<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>soft skills Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/soft-skills/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/soft-skills/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Sun, 23 Jul 2023 19:10:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>soft skills Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/soft-skills/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#8216;Qualified&#8217;</title>
		<link>https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/</link>
					<comments>https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 23 Jul 2023 19:10:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[skills gap]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2840</guid>

					<description><![CDATA[<p>It’s no secret that the cybersecurity field has a talent shortage. Experts project that over 3.4 million jobs in the industry remain unfilled. The reasons behind this are numerous—burnout is churning people out, younger generations aren’t entering cybersecurity, and qualified candidates aren’t plentiful. The last one is worthy of discussion. As the industry evolves, so should the [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/">Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#8216;Qualified&#8217;</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#039;Qualified&#039;' data-link='https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/' data-app-id-name='category_above_content'></div><p><img fetchpriority="high" decoding="async" class="size-medium wp-image-2841 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-300x200.jpg" alt="cybersecurity skills" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/07/branko-stancevic-GI1hwOGqGtE-unsplash-640x427.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />It’s no secret that the cybersecurity field has a talent shortage. Experts project that over <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">3.4 million jobs</a> in the industry remain unfilled. The reasons behind this are numerous—burnout is churning people out, younger generations aren’t entering cybersecurity, and qualified candidates aren’t plentiful. The last one is worthy of discussion. As the industry evolves, so should the idea of “qualified.” To do this, organizations need to shift to cybersecurity skills-based hiring.</p>
<h2>The Current Consensus on &#8216;Qualified&#8217;</h2>
<p>So, what does being qualified mean to those hiring cyber professionals? In the <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">State of Cybersecurity 2022 Report</a> from ISACA, 55% of cyber leaders said applicants aren’t well qualified. They find people lacking in key areas, including prior hands-on experience, credentials, hands-on training, employer recommendations, degrees, and association memberships.</p>
<p>So, the question is—do these things demonstrate that someone will excel and thrive in cybersecurity? If you look further at the data from the study, the importance of what hiring managers seek doesn’t necessarily align with the skills they believe are most valuable. The most sought-after skills include hard and soft ones:</p>
<ul>
<li>Soft skills of communication, flexibility, and leadership</li>
<li>Cloud computing</li>
<li>Security controls regarding endpoints, networks, applications, and implementations</li>
<li>Coding skills</li>
<li>Software development-related topics, such as languages, machine code, testing, and deployment</li>
<li>Data-related topics</li>
<li>Network-related topics</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Computing devices, including hardware, software, and file systems</li>
</ul>
<p><a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">Soft skills</a> were at the top of the skills gap list. Technical aptitude is also vital, but just because someone has a degree or credential doesn’t mean they know how to apply them. Narrow-mindedness on this can actually lead to hiring “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>,” who look great on paper but don’t have the aptitudes or abilities to be successful.</p>
<p>In an environment where hiring is competitive and challenging, it’s time to readjust your definition of qualified with skills-based hiring in cybersecurity.</p>
<h2>What Is Skills-Based Hiring?</h2>
<p>Skills-based hiring is an approach to recruitment that focuses on someone having specific competencies and aptitudes. It’s a new method that shifts the emphasis from traditional screening using education, credentials, and previous experience.</p>
<p>It seeks to look at someone holistically, considering their abilities, attitudes, and adaptability. Hiring based on skills makes a lot of sense for cybersecurity. A good example of this would be that an individual has proficiency in programming languages but doesn’t have a degree in computer science. Another example would be that a person has immense knowledge of cloud computing but not a certification.</p>
<p>Skills-based hiring also looks at potential candidates beyond their technical prowess. Since it looks at someone’s complete profile, you can also evaluate their soft skills, which are desperately needed!</p>
<h2>Experts Are Adamant About Skills-Based Hiring in Cybersecurity</h2>
<p>The push to hire based on skills is something that experts are recommending and urging. At a recent House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection hearing, many were there to discuss the workforce shortages. Their advice—<a href="https://www.meritalk.com/articles/cyber-workforce-experts-pound-table-for-skills-based-hiring/" target="_blank" rel="noopener">stop requiring college degrees</a>. The group said that to strengthen the cyber pipeline, the Federal government needs to take the lead in skills-based cybersecurity hiring.</p>
