<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>secure methodology Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/secure-methodology/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/secure-methodology/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Sun, 17 Sep 2023 19:28:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>secure methodology Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/secure-methodology/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?</title>
		<link>https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/</link>
					<comments>https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:28:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2858</guid>

					<description><![CDATA[<p>Threat intelligence offers a unique approach to cybersecurity in the 21st century. It provides visibility and helps eliminate blind spots across the threat landscape. Cyber professionals still have to wear their “detective” hats to pull together insights, but they now have a better map to use. You’ll be able to observe cybercriminals and understand their [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/">What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?' data-link='https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="size-medium wp-image-2859 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-300x199.jpg" alt="threat intelligence" width="300" height="199" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-300x199.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-1024x680.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-768x510.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-1536x1020.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-2048x1360.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/j-schiemann-HvaMFqvBbrE-unsplash-640x425.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Threat intelligence offers a unique approach to cybersecurity in the 21st century. It provides visibility and helps eliminate blind spots across the threat landscape. Cyber professionals still have to wear their “detective” hats to pull together insights, but they now have a better map to use.</p>
<p>You’ll be able to observe cybercriminals and understand their attack strategies with this clear understanding of their capabilities. That’s the opportunity, but you may not be getting the full value of threat intelligence in your organization. Its outcomes range, with some businesses heralding it while others feel overwhelmed by it.</p>
<p>In this post, we’ll review what threat intelligence is, its current impact, and what it all means to your cyber team.</p>
<h2>What Is Threat Intelligence?</h2>
<p>Threat intelligence describes the activities of collecting, processing, and analyzing data to understand a cyber criminal’s motives, targets, and attack behaviors. It should empower an organization to make quicker, more informed, data-driven security decisions. It can also help change your position to be more proactive than reactive.</p>
<p>There are three areas of threat intelligence:</p>
<ul>
<li><strong>Tactical:</strong> This segment focuses on malware analysis and enrichment and examines threat indicators around your cyber defenses.</li>
<li><strong>Operational:</strong> This category covers understanding the capabilities, infrastructure, and techniques of threat actors and leveraging them to conduct more targeted cyber operations.</li>
<li><strong>Strategic:</strong> This classification involves a high-level understanding of trends and motives and then using it to improve your strategy and decision-making.</li>
</ul>
<h2>Why Does Threat Intelligence Matter?</h2>
<p>Cyberattacks are constant and unrelenting. They are always in a state of growth and flux, with new attack methods springing up every day. Your good guys are constantly at war with hackers, and threat intelligence gives you an edge.</p>
<p>It can play an essential role in cybersecurity, including:</p>
<ul>
<li>Offering information on the unknown, which much of the cyber landscape is, to support better decisions</li>
<li>Empowering cyber stakeholders to uncover the motives of threat actors and the tactics, techniques, and procedures they use</li>
<li>Ensuring cyber professionals are aware of the perspective and motivations behind hacker decision-making</li>
<li>Providing essential information to the business side of a company, so they invest in cybersecurity and mitigate risk</li>
</ul>
<p>When you use threat intelligence, you can tailor your defenses, which builds cyber resilience. While many see its value, it’s not as easy to realize it. Most cyber teams are still at the basic level, such as integrating data feeds related to threats into existing networks, firewalls, IPS (intrusion prevention systems), and SIEM (security information and event management).</p>
<p>What do those using it actually experience?</p>
<h2>How Are Organizations Using Threat Intelligence?</h2>
<p>In a recent <a href="https://www.scmagazine.com/whitepaper/threat-intelligence-eyes-on-the-enemy" target="_blank" rel="noopener">cyber risk survey</a>, professionals had differing views of threat intelligence. Many stated it’s a significant support for cyber resilience, enabling them to be more proactive. Its other positive reviews include its ability to deliver insights and visibility. It allows greater awareness of the mind of a hacker, enabling cyber professionals to know what to look for in the <a href="https://christianespinosa.com/blog/does-your-cyber-team-truly-understand-your-threat-landscape/" target="_blank" rel="noopener">threat landscape</a>.</p>
<p>This sentiment wasn’t echoed by everyone. Other companies said it overwhelmed their team with all the alerts. Some also indicated that it produced failures in managing third-party risk.</p>
<p>Overall, a thread throughout respondents was that adapting is key to outmaneuvering threat actors. This approach requires several things, including:</p>
<ul>
<li>Automating some parts of threat detection</li>
<li>Collecting more data about threats for human analysis</li>
<li>Investing in tools and technology to support threat intelligence and integrating them into the enterprise</li>
<li>Improving the <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">soft skills of cyber professionals</a> so they can effectively communicate the intelligence and act on it</li>
</ul>
<p>These varied viewpoints put into focus where the opportunities and challenges are.</p>
<h2>The Opportunities and Challenges of Threat Intelligence</h2>
<p>In evaluating the current use cases and value of threat intelligence, you have to account for the possibilities and the problems. Let’s look at those:</p>
<h3>How You Use Data Determines Its Value</h3>
<p>Most threat intelligence data comes from internal network traffic, not external sources like the dark web. As a result, its value often aligns with two areas of cybersecurity — improving incident response and internal awareness.</p>
<p>Those are critical areas of your strategy and demonstrate the ability to be proactive. Enhancing your plans for reacting to threats fits in this category. The actual response is not, so the benefit is being more prepared.</p>
<p>With internal awareness, you are using the data to predict where threat actors will attack. How your technical folks use it could be the problem. In general terms, those in the field lack awareness of themselves and others. They have narrow perspectives and think in ones and zeros. The most technically adept cyber professional can still falter here because they aren’t adapting their mindset to align with what hackers are doing right now. Thus, you have to help them develop awareness for this intelligence to be actionable.</p>
<h3>Automating Threat Intelligence Reduces Manual Work, But Human Analysis Is Still Necessary</h3>
<p>There are lots of great systems that can automate threat detection and respond to it. It’s an early warning tool that puts less strain on your team, which may already be short-staffed. These tools are helpful and practical, but you still need human intelligence for analysis and improvement of strategies.</p>
<p>This is going to require <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/" target="_blank" rel="noopener">communication</a> and collaboration inside your team and with other parties. For the analysis to be valuable, people have to think critically and creatively about the threat landscape. It’s not just a technical assessment of the information.</p>
<h3>Threat Intelligence Offers a Better Way to Update Your Playbook</h3>
<p>The policies, protocols, and strategies of cybersecurity reside in your playbook. It’s a fluid document that evolves as threats and risks do. What you learn from threat intelligence has a big impact on this playbook.</p>
<p>When your playbook goes through these updates, you also have to change the behavior of your people in relation to them. Change is hard for anyone or any organization. It may be even more difficult for technical folks. They like to keep things the same because it’s comfortable and gives them a better sense of control. Mindsets like these don’t help you manage risks and threats, so more development needs to happen in your people to align with what you get from threat intelligence.</p>
<p>In reviewing these components, you can see that threat intelligence is more than data, monitoring, and analysis. The human element is critical for it to really move your cyber operations forward. Developing specific attributes and abilities in the realm of people skills is just as necessary as implementing tools and technology.</p>
<p>As a result of this complex ecosystem, you can improve on the people part with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step program I developed to help cyber leaders do just that.</p>
<h2>Threat Intelligence and the Secure Methodology</h2>
<p>Having more data and information in cybersecurity doesn’t automatically mean it’s usable, practical, or seen as valuable. Technical people don’t deny data and its insights, but they can overlook them based on their own biases and fears. The Secure Methodology offers a way to overcome those. Here’s a quick introduction to the seven steps, which are the central theme in my book, <em><a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">The Smartest Person in the Room</a>:</em></p>
<ul>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>:</strong> I mentioned awareness earlier and its importance in threat intelligence. It’s where the Secure Methodology begins, with the objective of opening people up to new perspectives, including those of cybercriminals. You can do this by coaching your people in a personalized way by understanding their motivations.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a>:</strong> Next is mindset, which is also very critical. You want to assist people in expanding their mindset from one that’s fixed to one that’s growing. Your people have to break outside of the black-and-white thinking that doesn’t allow for new ideas. The Secure Methodology offers exercises on reflection and accountability to foster this shift.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a>:</strong> In this phase, you must rethink how you acknowledge the work of your team (or start if you don’t do it at all). When you do this outwardly in response to how someone took intelligence and made a difference, it demonstrates to everyone that this is a means to an end. It also builds rapport and trust.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a>:</strong> Transforming technical people into better communicators isn’t easy, but it is always necessary. Open and transparent communication regarding threat intelligence is essential for it to be usable to deter hackers and thwart attacks.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a>:</strong> We are an industry of multitasking, but it’s not always a great way to be productive. Instead, encourage team members that while they are assessing threat intelligence, they should do only that and not be distracted, which triggers more critical thinking.</li>
<li><strong><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a>:</strong> Step six refers to others being able to put themselves in the place of others. It aligns with all the stages before it and is crucial in deciphering and acting on threat intelligence. Your people have to think like hackers.</li>
<li><strong>Kaizen:</strong> The final stage is a Japanese term that translates to “continuous improvement.” It’s a step that never ends because cybersecurity will always need to evolve, and threat intelligence is a key driver for continuous adaptation.</li>
</ul>
<p>By applying the Secure Methodology, your organization can derive more value from threat intelligence, leading to better defenses. Get started today by <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">reading my book</a> and exploring the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?' data-link='https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?' data-link='https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/">What Is Threat Intelligence, and Why Is It Important in Supporting Your Cyber Team?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/what-is-threat-intelligence-and-why-is-it-important-in-supporting-your-cyber-team/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</title>
		<link>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/</link>
					<comments>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:09:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity skills gap]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2852</guid>

					<description><![CDATA[<p>The cybersecurity workforce landscape is at a serious threat level. Millions of jobs are unfilled, and most companies state they can’t find qualified cybersecurity job candidates. If we continue on this trajectory, risks will rise and jeopardize the data and networks of thousands of businesses. As an industry, we must change how we hire, recruit, [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/">How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2853 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-300x200.jpg" alt="cybersecurity training" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/campaign-creators-gMsnXqILjp4-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />The cybersecurity workforce landscape is at a serious threat level. Millions of jobs are unfilled, and most companies state they can’t find qualified cybersecurity job candidates. If we continue on this trajectory, risks will rise and jeopardize the data and networks of thousands of businesses.</p>
<p>As an industry, we must change how we hire, recruit, and develop cybersecurity talent. <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">Expanding how you consider someone qualified</a> is a necessary step. Seeing the potential in someone who doesn’t necessarily check all the boxes is one way to address the shortage. For this to work long-term, upskilling must be a part of your employee development strategy.</p>
<p>This upskilling includes hard and soft skills because cyber job candidates need both to thrive. Let’s review the current cybersecurity workforce challenges, the facts about the skills gap, and how to upskill new hires.</p>
<h2>Cybersecurity Workforce Challenges</h2>
<p>Cybersecurity job growth is a bright spot in the tech industry, with many opportunities for someone to have a career that pays a good wage and is in demand. However, the field is currently experiencing significant shortages.</p>
