people skills</a>.</p>
<p>All these things make Gen Z an attractive group for cybersecurity careers. The onus of making your industry and company appealing has a lot to do with meaningful work.</p>
<h2>What Is Meaningful Work?</h2>
<p>Meaningful work is a newish concept in the world of HR. Its definition is somewhat flexible because “meaning” is subjective to an individual. The idea is universal in that it means that an employee believes the work to be important for the greater good and is part of something. As a result, workers are motivated and engaged in what they do.</p>
<p>Another aspect of meaningful work is that employees can use critical thinking skills and be problem-solvers versus taskmasters.</p>
<p>Both align with a career in cybersecurity and what Gen Z wants in a career. In the end, meaningful work is good for workers and businesses.</p>
<p>For example, employees who engage in meaningful work from their perspective may positively impact their mental health, something Gen Z is serious about. Healthier employees typically have <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4174367/#:~:text=This%20study%20found%20that%20depression,involving%20medical%20and%20vocational%20interventions." target="_blank" rel="noopener">fewer absences than their depressed counterparts</a>. They’ll also be more engaged in building a strong cybersecurity culture and collaborating to do great things.</p>
<p>An environment of meaningful work supports retention, as well. The attachment that occurs in this situation delivers tangible benefits. Companies can see <a href="https://hbr.org/2019/12/the-value-of-belonging-at-work" target="_blank" rel="noopener">50% less turnover and a 56% increase</a> in job performance.</p>
<p>It can also deter burnout, which can be a problem in cybersecurity. It’s a high-stress field with many risks, threats, and stakeholders. If you have a team that feels the work is meaningful, that you and the organization value them, and is a culture that’s inclusive, you have an advantage over others. As a result, you’ll be a more attractive option for those entering the field.</p>
<p>So, how do you promote your company as one that delivers meaningful work?</p>
<h2>Attracting Gen Z with the Promise of Meaningful Work</h2>
<p>There are a few key strategies to consider when recruiting Gen Z and using the angle of meaningful work. First, it’s essential to know that Gen Z is proactive in their job search. For those in college, a <a href="https://yello.co/blog/introducing-the-first-graduating-class-of-generation-z/" target="_blank" rel="noopener">quarter of them began job searching in the first two years</a>. Second, they seek internships to get experience for the future and test out a field to see if it’s a good fit. Taking this into consideration, here are some ideas.</p>
<h3>Partner with Universities and Community Colleges to Find Talent</h3>
<p>Get to Gen Z while they are still learning by creating relationships with educational institutions. It’s an excellent way for students to become aware of your company. This can lead to mutually beneficial internships. The first impressions that Gen Z has about your company will matter, so talk about culture and how much you value interpersonal skills as much as technical ones.</p>
<h3>Add Meaningful Work to Job Descriptions</h3>
<p>Most cybersecurity job descriptions are dry and standard. It looks like a computer wrote it! Gen Z will not respond to this, as they value authenticity. Be honest in how you position your roles. Yes, it’s important to talk about technical skills, but you can also include that meaningful work is part of your organization and that you provide an environment where people can learn and grow.</p>
<h3>Tap Your Current Gen Z Employees for Referrals</h3>
<p>If you already have Gen Z workers on your team, talk to them about referrals. Ideally, if they are happy with the company and the work, they’ll be up for this. A referral is better than most applications for both parties. For you, it’s a sign that your employee vouches for them. For the candidate, they’ve heard about what it’s really like to work for you and weren’t discouraged by what they learned.</p>
<p>Once Gen Z becomes part of your group, you have another consideration that makes or breaks. How will older generations react to them?</p>
<h2>Is Your Team Ready for Gen Z and Meaningful Work?</h2>
<p>If you’ve made meaningful work a priority, then your current employees know this. However, it’s not going to matter to all of them. Some are still stuck in old perceptions about cybersecurity. Their “meaning” is that they are the smartest, most capable technical people. If that’s your current predicament, there will be some friction.</p>
<p>In a way, you have to prepare them for the entrance of Gen Z, which will require that they work on their people skills. Hopefully, they’ll realize this process benefits them in many ways. However, it involves change, and resistance is inevitable. Through the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, which I developed in my book, you can find a seven-step guide on how to transform these outdated mindsets.</p>
<p>They’ll be helpful for all your employees, regardless of their generation. The way they respond and their effort will vary. Ultimately, you’re trying to work as a cohesive team that respects each other, cooperates well, communicates clearly, and can find meaning in what they do.</p>
<p>The journey ahead will be challenging at times. You have a chance to make a real difference in the lives of your employees and your company’s ability to manage risk and mitigate threats. Use the Secure Methodology as a blueprint to do that. Get the entire message by <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">reading my book</a> and check out the <a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Secure Methodology course</a>, as well.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity and Meaningful Work: Why New Generations Entering the Field Want Purpose' data-link='https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity and Meaningful Work: Why New Generations Entering the Field Want Purpose' data-link='https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/">Cybersecurity and Meaningful Work: Why New Generations Entering the Field Want Purpose</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-and-meaningful-work-why-new-generations-entering-the-field-want-purpose/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Secure Methodology™ Step Six: Empathy</title>
		<link>https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/</link>
					<comments>https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Wed, 07 Dec 2022 00:14:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[empathy]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2781</guid>