<p>Companies that are sounding the alarm on cybersecurity deficits can take on this new way of hiring. They could even fund skill development when they see someone with potential. Those people could come from many different places—military veterans, people seeking to change careers, new high school graduates, and even internal folks interested in the field. If there’s passion, curiosity, and appeal, you can nurture that to develop the person.</p>
<h2>Why Is Skills-Based Hiring the Future of Cybersecurity?</h2>
<p>The future of cybersecurity looks a little stark for the good guys. If you don’t have enough skilled employees, you’re automatically more at risk. While you can close some gaps with automation, human-in-the-loop will always be a strong component of all cyber operations. If the field makes this needed progression toward skills-based hiring, the future looks more manageable and optimistic.</p>
<p>Skills-based hiring finds those you may overlook or discount. It also has much to do with cultural fit and someone’s ability to be agile and flexible. A college degree, experience, or credentials don’t necessarily demonstrate any of these things. Further, if you hire based on skills—hard and soft—you are more likely to retain that person long-term.</p>
<p>By using cybersecurity skills-based hiring, you can:</p>
<ul>
<li><strong>Discover people with talent and a growth mindset</strong>: When you focus on what someone can do and their range of attributes, you’re likely to find great candidates. They don’t fit the familiar mold, but that can be a good thing. If they have technical knowledge and possess a <a href="https://christianespinosa.com/blog/fixed-vs-growth-mindset/" target="_blank" rel="noopener">growth mindset</a>, they could become superstars with some skill development and coaching.</li>
<li><strong>Attract younger generations</strong>: Currently, only <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the cyber workforce is 34 or younger</a>. It’s not sustainable, so the urgency to get Gen Z to give cybersecurity a chance is huge. This generation and those even younger have different expectations about work and may avoid cybersecurity because they believe it to be rigid, stale, stuffy, and unchanged. Skills-based hiring allows you to change this false narrative by emphasizing the importance of soft and hard skills. If you’re creating a culture around skills, it should also be one of transparent communication, collaboration, and continuous improvement. Gen Z will find this much more attractive.</li>
<li><strong>Create equity in hiring practices</strong>: If you’re following the skills when you recruit, you’ll be able to streamline the process and ensure that candidates get the same treatment regardless of their resumes. It makes it more equitable as well. The cyber field has not always been accessible or friendly to all demographics. For example, women represent a small number of cyber professionals. If you reimagine how you hire based on specific skills, you may see more female candidates.</li>
<li><strong>Develop people over time</strong>: Skills-based hiring is also an investment in your people. You make them part of your team with expectations and requirements. This could include technical courses, hands-on training, and soft skill development. With this approach, you are making it clear that you want the person to be accessible, and you will give them the resources they need to do so. Such a strategy improves employee satisfaction and retention.</li>
</ul>
<p>With all this to gain, the next step is implementing skills-based hiring.</p>
<h2>How Do You Shift to Skills-Based Hiring in Cybersecurity?</h2>
<p>If you want to go in this direction, you’ll need to work on a few areas so you can recruit and hire smarter. It’s not a massive change if you’ve already been assessing skills over diplomas and certifications. It will, however, require you to eliminate old ways of thinking about cybersecurity.</p>
<p>It’s a cultural shift where you want to banish all the stereotypes associated with technical folks—they’re bad communicators and collaborators who only see the world of ones and zeros. Yes, people in technical fields tend to be more pragmatic and logical, but they often don’t deserve the other labels. Your job is finding people outside the box who want to evolve cybersecurity with you.</p>
<p>Here are some tips:</p>
<ul>
<li><strong>Redefine your job descriptions and requirements</strong>: Start by eliminating the need for a four-year degree and specific certifications. Instead, focus on core competencies, soft skills, personality, communication capabilities, and drive. If there are specific things the person needs to be proficient in, emphasize those, but don’t limit this expertise to having a degree or certification.</li>
<li><strong>Look for internal talent</strong>: Internally posting new jobs is a typical step, but if you do, add some context about whom you’re looking for beyond technical skills. There could be some smart and capable people that want to move into cybersecurity but don’t know how to start. Create relationships with those folks and work out a plan to upskill and reskill them.</li>
<li><strong>Use assessments to evaluate technical and personal skills</strong>: You need people to demonstrate they have the abilities you desire. You can assess them with different tests to understand how they’ll perform. Don’t limit this to only technical skills. You also want to know about their ability to communicate, lead, problem-solve, and think critically.</li>