<p>According to the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">(ISC)2 2022 Cybersecurity Workforce Study</a>, the global cybersecurity workforce grew to over 4.6 million, which is an 11.1% year-over-year increase. Unfortunately, 3.4 million jobs remain empty. As a result, many companies and cyber firms are operating without enough people, which can directly impact risk.</p>
<p>So, why is the industry struggling with recruitment and retention? It’s a complicated ecosystem, so there’s no easy answer. The cybersecurity workforce shortage is the result of several trends and occurrences, including:</p>
<ul>
<li>The cyber threat landscape is rapidly expanding, driving the demand for cyber professionals in all industries and businesses. In part, this is a supply and demand issue.</li>
<li>People leave the industry due to <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a>. It’s a common problem in a high-stress environment, and most organizations aren’t doing enough to mitigate this. Without proper staffing, people have to do more work, which increases the feeling of burnout.</li>
<li>Younger generations aren’t choosing cybersecurity as a career. Only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cybersecurity workforce is 34 or younger</a>. The industry needs to find ways to connect with students to attract new people into the field.</li>
<li>Many organizations place too much emphasis on degrees and certifications, which often don’t correlate to having the right abilities, aptitudes, and attitudes. As a result, companies reject those who could be a better fit but need some upskilling.</li>
</ul>
<p>If the industry remains on this path, the shortages will only worsen. Intervention is necessary for the entire community. What you can do to ensure your data and networks remain under protection is to focus back on <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">skills-based hiring</a>.</p>
<h2>The Cybersecurity Skills Gap</h2>
<p>We can’t talk about the labor shortage without addressing the <a href="https://christianespinosa.com/blog/is-the-cybersecurity-skills-gap-fact-or-fiction-it-depends-on-the-skills/" target="_blank" rel="noopener">cybersecurity skills gap</a>. It would be great if every cybersecurity job candidate had years of experience and an array of skills. However, cyber leaders agree that a skills gap exists. According to the same workforce study cited above, 55% of hiring managers say applicants don’t meet the criteria of being qualified. The deficit here includes:</p>
<ul>
<li>Hands-on training and experience</li>
<li>Credentials</li>
<li>Degrees</li>
<li>Recommendations</li>
</ul>
<p>These things don’t always indicate that the person can do the job. The same study also looked at specific skills with gaps, which are the ones that matter in terms of upskilling. The skills in demand and often lacking are:</p>
<ul>
<li>Soft skills (e.g., communication, leadership, adaptability)</li>
<li>Cloud computing</li>
<li>Security controls (e.g., network, application, endpoint, implementation)</li>
<li>Coding skills</li>
<li>Software development-related topics (e.g., machine code, testing, languages, deployment)</li>
<li>Data-related topics (e.g., characteristics, collection, classification, processing, structure)</li>
<li>Network-related topics (e.g., architecture, networking components)</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Computing devices (e.g., software, hardware, file systems)</li>
</ul>
<p>It’s a mix of soft and hard skills, but the latter was at the top of the list. It’s possible to develop both of these in an individual who has the desire to learn and evolve. Those abilities aren’t always apparent in technical folks. However, if they are willing and have a good foundation to start from, upskilling can be the key to keeping great people long-term and continuously improving.</p>
<p>So, what’s the upskilling plan?</p>
<h2>Building an Upskilling Plan for Cybersecurity Job Candidates</h2>
<p>The first part of the plan should start with a clean slate of qualifications. Define what is imperative and what someone can learn over time. Get to the root of what makes someone a good cyber professional and what attributes they should possess.</p>
<p>In upskilling, you’ll have two paths — technical and soft skill development.</p>
<h3>Addressing Technical Upskilling</h3>
<p>In looking back at the list of skills above, those in the technical category are pretty standard. That’s a good starting point, but you should also consider the future and add training around AI tools and use cases. The curriculum will evolve as the threat landscape does.</p>
<p>How will they learn these skills? You need to create a learning environment for employees. This can include hands-on training internally, certification classes that you determine as high-quality, and other resources. Making continuing skill development part of your recruitment and retention strategy can attract people to your company and ensure you keep high-performers.</p>
<p>The other part of this is soft skills, and the plan to develop these in technical folks can be more demanding and challenging.</p>
<h3>Improving Soft Skills in Cybersecurity</h3>
<p>Soft skill development is a path that requires commitment and consistency. It’s about behavior change, and there can be many growing pains. First and foremost, you want to find cybersecurity job candidates who are open to this. Sometimes that might not be obvious until you have a few conversations and try to understand what motivates them and if they can handle flexibility.</p>
<p>Transforming anyone into a better communicator and collaborator isn’t easy. With technical folks, it can be harder, as they often have fixed mindsets, see things as black-and-white, and believe they know all the answers. These people could have impressive technical prowess, but these attitudes won’t fit into a healthy culture where everyone is open and transparent. Are they lost causes? No, but again, they must want to change.</p>
<p>You can drive this change with guidance from the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step process that I developed because of the soft skill deficiency and recognizing its value in creating and maintaining a strong cybersecurity posture.</p>
<h2>The Secure Methodology: The Framework for Soft Upskilling</h2>
<p>Here’s a preview of each step and how you can leverage it to improve the soft skills of technical people:</p>
<h3>Awareness</h3>
<p>The guide starts with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, with the objective of being mindful of the self and others. When this is missing, people don’t see or understand how their behavior affects others. If this is rampant in a culture, conflict and resentment build. With exercises on reflection and perspective, people can get to a state of awareness that improves how they interact with others.</p>
<h3>Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is crucial in soft skills, and every person on your team needs an open one. A person cannot change without it. Key to this is defining someone’s motivations and why they respond as they do. In this step, the <a href="https://christianespinosa.com/blog/finding-your-purpose-in-life-understanding-the-7-levels-deep-exercise/" target="_blank" rel="noopener">7 Levels Deep Exercise</a> is a good foundation.</p>
<h3>Acknowledgment</h3>
<p>The third step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>. There are several layers to this step. First, it encompasses feedback and its value to cyber professionals. Your staff wants to hear from you about accomplishments and how they are helping the organization. Not all feedback will be positive, and accountability matters, but you should do this in one-on-one conversations. Ensuring that your team feels appreciated and valued will prompt them to adapt with less friction.</p>
<p>Second is acknowledging that cybersecurity is difficult and filled with uncertainty. You set the tone of the culture, and if you do this well, your team will follow, enhancing their people skills.</p>
<h3>Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the fourth step and the most essential soft skill for anyone. It’s never a bad investment to develop someone’s communication skills. Just be clear on what this means. Being a good communicator and articulate aren’t the same thing. Yes, what we say matters, but most communication isn’t verbal.</p>
<p>An excellent communicator is clear, concise, and transparent. They also recognize the needs of the audience and listen to them fully. Assessing candidates based on communication skills can involve prompting them to share real-life stories about how they used it to overcome challenges.</p>
<p>Listen for their use of geek speak or overly technical terms. This could be a red flag if they aren’t willing to drop the posturing.</p>
<h3>Monotasking</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>; it’s a soft skill you don’t hear much about. Most technical people have been doing the opposite — multitasking. Many believe this is a valuable trait. It is important to be able to juggle priorities, but blocking off specific time to concentrate on one task can make people more productive and eliminate feelings of being in fight-or-flight mode all the time. They will need to act quickly at times and move around priorities, but encouraging monotasking lets people think more critically and problem-solve more effectively.</p>
<h3>Empathy</h3>
<p>In the Secure Methodology, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">cognitive empathy</a> is the sixth step. This type of empathy is the ability to understand another’s feelings and perspectives. It’s crucial to a person’s ability to be a great communicator and collaborator. Much of this relates to stripping down egos and dynamics of “me vs. them.” You can’t have a successful cybersecurity strategy and team without empathy.</p>
<p>Human connection is vital in cybersecurity, and in this phase, you support people to become more empathetic.</p>
<h3>Kaizen</h3>
<p>The last step is kaizen. It’s a Japanese term meaning “continuous improvement.” It’s the step that never ends and focuses on adaptability and flexibility. When you reach this phase, your staff should be in a state where they want to continue to develop their soft skills and transfer them to others.</p>
<h2>Upskill Cybersecurity Job Candidates with the Secure Methodology</h2>
<p>The Secure Methodology provides a framework and tools to transform candidates lacking skills. It’s a proven way to change behavior, with benefits for the person and the organization.</p>
<p>Get more insights on each step by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. You can also explore how to apply it in the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators' data-link='https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/">How to Upskill Cybersecurity Job Candidates to Transform Them Into High-Performers and Excellent Communicators</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-upskill-cybersecurity-job-candidates-to-transform-them-into-high-performers-and-excellent-communicators/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</title>
		<link>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/</link>
					<comments>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 19:03:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2850</guid>

					<description><![CDATA[<p>Building a cybersecurity team comes with many challenges. So many factors are impacting the ability to do this effectively and efficiently. The cybersecurity workforce shortage means more competition for talent, but you can’t be confident all those vying for positions have the hard and soft skills to succeed and thrive. On top of all this, the threat [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/">How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2851 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-300x200.jpg" alt="cybersecurity team" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-1536x1025.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/annie-spratt-QckxruozjRg-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Building a cybersecurity team comes with many challenges. So many factors are impacting the ability to do this effectively and efficiently. The <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/" target="_blank" rel="noopener">cybersecurity workforce shortage</a> means more competition for talent, but you can’t be confident all those vying for positions have the hard and soft skills to succeed and thrive. On top of all this, the threat landscape keeps expanding as cybercriminals develop new tools and strategies to exploit weaknesses.</p>
<p>So, what can you do as a cybersecurity leader? As someone who’s been in the position, I have some insights to share on how to accomplish this. Keep reading for strategies, tips, and info about the Secure Methodology as a framework for constructing a cybersecurity team.</p>
<h2>Steps to Take to Build a Sustainable Cybersecurity Team</h2>
<p>Where should you start on this journey? Should you jump right into recruiting and hiring? I would urge you to first develop a strategy, define the tools you need, and create some principles for the culture you hope to cultivate.</p>
<p>To do this, follow these steps:</p>
<h3>Acknowledge that cybersecurity is a people problem and let that guide your strategy.</h3>
<p>It’s easy to blame the breaches and attacks in the cyber world on technology. Without it, there wouldn’t be an issue, but categorizing it only this way is a fallacy. Behind every attack is a person. Every defense also has human intelligence executing it, and most causes of cyber incidents relate to errors, mistakes, or intentions of someone.</p>
<p>It’s very much a people problem, and that fundamental principle should guide your team-building strategy. Yes, there are lots of great cyber tools out there that are leveraging AI and enabling automation. You need those, but the people charged with managing them need knowledge and skills to do so. Those skills must include soft ones, as the human issue in cybersecurity won’t find a resolution without staff that cannot communicate or collaborate.</p>
<p>There is a current soft skills gap in every industry, including cybersecurity. The people who are a good fit for your roles may not possess these. If they are curious to learn and motivated to evolve, they can be great additions to your team.</p>
<h3>Ensure the bad guys are cybercriminals, not internal.</h3>
<p>Another element of creating a cybersecurity team is to eliminate the “us vs. them” mentality that often happens between technical and business folks. You’re all on the same side, but much of that can get lost in translation. The business side may not take cybersecurity as seriously as they should, frustrating cyber professionals. There’s animosity on your side, too, as your team may resent others, especially when they have questions and challenges.</p>
<p>It&#8217;s critical to put the target back on the real enemy’s head. There must be balance and cooperation between business and technical groups. You don’t want to bring someone on who fails to understand the perspective of others. Employees like this will degrade the trust and credibility of your team and do anything to avoid being wrong. You can spot this in how they respond to queries about collaborating and if they do a lot of posturing.</p>
<h3>Look for a wide range of skills.</h3>
<p>You have to define the requirements you want in your team, which should include various abilities and aptitudes. In doing so, you have to <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/" target="_blank" rel="noopener">shift your definition of qualified</a>. The majority of cyber leaders believe applicants don’t have the right qualifications, according to the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">State of Cybersecurity 2022 report.</a> What they say people lack includes hands-on experience and training along with credentials and degrees.</p>