					<description><![CDATA[<p>Empathy in the professional world isn’t a new concept, but its adoption is lagging. Look no further than the Great Resignation as proof that how companies treat people must change. Many people have readjusted their beliefs about work and life in the past few years, so empathy’s importance is greater than ever and has a pivotal role [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/">The Secure Methodology™ Step Six: Empathy</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Secure Methodology&#x2122; Step Six: Empathy' data-link='https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/' data-app-id-name='category_above_content'></div><div class="gac-project-details main-container">
<div class="gac-project-wrapper gac-content-page gac-touch-device">
<div class="gac-project-content">
<div class="gac-project-content-wrap">
<div>
<div class="gac-project-data-wrap">
<div id="gac-project-data" class="gac-project-data">
<p><img loading="lazy" decoding="async" class="size-medium wp-image-2782 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-300x197.png" alt="Empathy - Christian Espinosa" width="300" height="197" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-300x197.png 300w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-1024x674.png 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-768x505.png 768w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-1536x1010.png 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-640x421.png 640w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920.png 1920w" sizes="(max-width: 300px) 100vw, 300px" />Empathy in the professional world isn’t a new concept, but its adoption is lagging. Look no further than the <a href="https://www.npr.org/2021/06/24/1007914455/as-the-pandemic-recedes-millions-of-workers-are-saying-i-quit" target="_blank" rel="noopener">Great Resignation</a> as proof that how companies treat people must change. Many people have readjusted their beliefs about work and life in the past few years, so empathy’s importance is greater than ever and has a pivotal role to play in cybersecurity.</p>
<p>Empathy is a key component in winning the cybersecurity war. As such, it’s the sixth step in the Secure Methodology, which is a guide of seven steps that helps cyber leaders transform their employees into high-functioning communicators and collaborators. It builds on the five preceding steps: <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindset</a>, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>.</p>
<p>Let’s dive into empathy and why it’s a critical aspect of cybersecurity.</p>
<h2>Empathy Is Hard to Find These Days</h2>
<p>While empathy is critically absent in many technical folks, the rest of the world isn’t demonstrating it much, either. It doesn’t mean that people are naturally unkind; instead, their concept of doing things to support others and the greater good gets canceled by their focus on differences.</p>
<p>It’s easy to ground a worldview in differences and an us-versus-them mentality. If we don’t feel personally impacted by something, we’re glad to look the other way. If “others” are different, then many of us can feel it’s none of our concern.</p>
<p>Except, at the end of the day, we have so much more in common. First, we’re all humans and face many of the same challenges. There’s a microcosm of this happening in your cyber team, especially in their beliefs about others. They typically see nontechnical roles as “others” who could never understand what they do, which creates a wall for communication and collaboration.</p>
<p>Everyone will always have specific roles, but when they become the foundation of how you react to others, it’s not serving anyone. For example, saying, “Oh, he’s a salesperson and can’t understand security risk,” means someone’s already discounting them and looking at them like a caricature.</p>
<p>This initial premise creates an empathy void, which has consequences for cybersecurity.</p>
<h2>The Impact of the Absence of Empathy on Cybersecurity</h2>
<p>So, how does a lack of empathy affect cybersecurity? It can cause a lot of problems, which can have a devastating impact on risk.</p>
<h3>Technical Folks Can Be Intellectual Bullies</h3>
<p>Bullying in the workplace is just as common as in the schoolyard. When people cannot see the perspective of others, they tend to act condescending and be defensive in every conversation. They use their intellect to belittle others, which fosters distrust and resentment. Unfortunately, bullying is often part of cybersecurity culture and goes unchecked.</p>
<h3>Ego Cripples Empathy</h3>
<p>These bullies often only have concerns for themselves. They have a narrow view that doesn’t include the needs of others. It’s especially detrimental when managers have egos that stunt the growth of others. It’s toxic and hampers the capabilities of a team.</p>
<h3>Without Empathy, You Can’t Have a Team</h3>
<p>The basic principle of a team is a group of people working together to accomplish a goal or solve a problem. Empathy is a prerequisite for this. When it’s missing, you can’t have a team.</p>
<p>On the one hand, we all have some type of belief about our inabilities. You would think this would encourage us all to be more empathetic. The challenge for many technical people is that they want to cover up insecurities and reject empathy for themselves and others. As a result, the foundational trust of being teammates isn’t there.</p>
<h3>Empathy Emptiness Is More Than an Internal Problem</h3>
<p>A cyber team that doesn’t prioritize empathy also hurts the relationships it has with others, whether they are an internal or external client. Technical people are responsible for security, but not in a vacuum. They must work with others to understand the objectives and concerns of these parties. When they don’t, they create a greater divide and overcomplicate situations, which causes further ostracization.</p>
<p>The stakeholders want to be involved and understand threats and risks. Just because they aren’t technical people doesn’t mean they can’t understand these things. However, if cyber professionals keep them in the dark, it only helps cyber criminals.</p>
<h3>The Real Empathy Struggle for Technical People Is a Human Connection Problem</h3>
<p>In my career and experiences, I’ve learned that human connection is the root of the empathy struggle for technical folks. Obviously, connection is essential to empathy in any capacity. If we’re all lone wolves and only focus on ourselves, there’s no connection.</p>
<p>Striving to build a human connection is an asset anyone can appreciate. It improves communication, collaboration, and perspective. Those things make people better at their job and happier in life in general.</p>
<p>So, how do you break people out of their one-track minds and cultivate a cybersecurity culture built on empathy?</p>
<h2>How to Develop Empathy in Your Cyber Staff</h2>
<p>You may think that developing empathy in technical professionals is beyond impossible. You’re already ready to skip to the next step and leave this one out because empathy is too emotional. Fair enough, but I wouldn’t have included it in the Secure Methodology without a plan. It’s an entire chapter in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and these are some excerpts that can help you find success.</p>