<li><strong>Get to know people during the interview process</strong>: This part of hiring can be challenging for you and candidates. They’re nervous, and you’re cautious. I urge you to get to know the person and their philosophy on cybersecurity and why they want to be in the industry. You can learn so much from someone when you ask their opinion and perspective. You’ll be able to recognize genuine interest and desire from these discussions.</li>
</ul>
<h2>Skills-Based Hiring in Cybersecurity: Keep Developing Your People</h2>
<p>Hiring based on skills fits the field of cybersecurity well. After all, you want employees to be able to deal with a dynamic environment. When you hire this way, you’re likely to find people with the right mix of abilities who want to be there for all the right reasons. Once they are on staff, keep developing them with an emphasis on soft skills. It’s not an easy journey, but you can find lots of advice on how to do this in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, which features the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step framework for improving and building these capabilities in technical folks. <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">Check it out by getting your copy today.</a></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#039;Qualified&#039;' data-link='https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#039;Qualified&#039;' data-link='https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/">Cybersecurity Skills-Based Hiring: Why Tech Leaders Need to Shift Their Idea of &#8216;Qualified&#8217;</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybersecurity-skills-based-hiring-why-tech-leaders-need-to-shift-their-idea-of-qualified/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Reskilling and Upskilling Talent Can Help Shrink the Cybersecurity Skills Gap</title>
		<link>https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/</link>
					<comments>https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 15 May 2023 03:01:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[skills gap]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2823</guid>

					<description><![CDATA[<p>One of the most important topics in cybersecurity is the talent shortage. Reports and data back up the consensus that we don’t have enough people for all the jobs and that new generations aren’t entering the field. Further, CISOs and other cyber leaders have noted it’s one of their biggest challenges. Finding qualified people has [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/">Reskilling and Upskilling Talent Can Help Shrink the Cybersecurity Skills Gap</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Reskilling and Upskilling Talent Can Help Shrink the Cybersecurity Skills Gap' data-link='https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2824 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920-300x200.jpg" alt="cybersecurity learning" width="300" height="200" srcset="https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920-640x427.jpg 640w, https://christianespinosa.com/wp-content/uploads/2023/05/sign-gf7027ce14_1920.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" />One of the most important topics in cybersecurity is the talent shortage. Reports and data back up the consensus that we don’t have enough people for all the jobs and that new generations aren’t entering the field. Further, CISOs and other cyber leaders have noted it’s one of their biggest challenges. Finding qualified people has become a barrier to building and evolving cyber resilience. The cybersecurity skills gap runs parallel with this, as many cyber professionals or aspiring ones don’t have the qualities employers want.</p>
<p>This cycle of shortages and gaps will continue, leaving organizations facing greater risk in cyber operations. So, what’s the answer? There is no quick fix to this dilemma. However, there may be something we’re all overlooking — reskilling and upskilling talent. Making this investment in people develops them into capable cybersecurity specialists who possess both the soft and technical skills a company needs to survive and thrive in the modern age of business.</p>
<h2>What Are the Cybersecurity Skills Gaps?</h2>
<p>Overall, we can look at the industry and see it’s woefully understaffed. The <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">ISC 2022 Cybersecurity Workforce Study</a> made headlines with its findings that over 3.4 million jobs in the industry remain unfilled. As a result, these organizations feel the consequences of straining existing resources, inability to conduct risk assessments, and greater risk.</p>
<p>It doesn’t necessarily mean there aren’t people who want to work in cybersecurity. Although, it’s hard to be too optimistic about younger generations joining the field, as millennials and Gen Z aren’t flocking to be cyber experts. In fact, less than <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">12% of the workforce is 34 or younger</a>!</p>
<p>The bigger problem is the gap in hiring people who can hit the ground running. They aren’t meeting the expectations of those employing them, with <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">55% of cyber leaders</a> stating applicants aren’t well qualified. So, what qualifications do they think candidates need? Here’s what they said, in order of importance:</p>
<ul>
<li>Prior hands-on cybersecurity experience</li>
<li>Credentials</li>
<li>Hands-on training</li>
<li>Employer recommendations</li>