<p>The hands-on part makes sense because you want people to have real-world interactions. One cannot get this without opportunity. It’s especially true for younger generations, who we need to join the field. These people could be bright and eager to learn, making them excellent hires.</p>
<p>Credentials and degrees can demonstrate skill sets but not always. Often, people look great on paper because of these achievements but lack the knowledge to apply what they learned in classes. The learning may also be insufficient, especially for courses that validate aptitude based on multiple-choice tests. You can only be confident in one thing for those passing these — they can memorize answers. Beware of these “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>.”</p>
<p>Instead, use skills-based hiring models. This approach focuses on a candidate with specific competencies that directly relate to the work. It involves soft and hard skills.</p>
<h3>Develop your recruitment strategy on skills-based hiring.</h3>
<p>Building a strong, multi-dimensional team requires a mix of people. Not everyone has to be strong in everything. You can create a staff who can learn from each other and you.</p>
<p>With skills-based hiring, you can:</p>
<ul>
<li>Identify people with abundant soft skills and a desire to improve their technical skills.</li>
<li>Find candidates who have familiarity in all areas of cybersecurity but don’t have real-world experience yet and develop them.</li>
<li>Attract people newly entering the workforce and those starting over, which can help you build that right mix.</li>
<li>Assess people holistically instead of only looking at their technical aptitude.</li>
<li>Reduce barriers for people getting a shot at a cyber career who didn’t attend college.</li>
</ul>
<p>Putting together a team of cyber professionals in this manner can lead to a strong and healthy culture. It can also decrease risk and ensure that <a href="https://christianespinosa.com/blog/why-cybersecurity-deserves-a-seat-at-the-leadership-table/" target="_blank" rel="noopener">cybersecurity has a seat at the table</a> to influence business decisions. You simply won’t be able to do that if you hire with bias found in the old ideals of “qualified.”</p>
<p>All these ideas and opportunities align directly with the Secure Methodology, which is a seven-step process of transforming people with purely technical and closed mindsets into great communicators and partners.</p>
<h2>The Secure Methodology and Building Your Cybersecurity Team</h2>
<p>The Secure Methodology is the foundation for creating and maintaining a team that thrives and is adaptable. I based it on my own experiences and observations of what was going wrong in cybersecurity, which is a people problem.</p>
<p>Here’s a glimpse of each step and how it can support your hiring strategy:</p>
<h3>Awareness</h3>
<p>The process kicks off with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>. It pertains to both self and others. Without it, people don’t understand the impact of their behavior on relationships and communication. It’s about opening up people’s blind spots.</p>
<p>Will every candidate already have awareness? And how do you evaluate this? Most people lack awareness to some extent, so it often requires development. You can assess someone’s state of awareness or willingness to get there by asking them to reflect and tell you about a challenging time and how they handled their interactions with others.</p>
<h3>Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is critical for anyone’s ability to grow and evolve. Those with a fixed mindset will resist any type of change. It’s a problem for technical people because they desire absolutes, but cybersecurity is a dynamic and volatile field! It’s kind of a paradox, so be observant of how people communicate about themselves and their experiences. This can give you a good idea of how open their mindset is and if they’ll be a good fit for your team.</p>
<h3>Acknowledgment</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>, which you’ll want to make a pillar of your culture. Technical employees crave feedback and understanding of their place in the business. Of course, they must also be receptive to it because it won’t always be positive. You also want to know if someone can acknowledge the work and contributions of others within the group or outside of it.</p>
<h3>Communication</h3>
<p>The fourth step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and it’s the most important concept when creating a team. We can’t do anything well without honest, transparent, and consistent communication.</p>
<p>Being a good communicator doesn’t just mean being articulate. In the world of cybersecurity, your team must be clear about what they need, the challenges they face, and what’s really happening in the threat landscape. They also have to be active listeners to be good collaborators.</p>
<p>You can likely assess someone’s communication skills within the context of your conversations. Look for those who can clearly express big ideas and don’t use geek speak. If they show signs of this and seem to be listening to you, it’s a good sign, and you can continue to help them master this skill.</p>
<h3>Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is the fifth step, and it means concentrating on one task or project at a time without disruptions. It’s hard to find anyone who monotasks much in the workforce, where we seem always to be doing five things at once.</p>
<p>You can talk about monotasking in interviews to see someone’s reaction to it. Do they think it’s bad for productivity or impossible? Emphasize that you believe it to be a critical component of the workday because it enables critical thinking and problem solving, which are two huge assets in cybersecurity.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is the sixth step, and in this connotation, it means the ability to understand someone’s perspective and feelings. It’s one of the hardest things for anyone to build, and yes, we must learn it. We are not innately empathetic. Achieving this can help with stress, burnout, and frustration toward others.</p>
<p>In speaking with prospective hires, ask them about a time when empathy would have been a good response to a problem. The answers they give can reveal a lot about their inner workings.</p>
<h3>Kaizen</h3>
<p>The last step is Kaizen. It’s a Japanese term that means “change for the better.” It never ends because continuous improvement is forever. When hiring, you want to put people on your team who believes in this approach to work.</p>
<p>Ready to learn more about the Secure Methodology? Start by reading <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a> and explore the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Build a Cybersecurity Team from Scratch Using the Secure Methodology&#x2122;' data-link='https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/">How to Build a Cybersecurity Team from Scratch Using the Secure Methodology™</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-build-a-cybersecurity-team-from-scratch-using-the-secure-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger</title>
		<link>https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/</link>
					<comments>https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 17 Sep 2023 18:58:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity silos]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2847</guid>

					<description><![CDATA[<p>Silos are a common theme in many businesses. It can occur in any industry, department, or team. The reasons this is all too prevalent are many, from cultural issues to not sharing data to a lack of communication. Silos undermine an organization’s ability to be proactive and agile, weakening its cybersecurity posture. So, how did [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/">Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger' data-link='https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2848 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-300x243.jpg" alt="cybersecurity silos" width="300" height="243" srcset="https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-300x243.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-1024x829.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-768x622.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-1536x1244.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-2048x1659.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/09/waldemar-3606sCbKRZM-unsplash-640x518.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Silos are a common theme in many businesses. It can occur in any industry, department, or team. The reasons this is all too prevalent are many, from cultural issues to not sharing data to a lack of communication. Silos undermine an organization’s ability to be proactive and agile, weakening its cybersecurity posture.</p>
<p>So, how did cybersecurity become so siloed? And what can you do to break silos down?</p>
<h2>Why Silos Exist in Cybersecurity</h2>
<p>Cybersecurity often sits in a walled garden, with little interaction with the business side of an organization. There have been some shifts to bring it into the fold, with CISOs (chief information security officers) now <a href="https://christianespinosa.com/blog/why-cybersecurity-deserves-a-seat-at-the-leadership-table/" target="_blank" rel="noopener">having a seat at the table with the C-suite</a>.</p>
<p>This demonstrates the process, but the silos have stood for a long time, so they are very much a current problem. There are several reasons why they exist, including:</p>
<ul>
<li>Businesses believing cybersecurity impedes innovation and growth and intentionally wanting to keep it separate</li>
<li>The increased number of attacks and threats cybersecurity teams must defend against, which keeps them in a reactive mode instead of a proactive one</li>
<li>Failures in communication that leave cybersecurity and other parts of the company unaware of the landscape and its evolution</li>
<li>No shared accountability for cybersecurity throughout the organization, which leaves cybersecurity on an island when it comes to security and resilience</li>
<li>Company leadership not treating cybersecurity as a business enabler, which can impact budgets, staff numbers, and resource allocation</li>
<li>No initiatives to build partnerships across the organization between cybersecurity and other teams</li>
</ul>
<p>All these reasons have a foundation in disconnection. When cybersecurity isn’t a critical part of an organization, it’s easy for silos to stay in place.</p>
<p>Those silos can exist within teams as well.</p>
<h2>Cybersecurity Silos Are Present Within Technical Teams</h2>
<p>It’s not just the enterprise-wide silos you have to worry about. Chances are they are also creating walls within your people. These may be even harder to conquer because of the nature of the job and the characteristics of individuals.</p>
<p>Silos within cybersecurity occur primarily because cyber professionals never want to be wrong. They concentrate on always being the smartest person in the room. When others question their stance, internally or externally, they find solace in silos where they have all the control.</p>
<p>If this sounds familiar, you’re not alone. It’s all too common in the cybersecurity workforce to have people operating independently without much awareness of what others are doing. Furthermore, many don’t care. They have surety in their capabilities and don’t want to share or collaborate because it could lead to them being wrong.</p>
<p>The silo mentality leads to the things that are threatening the cybersecurity workforce — unhealthy cultures, <a href="https://christianespinosa.com/blog/burnout-in-cybersecurity-can-you-prevent-it/" target="_blank" rel="noopener">burnout</a>, and an uneven work-life balance. These were all reasons that cyber professionals left jobs, according to the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">(ISC)2 Cybersecurity Workforce Study</a>.</p>
<p>Dissatisfaction in a cyber job has more to do with organizational issues than the work. Silos are a threat to your team and cybersecurity posture. They breed resentment and disengagement. It’s bad for everyone, but it’s difficult to transform mindsets and perspectives from a silo perspective to a collaborative one. For this shift to occur, you have to focus more on soft skills than technical ones.</p>
<h2>Silos Keep People From Adapting and Changing</h2>
<p>As noted, silos can seem like safe places for cyber professionals who cling to certainty and believe they don’t need others to do their job well. What it actually does is keep people in a state of stagnation. They won’t grow or change because doing so would mean they have to accept that they don’t know everything. That’s too big of a pill to swallow for many without intervention.</p>
<p>Those who crave the safety of a silo aren’t bad people (usually). It is possible for them to get to a point where they’ll embrace the gray that cybersecurity lives in, moving away from <a href="https://christianespinosa.com/blog/cybersecurity-isnt-black-and-white-why-cyber-leaders-and-their-teams-must-embrace-the-gray/" target="_blank" rel="noopener">black-and-white thinking</a>.</p>
<p>Cybersecurity is a dynamic industry, indicating that evolving practices and protocols are necessary. Even if you consistently improve your strategies and ways to manage and eliminate threats, that doesn’t mean that silos aren’t still present. They show themselves in many different ways, from how your employees work with other groups, how they handle user interactions, and what happens when a threat becomes a reality.</p>
<h2>How Silos Put Your Cybersecurity Posture At Risk</h2>
<p>On the threat landscape, there are a million things that increase risk. As networks grow, workers remain remote, and implementations of new technology rise, there’s risk everywhere. You have to defend against phishing, malware, and ransomware, which requires a united front and effort. Silos make this harder.</p>
<p>When silos exist within the department or in the company, the ability of a cyber team to be proactive against these threats becomes very difficult. Being proactive requires everyone to work together from a defined strategy. It involves a lot of communication and movement across the organization to establish and maintain your “protective shield” against attacks.</p>
<p>Attempting to reduce or eliminate risk is a journey that never ends or stays the same. Doing this well really means working as a team. Even if you have lots of protocols and tools in place, a silo doesn’t crack so easily. And often, people can do just enough to collaborate but true transparency is still missing.</p>
<p>As a result, errors and mistakes occur. Assumptions about who’s doing what and when are usually wrong, and gaps in your cybersecurity posture widen. It gives hackers an opportunity to exploit these weaknesses, so having silos is a helping hand to cybercriminals. If you want to prepare your organization to be cyber-resilient, you have to focus on growing your team’s people skills.</p>
<h2>Development of People Skills Is a Silo Breaker</h2>
<p>When individuals improve their people skills, they see the value in working together. They understand that silos are holding them back and want to work in a culture that thrives in teamwork.</p>
<p>It would be great if people could come to this realization on their own. Some never will, but many are willing to commit to developing their soft skills, especially when they realize it can decrease risk. Ultimately, most cyber professionals got into this field because they are passionate about security. If they know that their behaviors and actions have impacted their cybersecurity posture, they may be even more eager to change and adapt.</p>