<h3>The Framework Starts With Cognitive Empathy</h3>
<p>There is more than one kind of empathy, and the focus here is <a href="https://christianespinosa.com/blog/cognitive-vs-affective-empathy-leadership/" target="_blank" rel="noopener">cognitive empathy</a>, which is the ability to understand someone else’s feelings and perspective. It’s somewhat different from its emotional counterpart, affective empathy, but it still has the same roots.</p>
<p>Additionally, you must frame your approach to differentiate between <a href="https://christianespinosa.com/blog/empathy-vs-sympathy/" target="_blank" rel="noopener">empathy and sympathy</a>. They are quite different. Empathy describes the choice to connect with someone and accept their perspective. Sympathy doesn’t require the perspective aspect. Rather, it’s merely the ability to feel sorrow for how someone else feels.</p>
<p>People can be sympathetic but not empathetic. It’s a good trait to have, but empathy is what can drive organizational change and success.</p>
<h3>Understanding Motivation</h3>
<p>Motivation is a recurring theme in the Secure Methodology and applies to empathy. Grasping what motivates an employee is a key to helping them become more empathetic. Their motivation ties to the role they play in cybersecurity and supports a perception of a team working together. If they get this, they’ll want to grow their empathy.</p>
<h3>Acknowledging Accomplishments</h3>
<p>When you recognize the hard work of your staff, you create positive connections with them. In turn, it becomes a way to foster empathy. In addition to acknowledging achievements, you should also highlight similarities, struggles, and perspectives. This can create further connections between teammates and enrich trust.</p>
<h3>Adapting Communication</h3>
<p>It starts with you and your communication if you want your people to exemplify cognitive empathy. You have to be an example through how you communicate, which means admitting uncertainty and not always having an answer. They may be more likely to do the same if you can do this. Adapting your communication is critical and includes:</p>
<ul>
<li>Avoid the word “why” because it triggers defensive responses.</li>
<li>Try making statements to uncover information, such as “Tell me what your plan is for this.”</li>
<li>Include the perspectives of others in how you communicate to demonstrate that the topic impacts many people.</li>
<li>Encourage people to explain those impacts on others when working through a cybersecurity challenge.</li>
<li>Continue to impress upon your team that listening is just as vital in communication as speaking.</li>
</ul>
<h3>Putting the Target Back on the Actual Enemy</h3>
<p>It may seem apparent, but the enemy in the cybersecurity ware is the hackers. Yet, the “otherism” I defined earlier pits cyber professionals against colleagues. For those people who are stuck in the mindset of us versus them, they forget who the actual bad guys are. In fact, they’re helping the bad guys by functioning without empathy.</p>
<p>Staff too busy trying to stay in control of every cyber discussion and decision refuse to let the needs and perspectives of others have a place. As a result, cybercriminals win because team cohesion is absent. This is the most dangerous environment to operate in and will likely end in a breach or incident.</p>
<p>In working toward greater empathy, you must be clear about who the adversary is and that it’s nobody in the room. Connection within your team and with clients is critical to being proactive and prepared for cyberattacks. You can outmaneuver the hackers if you consistently focus on this and encourage empathetic capabilities.</p>
<h2>Trust in Empathy to Revolutionize Your Cyber Culture</h2>
<p>All the work from the previous Secure Methodology steps will put you in a position to develop empathy with your technical people. Having this new approach should also help you make better hiring decisions in the future. The bottom line is that empathy isn’t an innate human quality. We have to learn it, and you’re in a position to help people do this. That’s good for them personally and professionally. Get more tips on empathy and exercises by reading <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="gac-footer-wrapper">
<div class="main-container"></div>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Secure Methodology&#x2122; Step Six: Empathy' data-link='https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='The Secure Methodology&#x2122; Step Six: Empathy' data-link='https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/">The Secure Methodology™ Step Six: Empathy</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create a Culture of Innovation in Cybersecurity</title>
		<link>https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/</link>
					<comments>https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 04 Dec 2022 16:29:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[ciso]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[tspitr]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2777</guid>

					<description><![CDATA[<p>Creating a cybersecurity culture isn’t a novel idea. It’s one that’s been around for some time, as the field and organizations realized that cybersecurity isn&#8217;t just about tools, protocols, and technical aptitude. Culture is much more about the people and, as a result, makes it much harder to build and sustain. People are unpredictable and don’t [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/">How to Create a Culture of Innovation in Cybersecurity</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Create a Culture of Innovation in Cybersecurity' data-link='https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2778 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-300x200.jpg" alt="Cybersecurity Culture" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Creating a cybersecurity culture isn’t a novel idea. It’s one that’s been around for some time, as the field and organizations realized that cybersecurity isn&#8217;t just about tools, protocols, and technical aptitude. Culture is much more about the people and, as a result, makes it much harder to build and sustain. People are unpredictable and don’t always have the skillsets to participate in culture. There’s an additional component of cultural manifestation, and it revolves around innovation. So, how do you develop a cybersecurity culture of innovation?</p>
<p>If it’s not a question you’re asking yourself as a cybersecurity leader, I would suggest you should. Innovation is the enemy of complacency. However, it requires cyber teams to look beyond their technical aptitude and leverage soft skills, which they may not have. It can seem like an uphill battle, but it&#8217;s worth considering the benefits it can bring your staff and business. Those advantages include satisfied employees, mitigation of risk, and the ability to meet continuous improvement goals.</p>