<li>University degree</li>
<li>Association membership</li>
</ul>
<p>But how well do these things determine if someone can do the job? It’s hard to get hands-on experience or training without a starting point. Credentials don’t always equate to someone with the right skills. We’ve previously discussed the term “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>” and how they don’t represent “quality.” Rather, paper tigers have all the right credentials on paper but don’t have the aptitude or ability to be successful cyber professionals.</p>
<p>A university degree can be the same as credentials. A four-year degree doesn’t make someone qualified, either. I would argue that expecting a college education is a problem in cybersecurity recruitment, which <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">52% of organizations require</a>. There are many bright and capable people out there that you’re dismissing.</p>
<h3>The Biggest Skills Gaps: Soft and Hard Skills</h3>
<p>In the same research, cyber leaders also noted the biggest skills gaps:</p>
<ul>
<li>Soft skills (e.g., communication, flexibility, leadership)</li>
<li>Cloud computing</li>
<li>Security controls (e.g., endpoint, network, application, implementation)</li>
<li>Coding skills</li>
<li>Software development-related topics (e.g., languages, machine code, testing, deployment)</li>
<li>Data-related topics (e.g., characteristics, classification, collection, processing, structure)</li>
<li>Network-related topics (e.g., architecture, addressing, networking components)</li>
<li>Pattern analysis</li>
<li>System hardening</li>
<li>Computing devices (e.g., hardware, software, file systems)</li>
</ul>
<p><a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">Soft skills</a>, the number one cybersecurity skills gap, isn’t surprising. Without these capabilities, it doesn’t matter how technically gifted someone is; they’ll flounder and actually cause problems in the organization. When asked specifically what soft skills they find attractive, leaders said communication, critical thinking, problem-solving, collaboration, and attention to detail.</p>
<p>Developing these isn’t a priority for most credential or educational institutions. I suppose they think the working world will figure this out and help workers cultivate it. Except most aren’t, so the cycle of bad hiring continues.</p>
<p>All this data emphasizes that we’re at a crossroads in the industry. You do have control here to break the cycle with upskilling and reskilling, focusing on hard and soft skills.</p>
<h2>Upskilling and Reskilling to Build a Better Pipeline of Cybersecurity Talent</h2>
<p>The strategies and decisions you make today regarding recruitment and hiring impact the short and long-term. If you’re going to keep a pipeline running, you will have to look outside the normal parameters. Finding people passionate about cybersecurity and helping them become adept at it will serve you well. Here are some tips on how to implement this into your hiring plan.</p>
<h3>Look for internal talent.</h3>
<p>There may be people within your organization now wanting to pursue cybersecurity. They may be in a non-technical position now, but they have potential. Creating a mentorship program within your company could build this bridge. Encourage those interested in the field to express their interest and join the community. Assess them based on their soft skills and capacity to learn technical knowledge. If you find some great people to develop, the business could pay for specific courses to help them level up their hard skills. Once they have the basics, continue to support them through learning and training.</p>
<h3>Evaluate your current entry-level staff and their gaps.</h3>
<p>You’ve likely hired some entry-level positions as of late. You saw their potential and recognized their abilities, but you also knew things were missing. Those can include soft and hard skills. Building a relationship with them and understanding their motivations and career goals can inform whom to invest in with upskilling and reskilling opportunities. If you invest in them, they’ll feel valued and appreciated, which will go a long way toward <a href="https://christianespinosa.com/blog/cybersecurity-retention-how-to-combat-turnover-and-keep-employees-engaged/" target="_blank" rel="noopener">cybersecurity retention</a>.</p>
<h3>Stop looking at only a resume.</h3>
<p>A resume is a piece of paper with a quick summary of what someone has accomplished. It’s not their whole story. It’s too easy to reject resumes based on if they have the right keywords or phrases. Pay more attention to their abilities, aptitudes, and attitudes. How can you do this? Consider a short questionnaire that peels back the layers and gives you more insight. You may be passing up great candidates otherwise.</p>
<h3>Develop every team member’s people skills.</h3>
<p>The last piece of advice is to focus on people skills development. You may think it’s an impossible task, and getting people to change and grow is hard. I found it to be such a deficit in the field that I created the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step guide that helps cyber leaders transform technical folks into excellent communicators, problem solvers, and collaborators. Here’s a preview of what each step entails and why it supports upskilling and reskilling.</p>
<h4>Awareness</h4>
<p>We start with <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>, which includes being cognizant of the self and others. When it’s absent, people don’t realize the impact of their behaviors, which can cause conflict and resentment. If you can move people into a state of awareness, they’ll have greater respect for others and think more intentionally about how they act.</p>