<p>So, how does this happen in the real world? It won’t occur without a framework and strategy. You can’t start this journey without a map, and you’ll find one in the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</p>
<h2>The Secure Methodology Transforms Silos</h2>
<p>The Secure Methodology is a seven-step guide to transforming technical people into excellent communicators and collaborators. Each step seeks to resolve the major problems that exist in the <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/" target="_blank" rel="noopener">cybersecurity workforce</a>, supporting people as they pursue a new mindset and perspective. Here’s how each step can knock down those silos for good:</p>
<h3>Awareness</h3>
<p>The Secure Methodology starts with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a> of self and others. When awareness is lacking, silos flourish because there’s no connection. Technical folks will remain on their own island, causing friction and antipathy.</p>
<p>You can use coaching methods within this step to drive people to open their eyes and realize the detriment of silos. You can also learn about their motivations, which will be vital in changing behavior.</p>
<h3>Mindset</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindset</a>, and it’s a key contributor to silos. When people have a fixed mindset, they have tunnel vision and no desire to change. This step is about helping them open it, which can occur with reflection, asking questions, and working as a team in decision-making.</p>
<h3>Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is the third step, and the lack of it is another cause of silos. Acknowledgment means recognizing people for their efforts regularly. They want and need praise to feel part of something, which is critical to breaking down silos. Part of this is also acknowledging that no one can know everything about cybersecurity but that collectively, we all have a better shot at defending against threats.</p>
<h3>Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the fourth step but crucial in all the others too. Communication is the single biggest tool you have to remove silos. Consistent, transparent, and clear communication within your team and outside of it ensures that silos don’t form or stay.</p>
<p>Working on communication isn’t easy. It takes a lot of practice and learning new ways to share information and listen.</p>
<h3>Monotasking</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>, which means workers focus only on one task. It’s the opposite of multitasking, which often leads to sloppy work. Yet, people receive praise for multitasking, but it’s a problem in cybersecurity.</p>
<p>In terms of silos, if you encourage people to block time to work on specific things without distraction, they can use critical thinking skills and balance their workload. Gaining these things supports a collaborative workforce where there’s even distribution of work and team support.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is an essential soft skill that we have to learn and develop. Silos can’t function in an empathetic culture because people can see the perspective of others. When they do, there’s no longer a “me vs. them” mentality. This step includes exercises to help people foster this skill.</p>
<h3>Kaizen</h3>
<p>The last step is kaizen, which is a Japanese term meaning “continuous improvement.” It’s a stage that never ends with an emphasis on root cause analysis. If your team can embody this, silos won’t have fertile ground.</p>
<p>Using the Secure Methodology is a proven path for transformation and removing silos. You can learn more about it in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and in the <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger' data-link='https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger' data-link='https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/">Silos Weaken Your Cybersecurity Posture, Collaboration Makes It Stronger</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/silos-weaken-your-cybersecurity-posture-collaboration-makes-it-stronger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Diagnosing the Root Causes of the Cyber Workforce Shortage</title>
		<link>https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/</link>
					<comments>https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 19:16:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity skills gap]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2842</guid>

					<description><![CDATA[<p>The cyber workforce shortage has been the talk of the industry for the past few years. Many jobs remain unfilled, and experts predict that will only grow. The reason for this gap is the result of many different factors. At the heart of the problem are root causes. The field can attract and retain workers [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/">Diagnosing the Root Causes of the Cyber Workforce Shortage</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Diagnosing the Root Causes of the Cyber Workforce Shortage' data-link='https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class=" wp-image-2843 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/museums-victoria-7YUvAUbfSV0-unsplash.jpg" alt="cybersecurity skills gap" width="393" height="271" />The cyber workforce shortage has been the talk of the industry for the past few years. Many jobs remain unfilled, and experts predict that will only grow. The reason for this gap is the result of many different factors. At the heart of the problem are root causes. The field can attract and retain workers by identifying these and working to overcome them.</p>
<p>In this post, we’ll look at the data, diagnose the root causes, and define how to close the gap.</p>
<h2>The Data on the Cyber Workforce Shortage</h2>
<p>There is a lot of data on the <a href="https://christianespinosa.com/blog/the-2023-cybersecurity-workforce-landscape/" target="_blank" rel="noopener">cybersecurity workforce landscape</a>. It’s a pervasive issue, so developing reports and surveys is in high demand to uncover the why. We’ll look at the <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">ISC 2022 Cybersecurity Workforce Study</a> and the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">ISACA State of Cybersecurity 2022 Report</a>.</p>
<p>The workforce study detailed that the global cybersecurity workforce grew to over 4.6 million, which was an 11% year-over-year increase. Even with this increase, there are still 3.4 million jobs that are vacant. It’s something that’s keeping cyber leaders up at night. Survey respondents had this to say:</p>
<ul>
<li>Organizations with a significant staff shortage had more concerns about risk, with 74% stating it was extreme or moderate.</li>
<li>60% of organizations said they are struggling to keep up with turnover.</li>
<li>70% of companies have challenges with retention.</li>
<li>It takes, on average, three to six months to fill an empty role.</li>
<li>There is a correlation between cyber professionals not feeling their input is welcome and valued and low employee experience ratings.</li>
<li>Younger generations have new expectations in work, with this group more concerned about emotional health, Diversity, Equity, and Inclusion (DEI), and having a voice.</li>
</ul>
<h2>What Conclusions About the Workforce Gap Can We Make Based on the Data?</h2>
<p>So, why does this gap exist? It’s complicated, and many things driving it are outside your control. We can draw some conclusions from the data that diagnose what’s happening.</p>
<h3>More Threats Drive Demand for Cyber Professionals</h3>
<p>First, the demand for more cyber professionals would, of course, increase as cyber threats do. Cybersecurity is about identifying and mitigating risk, so it doesn’t exist without the threat landscape. It keeps us all gainfully employed but consider how much it has evolved in the past few years.</p>
<p><a href="https://christianespinosa.com/blog/ransomware-attacks-new-ways-to-exploit-old-vulnerabilities/" target="_blank" rel="noopener">Ransomware</a> is more prevalent than ever. The means to carry these out have become much more sophisticated. It’s a favorite tactic for hackers, mainly involving financial gain as the desired outcome. Cybercriminals are using old and new weaknesses to attempt to seize control of applications, data, and systems.</p>
<p>Cybercrime-as-a-service enables a new group of criminals to hire hackers on the dark web to do their bidding. You can now choose from a “menu” of attacks, from phishing to ransomware to AI-enabled cybercrimes. No one has to be a cyber genius to launch these attacks. Hacking is now more accessible—a commodity even. As a result, the threat landscape broadens.</p>
<p>Hacktivism is another emerging trend that’s increasing risk. For the first half of 2022, DDoS (distributed denial of service) attacks increased by <a href="https://www.radware.com/pleaseregister.aspx/?returnurl=18bf850e-6320-44a7-85e3-65f9ef072dc8" target="_blank" rel="noopener">203%</a> over 2021, with many of these fitting the hacktivism label. It’s a different motivation for these cyber criminals and impacts businesses even if they don’t have social or political ties.</p>
<p>Then you have all the <a href="https://christianespinosa.com/blog/will-ai-and-machine-learning-help-or-hurt-cybersecurity/" target="_blank" rel="noopener">advancements that AI brings to the hacker toolbox</a>. It enables them to improve phishing campaigns and send them out more quickly. It can help them gather data for attacks, create deepfakes, hide malware, and break passwords and CAPTCHAs.</p>
<p>These are just some highlights, but they represent all the risks and threats that cyber professionals must defend against every day. For organizations, it’s a driving need to hire more people and keep them.</p>
<h3>Retention Is a Concern, and Burnout Plays a Role</h3>
<p>The job of a cyber professional can have moments of high pressure and stress. Without a healthy culture to balance this and consistent communication, this can lead to burnout. If you don’t have enough people, then those you do have to end up with more and more on their plate. Many technical folks further disconnect from the job, considering it their biggest stressor. Being overwhelmed in this manner often ends in attrition.</p>
<p>Without focusing on evening workload, communication, collaboration, and a healthy culture, burnout will grow and play out repeatedly.</p>
<p>Burnout isn’t the only cause of <a href="https://christianespinosa.com/blog/cybersecurity-retention-how-to-combat-turnover-and-keep-employees-engaged/" target="_blank" rel="noopener">poor retention</a>. It’s also the environment. If it’s toxic, more people will leave. They have options with so many jobs available. Other things that contribute to this are compensation that’s not competitive, lack of promotion opportunities, no management support, and inflexible work policies. Regarding financial incentives, only 31% of organizations said they pay a competitive wage.</p>
<p>In short, you can’t attract or keep good employees if you don’t address burnout and retention.</p>
<h3>Cyber Professionals Need More Acknowledgement and Connectedness</h3>
<p>Your current and future employees have a lot of knowledge and expertise. Failure to acknowledge this or ask for their contributions to a challenge creates low morale. It isolates people who are often introverts worried about saying the wrong thing. If they keep this close to the vest, you also can’t understand their motivations and what they need to succeed.</p>
<p>The Workforce Study found that lack of support from leadership contributed to a lower employee experience. Improving this is something within your control. When workers feel valued for their input and part of something bigger, they are more engaged and open to learning and growing. Creating such a culture ensures that you can attract and retain great workers.</p>
<h3>Younger Generations Have Apprehension About the Industry</h3>
<p>Cybersecurity has a branding problem, as younger generations have new expectations about work and for whom they work. Currently, only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cyber workforce is 34 or younger</a>. It’s one of the most consequential drivers for the cybersecurity workforce shortage.</p>
<p>Cybersecurity needs a rebrand to attract these people. It should include things like improving culture, eliminating gatekeeping and blustering, being more communicative, embracing diversity, valuing the employee voice, and helping them grow professionally and personally.</p>
<p>One of the best ways to do this is with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step guide to transforming technical folks into excellent communicators and collaborators. It can be a key way to address many of the challenges related to the workforce gap.</p>
<h2>Using the Secure Methodology to Improve the Cybersecurity Workforce Shortage</h2>
<p>Here’s a preview of each step of the Secure Methodology, which I defined and designed in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. The title refers to how many cybersecurity professionals see themselves and how that can be a downfall.</p>
<h3>Awareness</h3>
<p>In this first step, people become aware of themselves and others. Through the exercises in the book, technical people can begin to understand their behavior and its effect on others. It can be a struggle for anyone, especially cyber professionals. Once they achieve <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, they can let go of fears about uncertainty and their place in the organization, which can counter burnout and improve the employee experience.</p>
<h3>Mindset</h3>
<p>Individuals have a <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">growth or fixed mindset</a>. When it’s fixed, they do not change. They accept their perspective and won’t work to evolve it. It’s a problem that will hamper recruitment, retention, and job satisfaction. If your culture presents a place to grow and adapt through a broader mindset, you can attract and keep people on staff.</p>
<h3>Acknowledgment</h3>
<p>We talked about <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a> earlier and how it feeds into the employee experience. By practicing acknowledgment, your team understands their importance and gets the feedback they crave. Involving your people in big decisions is another form of acknowledgment, and it can go a long way in positioning your company as a great place to work and thrive.</p>
<h3>Communication</h3>
<p>The fourth step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and it’s really the core of the Secure Methodology. We cannot fix the workforce shortage issue without clear, consistent, and meaningful communication. Communication starts in the recruitment phase with being transparent and open about cybersecurity. It also has to be a central part of everything you do with employees.</p>
<p>When it’s part of your culture, you’re building a collaborative and cooperative team. They’ll be able to engage better with each other and the business side. As a result, everyone can be on the same page and reduce the ambiguity that drives dissatisfaction and churn.</p>
<h3>Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is essential to supporting the overworked, which cyber professionals tend to be. It’s even more so with so many companies short-staffed. It’s the principle of concentrating on one task without any disruptions. It gives them time to focus and use critical thinking and problem-solving skills. The result of this could include improving stress levels and people being more comfortable in asking for help.</p>