<p>So, let’s talk about fostering innovation in your cybersecurity culture.</p>
<h2>What Is a Cybersecurity Culture of Innovation?</h2>
<p>At the foundation of culture are people and behaviors. If those whose job is to protect data and networks have a closed mindset, fail to evolve their conceptions, or believe they are the smartest people in the room, culture will always be toxic. In these cases, risks become greater, turnover is high, and communication is nonexistent.</p>
<p>Conversely, a healthy culture has open-minded participants that want to work together effectively and continuously learn. That is an environment where innovation can thrive. It’s a place that welcomes new ideas, which can lead to a better security posture, engaged employees, and greater productivity. In this scenario, everyone benefits.</p>
<p>As you assess your current culture, you probably have gaps, some more than others. Filling those gaps aligns really well with the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, so I’ll be referring to that as I describe the steps to take. The Secure Methodology is a seven-step guide for cybersecurity leaders to leverage to develop the people skills of technical folks. These steps don’t focus on cyber skills but rather interpersonal ones, which is the core of culture.</p>
<h2>Building a Culture of Innovation</h2>
<p>No matter where you’re starting in the culture journey, these pivotal elements will be necessary to propel your organization into one that’s agile, forward-thinking, and connected. Here are the areas to help you formulate a plan.</p>
<h3>Cybersecurity Culture Involves Three Different Levels</h3>
<p>When considering any culture configuration, there are always three levels to consider, from the top to the individual. While they have different roles in the organization and responsibilities around cybersecurity, they must work together to maintain a culture.</p>
<h4>Leadership</h4>
<p>This segment is the c-suite, including the CEO and <a href="https://christianespinosa.com/blog/a-ciso-isnt-a-technical-role/" target="_blank" rel="noopener">CISO</a>. They must lead by example if they want the culture to permeate. They are top-level decision-makers, but those don’t happen in a vacuum. They need to understand risk and how cyber operations work, which requires clear, consistent communication from cyber teams and individuals. Unfortunately, communication is often the skill most lacking in technical employees. If those that set the strategy and budgets are only fed geek speak, culture leadership is working with a handicap.</p>
<p>Communication, of course, goes both ways. When leaders set a precedent on how they expect communication to flow, it can break down some barriers. In the end, the c-suite needs communication development, as well. It’s especially true regarding what questions they ask, which should be more granular than they might currently be.</p>
<h4>Team</h4>
<p>Your cyber team comprises people with various skill sets, experience, and expertise. If they can build a coalition that taps into this, they’ll be at a good place regarding culture. However, we’re talking about behavior, communication, and cooperation. Those things are usually the Achilles’ heel of any cyber team.</p>
<p>The team dynamic and evolving it is a big part of the Secure Methodology. Its guidance takes into account the typical lack of people skills and how that impacts cybersecurity culture. Too often, your team operates in silos and wants to continue in this way. Many times, it’s about a fear that others will find out they don’t know everything. Except that’s precisely the kind of mindset you need to innovate!</p>
<p>When working on culture at this level, the Secure Methodology is an excellent framework that you can use to cultivate communication skills, awareness, empathy, and more.</p>
<h4>Individuals</h4>
<p>The last layer of culture is the individual. What applies here is similar to the team level with caveats. The biggest of those is motivation, as each person has their own. At this level, as the leader, you must make specific connections to understand that individual’s capacity to change and grow. It’s the most challenging part of cultural shifts, and not every person on your team will be ready for this.</p>
<p>The Secure Methodology includes exercises throughout the seven steps to assist with this. How each person reacts to these will determine their long-term cultural fit.</p>
<p>Now that we’ve looked at each level of culture, here are some more tips you can use to further the pursuit of innovation.</p>
<h3>Find Cultural Evangelists</h3>
<p>Within your cyber staff, you’ll find those that are all-in on cementing culture as innovative. These people already have a good base of people skills and will prosper in this new dynamic. Assign those employees to be cultural evangelists. They can work together to develop training and upskilling opportunities. Since it’s coming from their peers, others may find this more inviting and appealing.</p>
<h3>Define the Language of Innovation</h3>
<p>Earlier I discussed the issues in <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a> among cyber professionals and mentioned their love of geek speak. Many use this language because they don’t want to reveal their weaknesses or limitations. It’s your job to banish this language and identify what the tenets of communication should be, which can include:</p>
<ul>
<li>Eliminating jargon that has no purpose</li>
<li>Encouraging and promoting active listening skills, which are just as important as language</li>
<li>Using inclusive language so that those individuals outside of cyber teams would understand</li>
<li>Reframing communication as a way to reach a result that technical people can relate to</li>
<li>Simplifying messaging</li>
<li>Praising positive communication moments to reinforce the value of it</li>
<li>Outlining how clear communication leads to innovation</li>
</ul>
<h3>Transform Fixed Mindsets into Growth Mindsets</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is the second step in the Secure Methodology, and it is critical to culture. People either have a fixed mindset or a growth mindset. You, of course, want professionals with the latter. That doesn’t mean those with fixed ones can’t evolve and grow, but it does take work.</p>
<p>A fixed mindset hampers your organization’s ability to be proactive in security and forward-thinking. These folks don’t want to innovate around this because it’s too unknown and uncertain. It will also erode culture. Here are some key steps to transform mindsets:</p>
<ul>
<li>Coaching and reflection: When communicating with a fixed mindset, asking the right questions matters. You need to take them back to a moment when their fixed mindset was a barrier. Such a moment could instigate reflection and more awareness of their behaviors.</li>