<h4>Mindset</h4>
<p>A <a href="https://christianespinosa.com/blog/fixed-vs-growth-mindset/" target="_blank" rel="noopener">fixed mindset</a> does no one any good. Encouraging people to shift to one of growth is good for everyone. In this step, I recommend the 7 Levels Deep exercise. From this, you can understand motivations and why people act as they do, which can break the fixed mindset.</p>
<h4>Acknowledgment</h4>
<p>Acknowledgment starts with you and is an act of appreciation. When you create a culture where this exists, it will strengthen trust and confidence. It’s also about redefining cybersecurity culture from one where the expectation is that technical people know everything and can do everything. All that does is create burnout. People need grace and also need to know you can give it to them.</p>
<h4>Communication</h4>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> is the number one soft skill for a reason — it’s the core of everything in life. If communication is poor, rude, non-inclusive, or nonexistent, you have breakdowns that elevate risk and animosity. In this step, you’ll be using activities to get to the root of communication, which is just as much about listening as talking. Creating a space where communication is expected, transparent, and honest could be the greatest upskilling you provide to someone.</p>
<h4>Monotasking</h4>
<p>Monotasking focuses on the details, another soft skill missing in candidates. If you’ll recall, in acknowledgment, we discussed how cyber professionals couldn’t do everything. So, with this step, you will introduce monotasking and blocking off time on their schedules to complete one thing without distractions. The result will likely be greater productivity.</p>
<h4>Empathy</h4>
<p>In the Secure Methodology, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">cognitive empathy</a> is the learning. It’s understanding someone’s feelings and perspectives and is key to communication and collaboration. Once people grasp how important this is in work and life, they often have “aha” moments and finally realize how critical it is to be open to the views of others.</p>
<h4>Kaizen</h4>
<p>Kaizen is a Japanese term that translates to “continuous improvement.” So, this step continues forever and can teach people how to be adaptable and flexible. They can continually improve soft and technical skills throughout their career.</p>
<h2>Reskill and Upskill With the Secure Methodology</h2>
<p>If you want to reimagine how your recruit, hire, and retain, the Secure Methodology is a vital resource. Reskilling and upskilling are possible with this framework. <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Learn more by checking out the Secure Methodology course today</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Reskilling and Upskilling Talent Can Help Shrink the Cybersecurity Skills Gap' data-link='https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Reskilling and Upskilling Talent Can Help Shrink the Cybersecurity Skills Gap' data-link='https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/">Reskilling and Upskilling Talent Can Help Shrink the Cybersecurity Skills Gap</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/reskilling-and-upskilling-talent-can-help-shrink-the-cybersecurity-skills-gap/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction</title>
		<link>https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/</link>
					<comments>https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 15 May 2023 02:52:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2821</guid>

					<description><![CDATA[<p>Everybody in cybersecurity has funny and unbelievable stories of users gone wrong. On the other side of the equation, users have their own stories that paint technical folks as rude and unhelpful. In either case, there’s a lot of stereotyping going on, but some of it is, well, true. What it amounts to is cyber [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/">Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction' data-link='https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/' data-app-id-name='category_above_content'></div><p><img decoding="async" class="size-medium wp-image-2822 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-300x196.jpg" alt="cybersecurity user experience" width="300" height="196" srcset="https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-300x196.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-1024x668.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-768x501.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-1536x1002.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920-640x418.jpg 640w, https://christianespinosa.com/wp-content/uploads/2023/05/experience-gdc3a1c0a0_1920.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" />Everybody in cybersecurity has funny and unbelievable stories of users gone wrong. On the other side of the equation, users have their own stories that paint technical folks as rude and unhelpful. In either case, there’s a lot of stereotyping going on, but some of it is, well, true. What it amounts to is cyber teams having a “bad” reputation. Many consider technical folks to be arrogant, hostile, and condescending. If that’s the culture in your organization, it’s no wonder that people have little respect for them. In fact, they’ll do anything to avoid interaction with them, which often increases risk.</p>