<h3>Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> within your cybersecurity culture means the ability to understand another’s perspectives and feelings. Developing this skill in technical people can encourage them to feel less frustrated with their customers (users). With attention toward empathy, people can learn to let go of blame and resentment, which often festers and creates burnout and attrition.</p>
<h3>Kaizen</h3>
<p>The last step is Kaizen, which means “change for the better.” It’s the ultimate objective of the Secure Methodology. It’s all about continuous improvement. A culture that embraces this will attract excellent candidates and keep them. There is no perfect in Kaizen, which the smartest people in the room are attempting to achieve. There is only the motto of constant improvement.</p>
<p>You can learn more about each step and how to use it to transform your organization and solve the workforce shortage problem by <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">reading my book</a>. <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Check out the Secure Methodology course</a>, too.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Diagnosing the Root Causes of the Cyber Workforce Shortage' data-link='https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Diagnosing the Root Causes of the Cyber Workforce Shortage' data-link='https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/">Diagnosing the Root Causes of the Cyber Workforce Shortage</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/diagnosing-the-root-causes-of-the-cyber-workforce-shortage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction</title>
		<link>https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/</link>
					<comments>https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 15 May 2023 02:52:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2821</guid>

					<description><![CDATA[<p>Everybody in cybersecurity has funny and unbelievable stories of users gone wrong. On the other side of the equation, users have their own stories that paint technical folks as rude and unhelpful. In either case, there’s a lot of stereotyping going on, but some of it is, well, true. What it amounts to is cyber [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/">Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction' data-link='https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2822 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-300x196.jpg" alt="cybersecurity user experience" width="300" height="196" srcset="https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-300x196.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-1024x668.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-768x501.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-1536x1002.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-640x418.jpg 640w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" />Everybody in cybersecurity has funny and unbelievable stories of users gone wrong. On the other side of the equation, users have their own stories that paint technical folks as rude and unhelpful. In either case, there’s a lot of stereotyping going on, but some of it is, well, true. What it amounts to is cyber teams having a “bad” reputation. Many consider technical folks to be arrogant, hostile, and condescending. If that’s the culture in your organization, it’s no wonder that people have little respect for them. In fact, they’ll do anything to avoid interaction with them, which often increases risk.</p>
<p>So, what can you do as a cybersecurity leader to broker peace between the two? While users certainly have some blame for the dynamic, much of it comes down to a lack of soft skills, causing friction and undermining relationships.</p>
<h2>Why Your Cyber Team Has a “Bad” Reputation</h2>
<p>One of the biggest reasons that cyber professionals earn their reputation is that many consider them a bottleneck. That’s because security must be a part of any major IT development or implementation. Often, the barrier they create isn’t their fault. Sometimes, cybersecurity isn’t in the initial plans, and then you get involved. To avoid such an impasse, your organizational culture regarding security has to, as well.</p>
<p>Security can’t be an afterthought. It needs to be a forethought, so you have to express this with the C-suite and leadership. When given a chance to have a seat at the table, your people must engage with the business side in a way that’s outside of their comfort zone. They have to be inclusive in their communication and explanation. Otherwise, they’ll posture and use jargon, making them seem like jerks and continuing the belief cycle that technical people are difficult.</p>
<p>A team’s reluctance to collaborate effectively is also a common problem. Cyber strategies and decisions don’t reside only with your team. You need input and support from others. As a result, cyber professionals must be cooperative when it comes time for new implementations and approaches to combat risk.</p>
<p>Key to this is their ability to define risk clearly with other stakeholders who aren’t experts. Your people are, and they have great technical knowledge. This intelligence often creates the desire to be the smartest person in the room. They may be, technically speaking. However, they have to be able to work with others to establish new strategies to protect the company.</p>
<p>While your people often don’t do themselves any favors in being likable, it’s not all their fault. Cybersecurity can be a scapegoat for missed implementation dates, backlogs, and failed digital transformation objectives. It’s easy for others to blame your team, believing them to be against innovation. They may hold some responsibility, but it goes back to cultural foundation issues about how the organization prioritizes and empowers a cyber team.</p>
<p>You have some control over how the company looks at cybersecurity, but you have even more so over your team. For the sun to set on the stereotype of cyber professionals being obstinate, your people must develop <a href="https://christianespinosa.com/blog/5-people-skills-every-successful-cybersecurity-professional-possesses/" target="_blank" rel="noopener">people skills</a>.</p>
<h2>Why Are Cyber Professionals “Bad” at Soft Skills?</h2>
<p>So, why exactly do technical people often have gaps in soft skills? Is it something innate and unfixable? Absolutely not, and it’s a symptom of something bigger. There are many bright, highly communicative, and adaptable people in the field. Some require a nudge toward the right direction to be vulnerable and ready for change.</p>
<p>If you look at the industry and consider where the struggles exist in people skills, you can come to these conclusions:</p>
<ul>
<li>They often think in black and white, while most everything lives in gray. When they lock into a mindset that there’s one right answer and many wrong ones, it impacts their perspective. So, they stick to the script even when factors change.</li>
<li>Technical folks often have insecurities and fears that they want to keep hidden. They believe not knowing everything is a weakness, but how could you possibly know everything? These feelings keep them from asking questions and engaging in dialogue with others.</li>
<li>Communication isn’t easy for them, especially if they can’t posture and use jargon. When they do, they alienate others quickly and live up to their reputation. <a href="https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/" target="_blank" rel="noopener">Communication</a> is the single most important skill a cyber professional can possess.</li>
<li>Cyber professionals also may lack awareness of themselves and others. They don’t see how their tendency to be aloof and overly technical prevents trust and cooperation. They also have a hard time understanding the perspectives of the business side. Without this awareness, they’ll continue to be outsiders.</li>
</ul>
<p>Helping your team work through these flawed behaviors won’t be easy, but there is a way to do it with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step guide for cyber leaders to leverage to transform technical minds into ones with strong soft skills.</p>
<h2>How the Secure Methodology Can Improve the Reputation of Cybersecurity</h2>
<p>The Secure Methodology is a proven framework to cultivate technical folks into excellent communicators and collaborators. Next, we’ll review all seven steps with an introduction to how the lessons of each phase develop people skills.</p>
<h3>Step One: Awareness</h3>
<p>The first step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>, which I mentioned earlier as a reason technical people can’t connect with others or themselves. When they lack Awareness, it creates a lot of blind spots, which impact communication and set the stage for more technical posturing.</p>
<p>Technical people have to be willing to open themselves up to new perspectives. You can foster this with coaching around communication and understanding their motivations. In this step, you’ll have access to exercises that move people outside of their comfort zone, opening their eyes to a wider world.</p>
<h3>Step Two: Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is next and builds on learnings from Awareness. Right now, many of your people likely have a fixed mindset, which keeps them from growing and evolving. Shifting to a growth mindset is what you want to accomplish. They have to open their minds to more possibilities beyond black-and-white thinking. This step features approaches to help people with reflection and accountability.</p>
<h3>Step Three: Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is a critical aspect of any department or industry. When there’s little positive acknowledgment, employees can become disengaged and resentful. In cybersecurity, the most common acknowledgment is negative. So, it’s this cycle of being fearful of any error, causing some to do nothing.</p>
<p>Acknowledgment must start with you. Positive reinforcement is vital, and you should do it publicly. It tells people what they do matters, and ensuring they understand how their contributions help the company can be key to their desire to be better team players. This step has activities to develop this through rapport and trust.</p>
<h3>Step Four: Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> has its own step but is pivotal in every phase. Communication skills are necessary for any job, but cyber professionals have often gotten away with being bad at it. Technical folks need to learn how to communicate better within the team and with others who are technically adept.</p>
<p>Much of this comes down to the simplification of the message. They don’t need to give a monologue to express risks and threats. Coaching exercises in this step will promote creating an inclusive, shared language and active listening. Much of this involves reframing the interactions and reminding your people that others aren’t the enemy. Encourage them to stop hiding behind complex explanations and to strip communication down to informing others and asking questions.</p>
<h3>Step Five: Monotasking</h3>
<p>Aren’t technical professionals supposed to be great multitaskers? Unfortunately, many people believe this to be true, and multitasking has its place. However, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a> is a necessity for improving people skills. When someone multitasks, there’s often a feeling of pressure, which can cause more mistakes.</p>
<p>Encourage your people to have specific monotasking periods in their day where they focus all their energy on one task. They’ll find they’re more productive with this kind of schedule. Challenge your team to practice this and block out distractions.</p>
<h3>Step Six: Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is a crucial step to transforming your cyber team. When your employees can put themselves in the shoes of others, the us vs. them mentality can fade away, and that’s necessary to eliminate their “bad” reputation.</p>
<p>Empathy, however, is something to develop. It’s not a natural part of being human. It requires them to care about what they do, the organization, and their colleagues. All the steps leading to this one have set the stage for empathy. If your staff can excel here, they’ll be the collaborators everyone needs them to be.</p>
<h3>Step Seven: Kaizen</h3>
<p>The final step is kaizen, which is a Japanese term meaning “continuous improvement.” Within the Secure Methodology, it’s the action of analyzing root causes. You can then uncover the real problems and work toward overcoming them. This step doesn’t end, as it’s a continuous state of adapting and evolving.</p>
<h2>Rid Your Cyber Team of Their “Bad” Reputation</h2>
<p>Now is the time to drive change in your employees so they can contribute more effectively. When they do, it’s good for security and their long-term job satisfaction. <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Take the first step by checking out the Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction' data-link='https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction' data-link='https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/">Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology</title>
		<link>https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Feb 2023 17:20:06 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity workforce]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2800</guid>

					<description><![CDATA[<p>Finding qualified and skilled talent has been a struggle in cybersecurity for years. According to data, that’s only getting harder. Exasperating the cybersecurity workforce shortage is the fact that retaining employees is challenging. Cybersecurity workforce retention is as important as your recruitment strategies. So, how do you keep cyber professionals on the job? It’s not [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/">Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology' data-link='https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2801 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-300x200.jpg" alt="cybersecurity jobs" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/02/sigmund-Fa9b57hffnM-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Finding qualified and skilled talent has been a struggle in cybersecurity for years. According to data, that’s only getting harder. Exasperating the cybersecurity workforce shortage is the fact that retaining employees is challenging. Cybersecurity workforce retention is as important as your recruitment strategies.</p>
<p>So, how do you keep cyber professionals on the job? It’s not an easy answer, as so many factors impact this. However, you can build a retention plan alongside your recruitment strategy. In this post, we’ll uncover why turnover occurs and how to create a culture and environment that will make them stay.</p>
<h2>The Cybersecurity Workforce Retention: State of the Industry</h2>
<p>A study from the ISACA found that <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">60%</a> of cyber leaders said it was difficult to retain cybersecurity professionals, up 7% year-over-year. The survey outlined why it’s happening, with these being the top reasons:</p>
<ul>
<li>Recruited by other companies (59%)</li>
<li>Compensation and incentives (48%)</li>
<li>Few promotion and development opportunities (47%)</li>
<li>The high stress of the job (45%)</li>
<li>No management support (34%)</li>
</ul>