<li>Asking why: Again, questions posed to these folks can create aha moments. There’s an exercise called the <a href="https://christianespinosa.com/blog/finding-your-purpose-in-life-understanding-the-7-levels-deep-exercise/" target="_blank" rel="noopener">7 Levels Deep Exercise</a>, which I recommend. It will help uncover motivations.</li>
<li>Praising mindset changes: The third thing to do is to acknowledge and recognize when you see mindset shifts from fixed to growth. Something as simple as this can make a significant impact on future behavior.</li>
</ul>
<p>To round out this discussion, I want to leave you with some additional insights into innovation and security.</p>
<h2>Innovation and Security Aren’t Foes</h2>
<p>One of the biggest misconceptions in the cyber world is that security is a barrier to innovation. Such a perspective is dangerous to your culture and ability to defend data and networks in the cyber war. Security does not impede innovation. In fact, they work together very well with the proper perspective.</p>
<p>It’s not unlike the principles of DevSecOps, where development, security, and operations convene. In this strategy, security is part of the conversation from the beginning. It has equal weight with development and procedures, as it should. You cannot have innovation without security. Innovation, at its core, is about devising solutions that enable better results. If security is outside the innovation bubble, you may have a good idea, but it won’t come to fruition. It won’t be deployable and scalable.</p>
<p>So, you must build the case that they both can coexist harmoniously and should always have a link. Otherwise, you’ll waste time, money, and resources. If you leverage the tips and ideas from this post, you can easily demonstrate how vital security is to innovation.</p>
<p>If you’re ready to build your culture of innovation, you should learn more about the Secure Methodology, which you can find in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. Additionally, I have a <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>, which delves further into the seven steps. Check them both out today.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Create a Culture of Innovation in Cybersecurity' data-link='https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Create a Culture of Innovation in Cybersecurity' data-link='https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/">How to Create a Culture of Innovation in Cybersecurity</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2023 Cybersecurity Trends: What Every Cyber Professional Needs to Know</title>
		<link>https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/</link>
					<comments>https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 01:23:04 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[trends]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2774</guid>

					<description><![CDATA[<p>The world of cybersecurity is dynamic. It quickly changes because cybercriminals are relentlessly persistent in their goal to breach organizations and steal valuable data. Many of the biggest threats aren’t new, but they evolve as hackers become smarter and the systems to stop them become stronger. In the year ahead, cyber professionals will have the [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/">2023 Cybersecurity Trends: What Every Cyber Professional Needs to Know</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='2023 Cybersecurity Trends: What Every Cyber Professional Needs to Know' data-link='https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2775 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-300x197.jpg" alt="cybersecurity trends - christian espinosa" width="300" height="197" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-300x197.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-1024x673.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-768x505.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-1536x1010.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-2048x1346.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2022/12/kenny-eliason-mgYAR7BzBk4-unsplash-640x421.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />The world of cybersecurity is dynamic. It quickly changes because cybercriminals are relentlessly persistent in their goal to breach organizations and steal valuable data. Many of the biggest threats aren’t new, but they evolve as hackers become smarter and the systems to stop them become stronger. In the year ahead, cyber professionals will have the daunting task of defending their domain. So, what cybersecurity trends are on the horizon for 2023, and what strategies will you need to avert them?</p>
<p>Let’s find out.</p>
<h2>The Cybersecurity Trends: Existing and Emerging Threats Are on the Calendar</h2>
<p>Can you confidently say your cyber team is ready for the rapid changes in cybersecurity and the threat landscape? It’s hard to be certain. In fact, <a href="https://thoughtlabgroup.com/cyber-solutions-riskier-world/?roistat_visit=163429" target="_blank" rel="noopener">40% of chief security officers</a> agree they are unprepared. They cite many different reasons—inadequate budgets, talent shortage, and the fast pace of innovation. These and any other barriers will always exist regardless of if you have a blank check and a room full of experts.</p>
<p>To achieve a higher level of confidence in your organization’s ability to defend its digital turf, you must understand what the landscape looks like and admit that you can’t stop everything. Proactive measures to address the risky trends ahead are ideal but not always possible. In the following list of trends, I’ll give you the bad news on risk along with some good news about what to do about it that looks different than what you’ll hear any other cyber experts say.</p>
<h3>Hybrid Work Becomes the Norm, and Your Security Footprint Will Only Get Larger</h3>
<p>Unsurprisingly, <a href="https://christianespinosa.com/blog/remote-work-is-here-to-stay-the-impact-on-cybersecurity/?roistat_visit=163429" target="_blank" rel="noopener">hybrid and remote work</a> models are becoming the norm. Employees want flexibility and autonomy, and employers have to stay in tune with what they want to retain them. Cyber professionals, however, aren’t exactly thrilled with this. They, too, want to work remotely, but it’s expanded the security footprint of every organization.</p>
<p>It’s not the company-issued devices that are the weak link, as you still have control over those, ensuring that anti-malware and antivirus tools are running and that applications are up to date. The problem is personal device usage to check email, engage in chats, and access documents. That’s where incidents are most likely to occur, and you have no idea how protected these devices are or aren’t.</p>
<p>Connecting to networks with these devices could cause employees to be more susceptible to fall for phishing attacks, either by email or text message. These situations can also make a company more exposed to ransomware attacks. So, what is a cyber leader to do with the abundance of employees working from anywhere?</p>