<p>So, what can you do as a cybersecurity leader to broker peace between the two? While users certainly have some blame for the dynamic, much of it comes down to a lack of soft skills, causing friction and undermining relationships.</p>
<h2>Why Your Cyber Team Has a “Bad” Reputation</h2>
<p>One of the biggest reasons that cyber professionals earn their reputation is that many consider them a bottleneck. That’s because security must be a part of any major IT development or implementation. Often, the barrier they create isn’t their fault. Sometimes, cybersecurity isn’t in the initial plans, and then you get involved. To avoid such an impasse, your organizational culture regarding security has to, as well.</p>
<p>Security can’t be an afterthought. It needs to be a forethought, so you have to express this with the C-suite and leadership. When given a chance to have a seat at the table, your people must engage with the business side in a way that’s outside of their comfort zone. They have to be inclusive in their communication and explanation. Otherwise, they’ll posture and use jargon, making them seem like jerks and continuing the belief cycle that technical people are difficult.</p>
<p>A team’s reluctance to collaborate effectively is also a common problem. Cyber strategies and decisions don’t reside only with your team. You need input and support from others. As a result, cyber professionals must be cooperative when it comes time for new implementations and approaches to combat risk.</p>
<p>Key to this is their ability to define risk clearly with other stakeholders who aren’t experts. Your people are, and they have great technical knowledge. This intelligence often creates the desire to be the smartest person in the room. They may be, technically speaking. However, they have to be able to work with others to establish new strategies to protect the company.</p>
<p>While your people often don’t do themselves any favors in being likable, it’s not all their fault. Cybersecurity can be a scapegoat for missed implementation dates, backlogs, and failed digital transformation objectives. It’s easy for others to blame your team, believing them to be against innovation. They may hold some responsibility, but it goes back to cultural foundation issues about how the organization prioritizes and empowers a cyber team.</p>
<p>You have some control over how the company looks at cybersecurity, but you have even more so over your team. For the sun to set on the stereotype of cyber professionals being obstinate, your people must develop <a href="https://christianespinosa.com/blog/5-people-skills-every-successful-cybersecurity-professional-possesses/" target="_blank" rel="noopener">people skills</a>.</p>
<h2>Why Are Cyber Professionals “Bad” at Soft Skills?</h2>
<p>So, why exactly do technical people often have gaps in soft skills? Is it something innate and unfixable? Absolutely not, and it’s a symptom of something bigger. There are many bright, highly communicative, and adaptable people in the field. Some require a nudge toward the right direction to be vulnerable and ready for change.</p>
<p>If you look at the industry and consider where the struggles exist in people skills, you can come to these conclusions:</p>
<ul>
<li>They often think in black and white, while most everything lives in gray. When they lock into a mindset that there’s one right answer and many wrong ones, it impacts their perspective. So, they stick to the script even when factors change.</li>
<li>Technical folks often have insecurities and fears that they want to keep hidden. They believe not knowing everything is a weakness, but how could you possibly know everything? These feelings keep them from asking questions and engaging in dialogue with others.</li>
<li>Communication isn’t easy for them, especially if they can’t posture and use jargon. When they do, they alienate others quickly and live up to their reputation. <a href="https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/" target="_blank" rel="noopener">Communication</a> is the single most important skill a cyber professional can possess.</li>
<li>Cyber professionals also may lack awareness of themselves and others. They don’t see how their tendency to be aloof and overly technical prevents trust and cooperation. They also have a hard time understanding the perspectives of the business side. Without this awareness, they’ll continue to be outsiders.</li>
</ul>
<p>Helping your team work through these flawed behaviors won’t be easy, but there is a way to do it with the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />. It’s a seven-step guide for cyber leaders to leverage to transform technical minds into ones with strong soft skills.</p>
<h2>How the Secure Methodology Can Improve the Reputation of Cybersecurity</h2>
<p>The Secure Methodology is a proven framework to cultivate technical folks into excellent communicators and collaborators. Next, we’ll review all seven steps with an introduction to how the lessons of each phase develop people skills.</p>
<h3>Step One: Awareness</h3>
<p>The first step is <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">Awareness</a>, which I mentioned earlier as a reason technical people can’t connect with others or themselves. When they lack Awareness, it creates a lot of blind spots, which impact communication and set the stage for more technical posturing.</p>
<p>Technical people have to be willing to open themselves up to new perspectives. You can foster this with coaching around communication and understanding their motivations. In this step, you’ll have access to exercises that move people outside of their comfort zone, opening their eyes to a wider world.</p>