<p>Some of these challenges are easier to combat than others. Currently, cybersecurity jobs are greater than those available to fill them. A study estimated that over <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">3.4 million cyber jobs</a> are available, which will only increase. As a result, other companies will try to lure away your employees, even if they aren’t actively looking for another job. How they respond to this will depend on how they feel about working for you in terms of money, autonomy, support, and satisfaction.</p>
<p>Compensation is another tricky area. Competitors may be offering more money. While that’s a critical part of why people work, money may not be the top factor in retention. Regardless, depending on their experience, role, and market, you should pay your team a fair wage. With the cost of living increasing, you must keep up with this.</p>
<p>Next is development, which is something you can control. Continuing to train and upskill your team shows you’re investing in them and their future. You should also be clear with them about the opportunities to advance.</p>
<p>Stress is inevitable in almost any job. Cybersecurity is a dynamic industry with fire drills all the time. Focusing on ways to destress workers should be part of your culture. It could be rewarding your team with social or team-building activities. Having an open door for employees to share their experiences with you and their stress can also be helpful.</p>
<p>Finally, you have complete purview over management support. As a leader, you have to earn and keep the respect of your team. Being a great leader requires you to communicate honestly, listen intently, acknowledge their work, and support them in any way you can.</p>
<p>Addressing these common reasons for turnover is critical for your organization because its impact is considerable.</p>
<h2>The Impact of Turnover</h2>
<p>An inability to retain staff affects many aspects of operations. Being understaffed creates more risk because everyone’s stretched thin. It’s easy to miss key things when someone is overwhelmed. Turnover also prevents your ability to be more strategic because you’re in a reactive mode versus a proactive one. Productivity suffers as well.</p>
<p>Turnover also costs you money. The average cost of hire is <a href="https://www.shrm.org/resourcesandtools/hr-topics/talent-acquisition/pages/the-real-costs-of-recruitment.aspx" target="_blank" rel="noopener">$4,700</a> and could be even greater considering how in demand these roles are. It’s in your best interest to retain your technical folks, which isn’t easy. You may be looking at many methods to decrease turnover, including increasing wages and benefits, allowing for flexible work, asking for feedback from your team to propel improvement, and providing the right tools to do the job.</p>
<p>Those are all good things to have, but retention has much to do with engagement, satisfaction, feeling valued, and having respect for leadership. These things can mean more than money, which is why applying the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> to cybersecurity workforce retention makes sense. It’s a seven-step guide that defines a roadmap to transform technical people into highly communicative and collaborative professionals.</p>
<p>Let’s see how each step can support retention.</p>
<h2>Applying the Secure Methodology to Cybersecurity Workforce Retention</h2>
<p>With every step of the Secure Methodology, there are lessons to learn that impact retention. Here’s how to use these in your organization.</p>
<h3>Step One: Awareness</h3>
<p>Tapping into <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a> is an important attribute to have in life and work. We all have blind spots, but some are bigger than others. Without being aware of these, there are consequences. It negatively impacts relationships and erodes trust. Without being aware, your team doesn’t realize how their behavior affects others and the environment. Things can become toxic very fast. If those things are lacking, it’s easy to see why some would want to leave.</p>
<p>Awareness means being cognizant of your blind spots and working to address them. A more aware team will be more collaborative and communicative. Here are some ways that this can support retention:</p>
<h4>Coaching</h4>
<p>Coaching is vital to broadening awareness. If you can open the eyes of your team in a conducive way, they may have “aha” moments. Shifting their stance from being self-centered allows people to get a better perspective.</p>
<h4>Language</h4>
<p>Using specific, relatable language helps technical people better understand expectations and culture. When there’s no confusion about where everyone should focus, they will likely feel more empowered.</p>
<h4>Motivation</h4>
<p>Understanding motivations is critical to unlocking awareness. Tapping into what makes them tick helps strip away some of the technical posturing cyber professionals often do. Knowing their motivations allows you to personalize how you support and coach them.</p>
<h3>Step Two: Mindset</h3>
<p>There are two types of <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindsets</a> — fixed and open. Many technical folks have fixed mindsets with no desire to change, learn, or grow. However, it doesn’t mean they have to stay that way. Fixed mindsets are poisonous to retention. Even if one in the group is this way, it can taint it for others. When we’re fixed, we refuse to move.</p>
<p>A growth mindset is freeing and enables people to be flexible and adaptable, which is necessary for cybersecurity. Evolving a fixed mindset to a growth one is possible, but it requires commitment from you and the employee.</p>
<p>Some key results of a fixed mindset include:</p>
<ul>
<li>The ability to reflect on situations and understand how to handle it differently.</li>
<li>Healthier and consistent communication.</li>
<li>A culture that welcomes growth personally and professionally.</li>
<li>Growth mindsets can be a significant reason employees stay with your organization.</li>
</ul>
<h3>Step Three: Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is scarce in technical fields. Yet, it’s so crucial to retention. Your employees want appreciation for the work they do. Its absence is because most cyber leaders only respond to things when they go wrong. The small wins everyday matter so much to your people, so you must become vigilant about feedback.</p>
<p>Your approach to acknowledgment should include:</p>
<ul>
<li>Being positive by looking at what went right first</li>
<li>Specificity in your feedback</li>
<li>Immediately offering feedback in the moment</li>
<li>Praise in public and relay ways to improve in private</li>
<li>Consistency in how you address acknowledgment</li>
</ul>
<p>Lack of appreciation and lack of feeling valued are two primary reasons why people leave their jobs. If your people don’t receive acknowledgment, they’ll actively seek another job.</p>
<h3>Step Four: Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is part of every step in the Secure Methodology, along with having its own step. It is, without a doubt, the most critical part of a thriving culture and support to retention. You probably know there are communication issues among your technical folks. It doesn’t mean they aren’t articulate. Rather, their communication styles are often too aggressive, overly complicated with geek speak, and always on the defense. They also suck at listening, the other component of communication.</p>
<p>This storm of dysfunction will have people, often your best, running away from your organization. Thus, it’s critical to make communication the foundation of your culture and retention strategy. Here’s how to use it:</p>
<ul>
<li>Be honest and transparent as a leader.</li>
<li>Move away from overly technical language and simplify the message.</li>
<li>Encourage open discussion and dialogue that’s respectful.</li>
<li>Praise your people when they make adjustments in communication.</li>
<li>Practice active listening in exercises, so they grasp how crucial it is.</li>
</ul>
<p>If you can lay out these tenets, your people will likely see the value and follow you. If some still don’t realize it, they may be dragging others down. In some cases, you may have to let those folks go, so they don’t make it unbearable for everyone else.</p>
<h3>Step Five: Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> is focusing on one thing, the opposite of multitasking. Many describe multitasking as an excellent quality, but it can actually hamper productivity. Forcing multitasking can make your people feel pulled in many directions. Those feelings create animosity and dissatisfaction. So, remove this pressure and instead recommend blocking time for specific tasks, meetings without distractions, and saying “no” to some things that aren’t urgent.</p>
<h3>Step Six: Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is a valuable quality to have. In terms of cybersecurity, cognitive empathy is essential for a healthy environment. It means that others can understand the feelings and perspectives of others. Without it, you have no team or human connection, and you need those to retain your people. All the things you put in place to get to this step support the building of empathy. Developing this in your team enables a trust factor and creates more satisfaction.</p>
<h3>Step Seven: Kaizen</h3>
<p>The final step is kaizen, which is a Japanese term. When translated into English, it means “continuous improvement.” So, this step isn’t an end to the journey; it’s how to sustain it. If your team believes in this process, they’ll want to continue identifying ways to improve and follow through with them. When kaizen is part of your <a href="https://christianespinosa.com/blog/the-cyber-threat-no-one-talks-about-the-absence-of-a-cybersecurity-culture/" target="_blank" rel="noopener">cybersecurity culture</a>, your technical folks will evolve and realize that this is where they can continue learning and growing.</p>
<p>Retaining your workforce won’t be easy. With the Secure Methodology, you have a framework. You can go more in-depth by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and viewing the <a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology' data-link='https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology' data-link='https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/">Cybersecurity Workforce Retention: Keep Top Talent with the Secure Methodology</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-workforce-retention-keep-top-talent-with-the-secure-methodology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Secure Methodology™ Step Six: Empathy</title>
		<link>https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/</link>
					<comments>https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Wed, 07 Dec 2022 00:14:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[empathy]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2781</guid>

					<description><![CDATA[<p>Empathy in the professional world isn’t a new concept, but its adoption is lagging. Look no further than the Great Resignation as proof that how companies treat people must change. Many people have readjusted their beliefs about work and life in the past few years, so empathy’s importance is greater than ever and has a pivotal role [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/">The Secure Methodology™ Step Six: Empathy</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Secure Methodology&#x2122; Step Six: Empathy' data-link='https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/' data-app-id-name='category_above_content'></div><div class="gac-project-details main-container">
<div class="gac-project-wrapper gac-content-page gac-touch-device">
<div class="gac-project-content">
<div class="gac-project-content-wrap">
<div>
<div class="gac-project-data-wrap">
<div id="gac-project-data" class="gac-project-data">
<p><img loading="lazy" decoding="async" class="size-medium wp-image-2782 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-300x197.png" alt="Empathy - Christian Espinosa" width="300" height="197" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-300x197.png 300w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-1024x674.png 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-768x505.png 768w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-1536x1010.png 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920-640x421.png 640w, https://christianespinosa.com/wp-content/uploads/2022/12/head-4041585_1920.png 1920w" sizes="(max-width: 300px) 100vw, 300px" />Empathy in the professional world isn’t a new concept, but its adoption is lagging. Look no further than the <a href="https://www.npr.org/2021/06/24/1007914455/as-the-pandemic-recedes-millions-of-workers-are-saying-i-quit" target="_blank" rel="noopener">Great Resignation</a> as proof that how companies treat people must change. Many people have readjusted their beliefs about work and life in the past few years, so empathy’s importance is greater than ever and has a pivotal role to play in cybersecurity.</p>
<p>Empathy is a key component in winning the cybersecurity war. As such, it’s the sixth step in the Secure Methodology, which is a guide of seven steps that helps cyber leaders transform their employees into high-functioning communicators and collaborators. It builds on the five preceding steps: <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">mindset</a>, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">acknowledgment</a>, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a>, and <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a>.</p>
<p>Let’s dive into empathy and why it’s a critical aspect of cybersecurity.</p>
<h2>Empathy Is Hard to Find These Days</h2>
<p>While empathy is critically absent in many technical folks, the rest of the world isn’t demonstrating it much, either. It doesn’t mean that people are naturally unkind; instead, their concept of doing things to support others and the greater good gets canceled by their focus on differences.</p>
<p>It’s easy to ground a worldview in differences and an us-versus-them mentality. If we don’t feel personally impacted by something, we’re glad to look the other way. If “others” are different, then many of us can feel it’s none of our concern.</p>
<p>Except, at the end of the day, we have so much more in common. First, we’re all humans and face many of the same challenges. There’s a microcosm of this happening in your cyber team, especially in their beliefs about others. They typically see nontechnical roles as “others” who could never understand what they do, which creates a wall for communication and collaboration.</p>
<p>Everyone will always have specific roles, but when they become the foundation of how you react to others, it’s not serving anyone. For example, saying, “Oh, he’s a salesperson and can’t understand security risk,” means someone’s already discounting them and looking at them like a caricature.</p>
<p>This initial premise creates an empathy void, which has consequences for cybersecurity.</p>
<h2>The Impact of the Absence of Empathy on Cybersecurity</h2>
<p>So, how does a lack of empathy affect cybersecurity? It can cause a lot of problems, which can have a devastating impact on risk.</p>
<h3>Technical Folks Can Be Intellectual Bullies</h3>
<p>Bullying in the workplace is just as common as in the schoolyard. When people cannot see the perspective of others, they tend to act condescending and be defensive in every conversation. They use their intellect to belittle others, which fosters distrust and resentment. Unfortunately, bullying is often part of cybersecurity culture and goes unchecked.</p>
<h3>Ego Cripples Empathy</h3>