<p>You can develop specific BYOD (bring your own device) rules and require that they use the Outlook App versus the email feature on smartphones. More stringent policies that exclude all personal devices are another option, but they will be met with lots of resistance.</p>
<p>Building a security-aware culture that your cyber employees spearhead could be a strategy that has more sustainability. It also requires your cyber staff to think like a typical user and explore what their day-to-day looks like regarding security. If your team has buy-in to this approach, it will be more authentic and resonate more than some top-down directive that most will disregard.</p>
<h3>Persistent Phishing: Hackers Use Many Angles to Hook Users</h3>
<p>You likely aren’t surprised that a variation of phishing is on the 2023 cybersecurity trends list. Hackers have become much more sophisticated in how they target phishing attacks. They narrowly focus on a specific organization and keep trying new approaches, hoping they eventually wear down a person’s defenses and get them to respond.</p>
<p>Persistent phishing is the new normal, and cyber criminals do more than just send you an email from a spoofed URL. There are elements of social engineering in these tactics, where a recipient wouldn’t think it odd to receive an email from a company they recently engaged.</p>
<p>These can work, but hackers are taking it to the next level by attempting to impersonate others from a company, often CEOs or other high-profile people, so the user will take notice and respond. Their common sense can out the door when they see an email that appears to be from the CEO.</p>
<p>Another new phishing tactic is sharing Google docs (or other public cloud storage) within emails, which can look legitimate. Many businesses use Google Drive as their file-sharing solution. Unfortunately, the security here is lax at best.</p>
<p>In the new era of persistent phishing, you’ll need to step up employee education to start. You can also use filtering tools to keep these emails from appearing in an inbox. AI tools can assist with this as well.</p>
<p>However, some things will get through your perimeter. Turn to your cyber team to manage this constant barrage of phishing scams and get their perspectives. Make this a regular discussion in team meetings. Look at your data and listen to your team. Not everyone is going to have a new idea. Many will just say to stay the course. You want your technical employees to be innovators, and you must create a space where that’s the culture. If you do, you may get some really good strategies to deploy to lessen the hook of phishing.</p>
<h3>IoT Vulnerability Grows</h3>
<p>No one would argue that IoT (Internet of Things) devices aren’t valuable. They are generating many quality data crucial in various sectors, from manufacturing to transportation to retail. However, these devices must connect to your network to access and aggregate that data. As a result, they’ve become a target for hackers to infiltrate an enterprise. The more devices you connect, the more potential for a backdoor to open for hackers.</p>
<p>The proliferation of IoT devices is now a part of many companies’ data strategies. The IoT devices consumers use have long had lax security measures in the name of convenience. In the commercial space, security has been more robust. The problem with IoT devices as a vulnerability often arises from the need for them to be interoperable with other applications. Connecting all these points can become burdensome, so there may be slips around security. Additionally, these devices aren’t always under the control of cybersecurity teams because they sit in warehouses, assets in the field, and store locations.</p>
<p>You need to have IoT security protocols in place, but what may be more important is confirming that the devices are continuing to abide by them. That will require your technical folks to communicate with non-technical employees in the field. They’ll need to ask questions and possibly go to the sites where they are. That’s outside the comfort zone of many, and one more reason why <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/?roistat_visit=163429" target="_blank" rel="noopener">developing soft skills for cyber employees</a> is critical. Without effective and consistent <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/?roistat_visit=163429" target="_blank" rel="noopener">communication</a>, you’ll just be counting the days until an IoT security incident occurs.</p>
<h3>Hackers Are Still Hungry for Your Data</h3>
<p>In most organizations, protecting assets is both digital and physical. The digital ones, being the data about customers, products, analytics, and everything else, have become much more valuable to criminals. The primary goal of hackers is to access your data and sell it. Data breaches are daily headlines now; there’s no surprise when we see the latest one.</p>
<p>Your organization has put all its efforts into protecting this data, but vulnerabilities still exist. It would be impossible to eliminate all of them. So, you’ve learned to live with risk, or have you? The biggest problem I’ve witnessed in my many years in cybersecurity is that those in charge of protecting your most valuable assets can’t admit that they don’t have all the answers. Many of them will do anything to hide uncertainty around this problem, and that mindset is dangerous.</p>
<p>If your cyber team can’t be honest that data breaches are still possible, they’ll be doing little to fortify your protections. They will be averse to applying new tools or strategies and unable to communicate and collaborate effectively. Hackers are the enemy, but the inside threat looms when you have employees that aren’t living in reality.</p>
<p>The best way to address this cybersecurity trend is by breaking norms and getting honest about who on your team is willing to grow and change their mindset. They may not fit the culture you want to cultivate if they can&#8217;t. They may have brilliant minds for technology, but their inability to think critically and with transparency means they are more of a risk than an asset.</p>
<h2>Addressing Cybersecurity Trends Requires an Agile Team</h2>
<p>The risks of modern business will only grow. Digital transformation is accelerating at light speed, and every organization wants to future-proof its technology and infrastructure. You should be on this path as well, with one major caveat. Even more important than the tools you use and the policies you set are the people behind them. You&#8217;ll be ahead of the curve if you have cyber talent on your team that’s agile and ready to pivot when needed.</p>