<h3>Step Two: Mindset</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-two-mindset/" target="_blank" rel="noopener">Mindset</a> is next and builds on learnings from Awareness. Right now, many of your people likely have a fixed mindset, which keeps them from growing and evolving. Shifting to a growth mindset is what you want to accomplish. They have to open their minds to more possibilities beyond black-and-white thinking. This step features approaches to help people with reflection and accountability.</p>
<h3>Step Three: Acknowledgment</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-three-acknowledgment/" target="_blank" rel="noopener">Acknowledgment</a> is a critical aspect of any department or industry. When there’s little positive acknowledgment, employees can become disengaged and resentful. In cybersecurity, the most common acknowledgment is negative. So, it’s this cycle of being fearful of any error, causing some to do nothing.</p>
<p>Acknowledgment must start with you. Positive reinforcement is vital, and you should do it publicly. It tells people what they do matters, and ensuring they understand how their contributions help the company can be key to their desire to be better team players. This step has activities to develop this through rapport and trust.</p>
<h3>Step Four: Communication</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication</a> has its own step but is pivotal in every phase. Communication skills are necessary for any job, but cyber professionals have often gotten away with being bad at it. Technical folks need to learn how to communicate better within the team and with others who are technically adept.</p>
<p>Much of this comes down to the simplification of the message. They don’t need to give a monologue to express risks and threats. Coaching exercises in this step will promote creating an inclusive, shared language and active listening. Much of this involves reframing the interactions and reminding your people that others aren’t the enemy. Encourage them to stop hiding behind complex explanations and to strip communication down to informing others and asking questions.</p>
<h3>Step Five: Monotasking</h3>
<p>Aren’t technical professionals supposed to be great multitaskers? Unfortunately, many people believe this to be true, and multitasking has its place. However, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-five-monotasking/" target="_blank" rel="noopener">monotasking</a> is a necessity for improving people skills. When someone multitasks, there’s often a feeling of pressure, which can cause more mistakes.</p>
<p>Encourage your people to have specific monotasking periods in their day where they focus all their energy on one task. They’ll find they’re more productive with this kind of schedule. Challenge your team to practice this and block out distractions.</p>
<h3>Step Six: Empathy</h3>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">Empathy</a> is a crucial step to transforming your cyber team. When your employees can put themselves in the shoes of others, the us vs. them mentality can fade away, and that’s necessary to eliminate their “bad” reputation.</p>
<p>Empathy, however, is something to develop. It’s not a natural part of being human. It requires them to care about what they do, the organization, and their colleagues. All the steps leading to this one have set the stage for empathy. If your staff can excel here, they’ll be the collaborators everyone needs them to be.</p>
<h3>Step Seven: Kaizen</h3>
<p>The final step is kaizen, which is a Japanese term meaning “continuous improvement.” Within the Secure Methodology, it’s the action of analyzing root causes. You can then uncover the real problems and work toward overcoming them. This step doesn’t end, as it’s a continuous state of adapting and evolving.</p>
<h2>Rid Your Cyber Team of Their “Bad” Reputation</h2>
<p>Now is the time to drive change in your employees so they can contribute more effectively. When they do, it’s good for security and their long-term job satisfaction. <a href="https://programs.christianespinosa.com/the-secure-methodology" target="_blank" rel="noopener">Take the first step by checking out the Secure Methodology course</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction' data-link='https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction' data-link='https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/">Does Your Cyber Team Have a “Bad” Reputation? Why Their Lack of Soft Skills Causes Friction</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/does-your-cyber-team-have-a-bad-reputation-why-their-lack-of-soft-skills-causes-friction/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Do Different Industries Need Cyber Professionals to Have Unique Skills?</title>
		<link>https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/</link>
					<comments>https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Thu, 13 Apr 2023 01:11:10 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cyber professional]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2809</guid>