<p>These bullies often only have concerns for themselves. They have a narrow view that doesn’t include the needs of others. It’s especially detrimental when managers have egos that stunt the growth of others. It’s toxic and hampers the capabilities of a team.</p>
<h3>Without Empathy, You Can’t Have a Team</h3>
<p>The basic principle of a team is a group of people working together to accomplish a goal or solve a problem. Empathy is a prerequisite for this. When it’s missing, you can’t have a team.</p>
<p>On the one hand, we all have some type of belief about our inabilities. You would think this would encourage us all to be more empathetic. The challenge for many technical people is that they want to cover up insecurities and reject empathy for themselves and others. As a result, the foundational trust of being teammates isn’t there.</p>
<h3>Empathy Emptiness Is More Than an Internal Problem</h3>
<p>A cyber team that doesn’t prioritize empathy also hurts the relationships it has with others, whether they are an internal or external client. Technical people are responsible for security, but not in a vacuum. They must work with others to understand the objectives and concerns of these parties. When they don’t, they create a greater divide and overcomplicate situations, which causes further ostracization.</p>
<p>The stakeholders want to be involved and understand threats and risks. Just because they aren’t technical people doesn’t mean they can’t understand these things. However, if cyber professionals keep them in the dark, it only helps cyber criminals.</p>
<h3>The Real Empathy Struggle for Technical People Is a Human Connection Problem</h3>
<p>In my career and experiences, I’ve learned that human connection is the root of the empathy struggle for technical folks. Obviously, connection is essential to empathy in any capacity. If we’re all lone wolves and only focus on ourselves, there’s no connection.</p>
<p>Striving to build a human connection is an asset anyone can appreciate. It improves communication, collaboration, and perspective. Those things make people better at their job and happier in life in general.</p>
<p>So, how do you break people out of their one-track minds and cultivate a cybersecurity culture built on empathy?</p>
<h2>How to Develop Empathy in Your Cyber Staff</h2>
<p>You may think that developing empathy in technical professionals is beyond impossible. You’re already ready to skip to the next step and leave this one out because empathy is too emotional. Fair enough, but I wouldn’t have included it in the Secure Methodology without a plan. It’s an entire chapter in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, and these are some excerpts that can help you find success.</p>
<h3>The Framework Starts With Cognitive Empathy</h3>
<p>There is more than one kind of empathy, and the focus here is <a href="https://christianespinosa.com/blog/cognitive-vs-affective-empathy-leadership/" target="_blank" rel="noopener">cognitive empathy</a>, which is the ability to understand someone else’s feelings and perspective. It’s somewhat different from its emotional counterpart, affective empathy, but it still has the same roots.</p>
<p>Additionally, you must frame your approach to differentiate between <a href="https://christianespinosa.com/blog/empathy-vs-sympathy/" target="_blank" rel="noopener">empathy and sympathy</a>. They are quite different. Empathy describes the choice to connect with someone and accept their perspective. Sympathy doesn’t require the perspective aspect. Rather, it’s merely the ability to feel sorrow for how someone else feels.</p>
<p>People can be sympathetic but not empathetic. It’s a good trait to have, but empathy is what can drive organizational change and success.</p>
<h3>Understanding Motivation</h3>
<p>Motivation is a recurring theme in the Secure Methodology and applies to empathy. Grasping what motivates an employee is a key to helping them become more empathetic. Their motivation ties to the role they play in cybersecurity and supports a perception of a team working together. If they get this, they’ll want to grow their empathy.</p>
<h3>Acknowledging Accomplishments</h3>
<p>When you recognize the hard work of your staff, you create positive connections with them. In turn, it becomes a way to foster empathy. In addition to acknowledging achievements, you should also highlight similarities, struggles, and perspectives. This can create further connections between teammates and enrich trust.</p>
<h3>Adapting Communication</h3>
<p>It starts with you and your communication if you want your people to exemplify cognitive empathy. You have to be an example through how you communicate, which means admitting uncertainty and not always having an answer. They may be more likely to do the same if you can do this. Adapting your communication is critical and includes:</p>
<ul>
<li>Avoid the word “why” because it triggers defensive responses.</li>
<li>Try making statements to uncover information, such as “Tell me what your plan is for this.”</li>
<li>Include the perspectives of others in how you communicate to demonstrate that the topic impacts many people.</li>
<li>Encourage people to explain those impacts on others when working through a cybersecurity challenge.</li>
<li>Continue to impress upon your team that listening is just as vital in communication as speaking.</li>
</ul>
<h3>Putting the Target Back on the Actual Enemy</h3>
<p>It may seem apparent, but the enemy in the cybersecurity ware is the hackers. Yet, the “otherism” I defined earlier pits cyber professionals against colleagues. For those people who are stuck in the mindset of us versus them, they forget who the actual bad guys are. In fact, they’re helping the bad guys by functioning without empathy.</p>
<p>Staff too busy trying to stay in control of every cyber discussion and decision refuse to let the needs and perspectives of others have a place. As a result, cybercriminals win because team cohesion is absent. This is the most dangerous environment to operate in and will likely end in a breach or incident.</p>
<p>In working toward greater empathy, you must be clear about who the adversary is and that it’s nobody in the room. Connection within your team and with clients is critical to being proactive and prepared for cyberattacks. You can outmaneuver the hackers if you consistently focus on this and encourage empathetic capabilities.</p>
<h2>Trust in Empathy to Revolutionize Your Cyber Culture</h2>
<p>All the work from the previous Secure Methodology steps will put you in a position to develop empathy with your technical people. Having this new approach should also help you make better hiring decisions in the future. The bottom line is that empathy isn’t an innate human quality. We have to learn it, and you’re in a position to help people do this. That’s good for them personally and professionally. Get more tips on empathy and exercises by reading <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="gac-footer-wrapper">
<div class="main-container"></div>
</div>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='The Secure Methodology&#x2122; Step Six: Empathy' data-link='https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='The Secure Methodology&#x2122; Step Six: Empathy' data-link='https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/">The Secure Methodology™ Step Six: Empathy</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Organizations Should Pivot to DevSecOps</title>
		<link>https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/</link>
					<comments>https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 04 Dec 2022 16:46:48 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[devsecops]]></category>
		<category><![CDATA[kaizen]]></category>
		<category><![CDATA[secure methodology]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2779</guid>

					<description><![CDATA[<p>The first iteration of making development and operations a tandem was DevOps. The strategy married the two in a practical and tactical mode and cultural philosophy. The objective was to automate and integrate software development and IT. However, it left out a fundamental principle — security. That was rectified with the origination of DevSecOps — [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/">Why Organizations Should Pivot to DevSecOps</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Organizations Should Pivot to DevSecOps' data-link='https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2780 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-300x168.jpg" alt="DevSecOps" width="300" height="168" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-300x168.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-1024x575.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-768x431.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-1536x863.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-2048x1150.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2022/12/roonz-nl-2xEQDxB0ss4-unsplash-640x359.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />The first iteration of making development and operations a tandem was DevOps. The strategy married the two in a practical and tactical mode and cultural philosophy. The objective was to automate and integrate software development and IT. However, it left out a fundamental principle — security. That was rectified with the origination of DevSecOps — the trifecta of development, security, and operations.</p>
<p>Security was previously an isolated segment of the process, coming at the end. Except that wasn’t very effective. Leaving security as an afterthought meant delays in new iterations and lots of rework, which was expensive. There was a realization that security shouldn’t be the red-headed stepchild but deserved a full seat at the table. Collaboration among all three can lead to many benefits, so why hasn’t every organization pivoted? And why should they now?</p>
<h2>Secure by Design</h2>
<p>The underlying foundation of DevSecOps is to be secure by design. Security is a consideration at the conception of the project, not an afterthought. Even in rapid deployment, which is part of today’s digital transformation schematic, security must be part of the concept.</p>
<p>DevSecOps and its importance to cybersecurity is that notion of everything developed and operated has consistency in security and that it’s scalable. The biggest clash in DevSecOps may be between your security experts and those who see security as a hindrance. This hurdle can seem insurmountable, and as a cyber leader, you may have to put yourself in a position to evangelize that security doesn’t have to impact agility.</p>
<h2>Creating a Balance: Security and Agility</h2>
<p>Business leaders in your organization demand velocity in development and operations. The reasons are apparent — greater efficiency, reduced costs, and more revenue opportunities. Those priorities may not be yours. You can understand the need for faster development to support these business objectives. Still, you’re also keenly aware that your company won’t meet its goals without security in applications and operations.</p>
<p>The question then becomes, how do you balance security and agility? From your perspective, you know that security and agility aren’t mutually exclusive. Security doesn’t halt agility and can support it. The misconception that security is a barrier to innovation isn’t new, yet it persists. It may even be present in your cyber team. As a result, you must make a case for security, knowing that your security mindset narrowly focuses on risk in a way that development and operations cannot.</p>
<p>Now, you’re at a crossroads of convincing technical and business stakeholders that all three can work harmoniously. There are plenty of guides to building DevSecOps, and I’m not going to rehash those. Rather, I want to show you how the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> and DevSecOps have much in common.</p>
<h2>Applying Secure Methodology Lessons to DevSecOps</h2>
<p>As a refresher, the Secure Methodology is a seven-step framework that helps cybersecurity leaders transform their staff into effective communicators and collaborators. It’s a pathway to take technically adept folks who lack the foundational skills to be curious, innovative, and welcome growth. In a way, the Secure Methodology has many things in common with DevOps and DevSecOps cultures. In all three concepts, there are synergies, including:</p>
<ul>
<li>Collaboration and shared responsibility</li>
<li>Accountability in every aspect of the cyber landscape</li>
<li>Standardization around cybersecurity practices</li>
<li>Aligning security with business objectives</li>
<li>Increased transparency and communication</li>
<li>Continuous learning and improvement</li>
<li>High empathy and trust</li>
</ul>
<p>These are all cornerstones of the Secure Methodology and DevSecOps. Next, we’ll go through the seven steps and how they can help you pivot your organization to a DevSecOps framework and culture.</p>
<h3>Step One: Awareness</h3>
<p>Awareness is the first step because you can’t move any further without it. It’s about being aware of yourself and the behaviors you can control. Additionally, there is the awareness of others. To be a successful professional and person, you have to have both.</p>
<p>When awareness is missing, it causes issues, including inadequate communication, resentment, animosity, competition, and many other things that detract from security.</p>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a> is a key component of DevSecOps from the position that all three parties must be aware of one another in such a framework. Development cannot move to operations without security, for example.</p>
<p>Using the tools of the Awareness step could help bridge the gaps between these groups and break them from their silos. The critical areas of focus should be:</p>
<ul>
<li>Perspective beyond a person’s limited view</li>
<li>Respectful and transparent communication</li>
</ul>
<p>Both things feed into the next step, Mindset.</p>
<h3>Step Two: Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> impacts everything we do. When it’s one of growth, we see opportunities, encourage feedback, and embrace uncertainty. When it’s fixed, we do the opposite. A growth mindset is the goal. Without it, you’ll never achieve security by design because there’s no ownership and accountability.</p>
<p>The problem with technical (and nontechnical) people is that they run from the truth and feel comfortable only with what they know. That’s risky behavior in the realm of cybersecurity. Moving mindsets is really hard. Not all will be able to hack it, but if it becomes part of your cyberculture, it’s ideal for a shift to DevSecOps, which is all about transparency and honesty.</p>
<p>There are some exercises to help with transformation as part of the Secure Methodology that can help with this. Another thing to note is that you have to talk about mindset in general when you have development, operations, and security staff together. You are outlining how each person needs to adapt their mindset for everyone to find success.</p>
<h3>Step Three: Acknowledgment</h3>
<p>Next is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a>, and it’s a big challenge for cybersecurity teams. There is a general lack of appreciation from supervisors to employees happening in every organization worldwide. The nature of cybersecurity is to focus on what went wrong because something always will. I’m asking you to refocus on all the things that go right every day.</p>
<p>Acknowledgment is all about feedback, which is critical in DevSecOps too. Not all feedback will be positive, but when it’s not, it should be constructive so that people learn from what occurred instead of being humiliated. Such actions lead to resentment, disengagement, and turnover, and that’s not good for any company or its security posture.</p>