<p>You can learn how to develop this kind of team by following the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/?roistat_visit=163429" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a seven-step process to help technical folks gain soft skills that can lead to an improved security posture. Learn all about it in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/?roistat_visit=163429" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='2023 Cybersecurity Trends: What Every Cyber Professional Needs to Know' data-link='https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='2023 Cybersecurity Trends: What Every Cyber Professional Needs to Know' data-link='https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/">2023 Cybersecurity Trends: What Every Cyber Professional Needs to Know</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/2023-cybersecurity-trends-what-every-cyber-professional-needs-to-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>3 Reasons Why Current Cybersecurity Measures Aren’t Working and How to Fix Them</title>
		<link>https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/</link>
					<comments>https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 14 Nov 2022 21:13:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cyberwar]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2767</guid>

					<description><![CDATA[<p>Most organizations think they have a good approach to cybersecurity. They check all the boxes and hope for the best. However, cybersecurity is dynamic, with new threats always on the horizon. However, the traditional cybersecurity measures most businesses use don’t work. They often put too much emphasis on the technical element versus the human element. [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/">3 Reasons Why Current Cybersecurity Measures Aren’t Working and How to Fix Them</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='3 Reasons Why Current Cybersecurity Measures Aren’t Working and How to Fix Them' data-link='https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2768 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/11/cybersecurity-6949298_1280-300x222.png" alt="cybercrime" width="300" height="222" srcset="https://christianespinosa.com/wp-content/uploads/2022/11/cybersecurity-6949298_1280-300x222.png 300w, https://christianespinosa.com/wp-content/uploads/2022/11/cybersecurity-6949298_1280-1024x757.png 1024w, https://christianespinosa.com/wp-content/uploads/2022/11/cybersecurity-6949298_1280-768x568.png 768w, https://christianespinosa.com/wp-content/uploads/2022/11/cybersecurity-6949298_1280-640x473.png 640w, https://christianespinosa.com/wp-content/uploads/2022/11/cybersecurity-6949298_1280.png 1280w" sizes="(max-width: 300px) 100vw, 300px" />Most organizations think they have a good approach to cybersecurity. They check all the boxes and hope for the best. However, cybersecurity is dynamic, with new threats always on the horizon. However, the traditional cybersecurity measures most businesses use don’t work. They often put too much emphasis on the technical element versus the human element. That’s where things are going awry.</p>
<p>The real reason cybersecurity measures are failing is because of a people problem. It’s the core foundation of my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. Correcting this path requires the initial acknowledgment that you must develop your people into more than just technical minds. They need soft skills to adapt to a changing environment that will enable them to be strong communicators and collaborators.</p>
<p>In this post, I’ll review the latest data on cybersecurity risk and explore how to pave a new path to a more secure and agile system.</p>
<h2>The Latest Cybersecurity Data</h2>
<p>Threats continue to mount on the cybersecurity front. Cybercriminals have become more sophisticated and advanced. As a result, your people become either the strongest or weakest link in your cybersecurity measures. Here are some of the latest data points on the rate of crimes and how companies are dealing with it (or not).</p>
<ul>
<li><a href="https://www.weforum.org/agenda/2020/12/cyber-risk-cyber-security-education" target="_blank" rel="noopener">95%</a> of cyber breaches are the result of human error.</li>
<li><a href="https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50" target="_blank" rel="noopener">68%</a> of business leaders said their cybersecurity risk is increasing.</li>
<li><a href="https://www.cisco.com/c/dam/m/en_hk/ciscolive/2020-ciso-benchmark-cybersecurity-series.pdf" target="_blank" rel="noopener">42%</a> of companies are suffering from cyber fatigue.</li>
<li>The <a href="https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/" target="_blank" rel="noopener">breach breakdown for 2021</a> was 40% phishing attacks, 11% malware, and 22% hacking.</li>
<li>There were <a href="https://www.idtheftcenter.org/post/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises/" target="_blank" rel="noopener">1,862 reported data breaches</a> in 2021, surpassing the previous record of 1,506 in 2017.</li>
<li>The average time to identify a breach was <a href="https://www.ibm.com/downloads/cas/JDALZGKJ" target="_blank" rel="noopener">212 days</a> in 2021.</li>
<li>The average data breach cost in 2021 was <a href="https://www.ibm.com/downloads/cas/JDALZGKJ" target="_blank" rel="noopener">$4.24 million</a>, the highest ever.</li>
</ul>
<p>From these statistics, it’s easy to see that cybersecurity is a challenge for any organization, regardless of its maturity. 2021 was a record year, and not in a good way. It’s also critical to look at the numbers on why these incidents occur —human error. On top of that, you have apathy circulating in cyber teams, which is just as dangerous as hackers.</p>
<p>So, how do you avoid becoming a statistic?</p>
<h2>It’s Your People, Not Your Budget</h2>
<p>Many companies continue to increase their cybersecurity budget. These investments can be critical to the long-term protection of data and networks. They, however, don’t usually correlate with the development of your people. If you raise your spending, you’ll be better at fighting cybercrime but may not have the best-prepared team to back you up.</p>
<p>The point is that unlimited spending doesn’t make you more secure. You can have the best technology and a full staff, but you’re still weak if your people don’t work well together or with the rest of the company. If your employees have rigid mindsets about cybersecurity measures and won’t deviate from them, that’s a significant issue.</p>
<p>You likely don’t think of your team as incompetent, and no one is saying they are. They may have substantial experience and technical aptitude. However, it doesn’t cover up the fact that the profession is in a precarious position right now. There are three main reasons your cybersecurity measures aren’t working.</p>
<p><strong>First</strong>, you have the issue of <a href="https://christianespinosa.com/blog/how-to-recruit-and-hire-cybersecurity-professionals-to-help-you-win-the-cybersecurity-war/" target="_blank" rel="noopener">recruitment and retention</a>. The field is in desperate need of new talent. Unfortunately, your choices may be slim since it’s a candidate-driven job market. When you do look for more people, are you only concentrating on their technical experience and expertise? Are people skills even on the list?</p>