<p>The act of acknowledging others makes people better at what they do. It builds their confidence and helps them grow their skills and be better collaborators and communicators, and every DevSecOps culture needs that to thrive.</p>
<h3>Step Four: Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the most important step. It will make or break any team or company. Without consistent and transparent communication, you’ll never achieve DevSecOps, even if everyone’s on board. It simply just doesn’t work.</p>
<p>Communication is about more than words. It’s how they are said and the nonverbal elements as well. The biggest communication barrier is often geek speak. Security, development, and operations may all have their own versions of this. They believe it makes them superior. In reality, it causes confusion, frustration, and distrust, which aren’t the kind of emotions you want in any room.</p>
<p>You and your entire organization must make improving communication a priority. You have to create an environment that appreciates clear and positive communication. I recommend looking at the exercises in my book for more details on this so that communication becomes an asset, not a weakness.</p>
<h3>Step Five: Monotasking</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">Monotasking</a> means concentrating on one task at a time, which is crucial in cybersecurity. The problem is that society, in general, discounts it as not being flexible or able to juggle multiple things. We’ve been conditioned to believe we should be multitasking. So, you have the challenging job or rewiring brains to understand that multitasking causes risk!</p>
<p>Well, it may not solely be on your shoulders because DevSecOps and its proponents will agree. While it’s the convergence of three areas, DevSecOps appreciates workflows and processes that build on each other. You don’t move to the next one until you finish the first one. If you can retrain your team to focus deeply on specific tasks without distractions, velocity and productivity will actually soar.</p>
<h3>Step Six: Empathy</h3>
<p>You may be wondering what empathy has to do with cybersecurity and DevSecOps. Except we’ve been building up to this with discussion around awareness, acknowledgment, and communication.</p>
<p>Empathy makes us human in many ways, but it’s become something lacking in the world and at work. At the end of the day, we’re all human, and if we can appreciate the perspective of others, we can be better problem-solvers and collaborators. It easily applies to DevSecOps because three independent groups have to empathize with the others and understand their position for it to work.</p>
<p>If you can build empathy in these teams, you can move to the final step, Kaizen.</p>
<h3>Step Seven: Kaizen</h3>
<p><em>Kaizen</em> is a Japanese term meaning “continuous improvement.” As people and professionals, we always want to be improving. We want the same for our development, operations, and security. It’s all about progress, no matter how small, as long as it’s constant.</p>
<p>It’s the ideal ending of the process, but not one that ever ends. It’s the same for DevSecOps. It’s a circle, not a line, after all.</p>
<p>You can learn more about the Secure Methodology and how it aligns with DevSecOps by reading my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. <a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Check out my Secure Methodology course</a> too.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Organizations Should Pivot to DevSecOps' data-link='https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Why Organizations Should Pivot to DevSecOps' data-link='https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/">Why Organizations Should Pivot to DevSecOps</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Create a Culture of Innovation in Cybersecurity</title>
		<link>https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/</link>
					<comments>https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 04 Dec 2022 16:29:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[ciso]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[tspitr]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2777</guid>

					<description><![CDATA[<p>Creating a cybersecurity culture isn’t a novel idea. It’s one that’s been around for some time, as the field and organizations realized that cybersecurity isn&#8217;t just about tools, protocols, and technical aptitude. Culture is much more about the people and, as a result, makes it much harder to build and sustain. People are unpredictable and don’t [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/">How to Create a Culture of Innovation in Cybersecurity</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Create a Culture of Innovation in Cybersecurity' data-link='https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2778 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-300x200.jpg" alt="Cybersecurity Culture" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2022/12/jason-goodman-Oalh2MojUuk-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Creating a cybersecurity culture isn’t a novel idea. It’s one that’s been around for some time, as the field and organizations realized that cybersecurity isn&#8217;t just about tools, protocols, and technical aptitude. Culture is much more about the people and, as a result, makes it much harder to build and sustain. People are unpredictable and don’t always have the skillsets to participate in culture. There’s an additional component of cultural manifestation, and it revolves around innovation. So, how do you develop a cybersecurity culture of innovation?</p>
<p>If it’s not a question you’re asking yourself as a cybersecurity leader, I would suggest you should. Innovation is the enemy of complacency. However, it requires cyber teams to look beyond their technical aptitude and leverage soft skills, which they may not have. It can seem like an uphill battle, but it&#8217;s worth considering the benefits it can bring your staff and business. Those advantages include satisfied employees, mitigation of risk, and the ability to meet continuous improvement goals.</p>
<p>So, let’s talk about fostering innovation in your cybersecurity culture.</p>
<h2>What Is a Cybersecurity Culture of Innovation?</h2>
<p>At the foundation of culture are people and behaviors. If those whose job is to protect data and networks have a closed mindset, fail to evolve their conceptions, or believe they are the smartest people in the room, culture will always be toxic. In these cases, risks become greater, turnover is high, and communication is nonexistent.</p>
<p>Conversely, a healthy culture has open-minded participants that want to work together effectively and continuously learn. That is an environment where innovation can thrive. It’s a place that welcomes new ideas, which can lead to a better security posture, engaged employees, and greater productivity. In this scenario, everyone benefits.</p>
<p>As you assess your current culture, you probably have gaps, some more than others. Filling those gaps aligns really well with the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, so I’ll be referring to that as I describe the steps to take. The Secure Methodology is a seven-step guide for cybersecurity leaders to leverage to develop the people skills of technical folks. These steps don’t focus on cyber skills but rather interpersonal ones, which is the core of culture.</p>
<h2>Building a Culture of Innovation</h2>
<p>No matter where you’re starting in the culture journey, these pivotal elements will be necessary to propel your organization into one that’s agile, forward-thinking, and connected. Here are the areas to help you formulate a plan.</p>
<h3>Cybersecurity Culture Involves Three Different Levels</h3>
<p>When considering any culture configuration, there are always three levels to consider, from the top to the individual. While they have different roles in the organization and responsibilities around cybersecurity, they must work together to maintain a culture.</p>
<h4>Leadership</h4>
<p>This segment is the c-suite, including the CEO and <a href="https://christianespinosa.com/blog/a-ciso-isnt-a-technical-role/" target="_blank" rel="noopener">CISO</a>. They must lead by example if they want the culture to permeate. They are top-level decision-makers, but those don’t happen in a vacuum. They need to understand risk and how cyber operations work, which requires clear, consistent communication from cyber teams and individuals. Unfortunately, communication is often the skill most lacking in technical employees. If those that set the strategy and budgets are only fed geek speak, culture leadership is working with a handicap.</p>
<p>Communication, of course, goes both ways. When leaders set a precedent on how they expect communication to flow, it can break down some barriers. In the end, the c-suite needs communication development, as well. It’s especially true regarding what questions they ask, which should be more granular than they might currently be.</p>
<h4>Team</h4>
<p>Your cyber team comprises people with various skill sets, experience, and expertise. If they can build a coalition that taps into this, they’ll be at a good place regarding culture. However, we’re talking about behavior, communication, and cooperation. Those things are usually the Achilles’ heel of any cyber team.</p>
<p>The team dynamic and evolving it is a big part of the Secure Methodology. Its guidance takes into account the typical lack of people skills and how that impacts cybersecurity culture. Too often, your team operates in silos and wants to continue in this way. Many times, it’s about a fear that others will find out they don’t know everything. Except that’s precisely the kind of mindset you need to innovate!</p>
<p>When working on culture at this level, the Secure Methodology is an excellent framework that you can use to cultivate communication skills, awareness, empathy, and more.</p>
<h4>Individuals</h4>
<p>The last layer of culture is the individual. What applies here is similar to the team level with caveats. The biggest of those is motivation, as each person has their own. At this level, as the leader, you must make specific connections to understand that individual’s capacity to change and grow. It’s the most challenging part of cultural shifts, and not every person on your team will be ready for this.</p>
<p>The Secure Methodology includes exercises throughout the seven steps to assist with this. How each person reacts to these will determine their long-term cultural fit.</p>
<p>Now that we’ve looked at each level of culture, here are some more tips you can use to further the pursuit of innovation.</p>
<h3>Find Cultural Evangelists</h3>
<p>Within your cyber staff, you’ll find those that are all-in on cementing culture as innovative. These people already have a good base of people skills and will prosper in this new dynamic. Assign those employees to be cultural evangelists. They can work together to develop training and upskilling opportunities. Since it’s coming from their peers, others may find this more inviting and appealing.</p>
<h3>Define the Language of Innovation</h3>
<p>Earlier I discussed the issues in <a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">communication</a> among cyber professionals and mentioned their love of geek speak. Many use this language because they don’t want to reveal their weaknesses or limitations. It’s your job to banish this language and identify what the tenets of communication should be, which can include:</p>
<ul>
<li>Eliminating jargon that has no purpose</li>
<li>Encouraging and promoting active listening skills, which are just as important as language</li>
<li>Using inclusive language so that those individuals outside of cyber teams would understand</li>
<li>Reframing communication as a way to reach a result that technical people can relate to</li>
<li>Simplifying messaging</li>
<li>Praising positive communication moments to reinforce the value of it</li>
<li>Outlining how clear communication leads to innovation</li>
</ul>
<h3>Transform Fixed Mindsets into Growth Mindsets</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is the second step in the Secure Methodology, and it is critical to culture. People either have a fixed mindset or a growth mindset. You, of course, want professionals with the latter. That doesn’t mean those with fixed ones can’t evolve and grow, but it does take work.</p>
<p>A fixed mindset hampers your organization’s ability to be proactive in security and forward-thinking. These folks don’t want to innovate around this because it’s too unknown and uncertain. It will also erode culture. Here are some key steps to transform mindsets:</p>
<ul>
<li>Coaching and reflection: When communicating with a fixed mindset, asking the right questions matters. You need to take them back to a moment when their fixed mindset was a barrier. Such a moment could instigate reflection and more awareness of their behaviors.</li>
<li>Asking why: Again, questions posed to these folks can create aha moments. There’s an exercise called the <a href="https://christianespinosa.com/blog/finding-your-purpose-in-life-understanding-the-7-levels-deep-exercise/" target="_blank" rel="noopener">7 Levels Deep Exercise</a>, which I recommend. It will help uncover motivations.</li>
<li>Praising mindset changes: The third thing to do is to acknowledge and recognize when you see mindset shifts from fixed to growth. Something as simple as this can make a significant impact on future behavior.</li>
</ul>
<p>To round out this discussion, I want to leave you with some additional insights into innovation and security.</p>
<h2>Innovation and Security Aren’t Foes</h2>
<p>One of the biggest misconceptions in the cyber world is that security is a barrier to innovation. Such a perspective is dangerous to your culture and ability to defend data and networks in the cyber war. Security does not impede innovation. In fact, they work together very well with the proper perspective.</p>
<p>It’s not unlike the principles of DevSecOps, where development, security, and operations convene. In this strategy, security is part of the conversation from the beginning. It has equal weight with development and procedures, as it should. You cannot have innovation without security. Innovation, at its core, is about devising solutions that enable better results. If security is outside the innovation bubble, you may have a good idea, but it won’t come to fruition. It won’t be deployable and scalable.</p>
<p>So, you must build the case that they both can coexist harmoniously and should always have a link. Otherwise, you’ll waste time, money, and resources. If you leverage the tips and ideas from this post, you can easily demonstrate how vital security is to innovation.</p>
<p>If you’re ready to build your culture of innovation, you should learn more about the Secure Methodology, which you can find in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. Additionally, I have a <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Secure Methodology course</a>, which delves further into the seven steps. Check them both out today.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='How to Create a Culture of Innovation in Cybersecurity' data-link='https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='How to Create a Culture of Innovation in Cybersecurity' data-link='https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/">How to Create a Culture of Innovation in Cybersecurity</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/how-to-create-a-culture-of-innovation-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