<p><strong>Second</strong>, there is a large group of cybersecurity professionals that have to be the smartest person in the room. Technical folks often think they are the only ones who know the answer and fail to communicate and cooperate. They are punching holes in the ship and waiting for it to sink. They believe they alone will be able to rescue it.</p>
<p><strong>Third</strong>, those entering the field may have credentials or degrees but aren’t ready to defend the company against cyber warfare. Again, it’s not that they don’t know the technical side of things. Most often, they aren’t prepared to work cohesively and amend their very narrow views. Further, most organizations aren’t doing anything to address this.</p>
<p>With all these challenges related to your people regarding cybersecurity measures, it’s time to pave that new path. As someone who has been in the industry in many different roles, this shift is hard. You, as a leader, have to commit, and so do your employees. However, I’ve tried to make it easy with a solution I developed called the <a href="https://christianespinosa.com/blog/category/secure-methodology/" target="_blank" rel="noopener">Secure Methodology</a>. It’s a seven-step approach that focuses on people skills development. When your team has the technical and people skills, your organization can be in a better position to ward off cyber-attacks.</p>
<p>Let’s look at each step and how it relates to developing your people.</p>
<h2>The Secure Methodology: How to Solve the People Problem in Cybersecurity</h2>
<p>Each step in the Secure Methodology ties together, building on each other. Some steps take longer than others, but you can right your ship when you commit to them.</p>
<h3>Step One: Awareness</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a> includes self and others. First, people must understand what behaviors they can control and the impact of those behaviors. This can be difficult to comprehend for many technical people who often seem blissfully unaware. Getting in touch with your persona and how you affect the world is critical.</p>
<p>Second, to gain better soft skills and be collective problem-solvers, you must be aware of others. That requires communicating with them, asking questions, and avoiding making assumptions.</p>
<h3>Step Two: Mindset</h3>
<p>A fixed mindset is a big problem for cyber professionals. The objective is to move from fixed to growth. Many of your people will think they are already there because they can learn new technology, but we’re talking about being growth-minded in terms of soft skills.</p>
<p>At its core, a <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">growth mindset</a> welcomes the ability to change. Without this belief, people won’t grow. However, they also have to realize that change can be slow, but progress is progress, no matter how small.</p>
<h3>Step Three: Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> also has multiple layers. First, technical folks need to have self-acknowledgment and believe in their capabilities. Second, leaders need to acknowledge the work of their people and what they’ve accomplished. When you do this, people are more open to you and to change. Third, you should continue to acknowledge them for all the adjustments they make in the journey to achieve a higher level of people skills.</p>
<h3>Step Four: Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is a part of every step and is often the most challenging for technical people. Communication includes word choice, the way you say it (tone), and body language. Communication is also about being active listeners.</p>
<p>Your cyber team may be very articulate and well-versed in technical speak, but that doesn’t make them good communicators. Honing these skills has such positive effects. Everyone can relate better, understand what’s important, work toward solutions together, and be more compassionate in how they talk to one another.</p>
<h3>Step Five: Monotasking</h3>
<p>Concentrated work is vital in cybersecurity measures. Its opposite — multitasking — can be a risk factor. When people <a href="https://christianespinosa.com/blog/monotasking-vs-multitasking/" target="_blank" rel="noopener">monotask</a>, the quality of work increases. The quantity may decrease, but scattered attention increases human error risk.</p>
<p>It’s hard to monotask with all the stimuli — emails, chats, phone calls, etc. So, your team can set a specific time to work on tasks and remove distractions to monotask effectively.</p>
<h3>Step Six: Empathy</h3>
<p>A lack of empathy is usually a lack of connection. Cyber professionals often can’t see past their own challenges. They have a self-centered view that doesn’t consider the plight of others. This type of thinking can lead to quick, inaccurate conclusions. As a result, it impacts communication and collaboration.</p>
<p><a href="https://christianespinosa.com/blog/empathy-vs-sympathy/" target="_blank" rel="noopener">Empathy</a> is about understanding someone else’s perspective. It’s not the same as sympathy. As a leader, you should embody empathy. That can help others transition their thinking, which often leads to better results and mitigated risk.</p>
<h3>Step Seven: Kaizen</h3>
<p>The last step is kaizen, a Japanese term that is the philosophy of continuous improvement of operations involving all employees. It’s all about the progression that people make every day, and when they are on this path, they are more engaged and satisfied. When people can come to this way of thinking, they are growing and contributing. However, it requires practice and a stable resolve. It’s also crucial to hold to this even when things are uncertain, which is often the case in cybersecurity and life.</p>
<h2>Improve Your Cybersecurity Measures With the Right Guidance</h2>
<p>The seven steps are a kaizen of their own. Learning them and bringing them to your team is all about continuous improvement that includes all members. Some steps will be easier than others for some people. You’re there to go through them as well and stand by your employees who are willing to evolve!</p>
<p>You can learn more about each step and how to execute them, and find exercises in my book, <em>The Smartest Person in the Room</em>. <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">Read it today to start the journey</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='3 Reasons Why Current Cybersecurity Measures Aren’t Working and How to Fix Them' data-link='https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='3 Reasons Why Current Cybersecurity Measures Aren’t Working and How to Fix Them' data-link='https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/">3 Reasons Why Current Cybersecurity Measures Aren’t Working and How to Fix Them</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/3-reasons-why-current-cybersecurity-measures-arent-working-and-how-to-fix-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