					<description><![CDATA[<p>Being a cyber professional involves similar work, no matter the industry. There are many foundational practices and required skills that apply in every vertical. However, some cyber roles require specialized experience or attributes. In building your cyber workforce, this is something to consider. You don’t necessarily need to hire based on someone matching every line [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/">Do Different Industries Need Cyber Professionals to Have Unique Skills?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Do Different Industries Need Cyber Professionals to Have Unique Skills?' data-link='https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2810 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280-300x169.jpg" alt="cyber security professional" width="300" height="169" srcset="https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280-640x360.jpg 640w, https://christianespinosa.com/wp-content/uploads/2023/04/cyber-security-g6cb2454c5_1280.jpg 1280w" sizes="(max-width: 300px) 100vw, 300px" />Being a cyber professional involves similar work, no matter the industry. There are many foundational practices and required skills that apply in every vertical. However, some cyber roles require specialized experience or attributes. In building your cyber workforce, this is something to consider. You don’t necessarily need to hire based on someone matching every line of your job description. Once they do come on board, development may need to happen, including technical and soft skills.</p>
<p>In this post, I’ll break down the unique skills cyber professionals need for specific industries and provide insight on how to support this development.</p>
<h2>The Basic Skill Sets for Every Cyber Professional</h2>
<p>Before we get into the details, let’s first look at the basic skill sets cybersecurity staff should have. Currently, there’s a significant shortage of cyber talent. In reviewing the <a href="https://christianespinosa.com/blog/the-2023-cybersecurity-workforce-landscape/" target="_blank" rel="noopener">2023 cybersecurity workforce landscape</a>, we know that over <a href="https://www.isc2.org/-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx" target="_blank" rel="noopener">3.4 million jobs</a> remain unfilled. This gap is driving risk up and causing some organizations to hire in desperation. I’d encourage you not to do this because you’re likely to bring on more “<a href="https://christianespinosa.com/blog/cybersecurity-paper-tigers-are-killing-us/" target="_blank" rel="noopener">paper tigers</a>,” and those folks don’t have the skills you need. Rather, they only look good on paper, not in real life.</p>
<p>So, always go back to the basics of what a cyber professional should have to start. Here are the top skills for the buckets of technical and soft.</p>
<h3>Technical Skills</h3>
<p>Networking and system administration — these are the building blocks of maintaining the network infrastructure. Being proficient at this is the foundation for cultivating more technical skills.</p>
<ul>
<li><em>Risk analysis.</em> This is labeled as a technical skill because it’s about analyzing, preventing, and mitigating risk. It’s all about deciphering the impact of a breach. It’s like a hybrid of technical and people skills because people also need to have some soft attributes, including critical thinking, communication, <a href="https://christianespinosa.com/blog/the-secure-methodology-step-one-awareness/" target="_blank" rel="noopener">awareness</a>, and curiosity.</li>
<li><em>Incident response management.</em> This process involves identifying and investigating security incidents, administering response efforts, and restoring systems. This skill is hard to teach in the classroom. Training is how most people learn this, starting with going through simulations.</li>
<li><em>Network security controls.</em> Controls are a critical part of the security ecosystem. They include firewalls, antivirus and antimalware software, and intrusion detection systems. Cyber professionals should have a broad knowledge of these and how they provide protection.</li>
<li><em>Coding.</em> For entry-level cybersecurity jobs, coding isn’t a requirement. As someone continues within the career, having coding skills can be helpful.</li>
<li><em>Cloud security.</em> Most everything’s in the cloud these days, so understanding configuration and other components is critical to creating a robust security posture.</li>
</ul>
<p>These are just a handful of the technical skills someone may bring to the table. People must have most of these to be able to do the job. Soft skills are equally essential to success.</p>
<h3>Soft Skills</h3>
<ul>
<li><em>Communication.</em> Nothing within your cyber team will drive up risk, like poor or nonexistent communication. Miscommunication is a leading cause of cyber failures, and you won’t build a world-class team without it. Keep in mind that communication involves speaking and listening.</li>
<li><em>Adaptability.</em> Cybersecurity is a dynamic industry, and your employees must be able to roll with this. It’s often hard for technical people to be flexible because they crave certainty. Evolving this <a href="https://christianespinosa.com/blog/fixed-vs-growth-mindset/" target="_blank" rel="noopener">fixed mindset to be one that’s open</a> is crucial for anyone to have long-term success in cybersecurity.</li>
<li><em>Curiosity.</em> The more inquisitive someone is, the better they are at investigating and probing, which are necessary for the cyber field. These people love to learn and are eager to innovate.</li>
<li><em>Critical thinking and problem-solving.</em> Along with curiosity, cyber minds must be excellent at critical thinking and problem-solving. It’s the nature of the job, and if someone has this, technical skill development is much easier.</li>
<li><em>Cognitive empathy.</em> This type of <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/" target="_blank" rel="noopener">empathy</a> is the ability to understand someone else’s perspective and feelings. It’s also a choice to connect with someone and relies heavily on strong communication skills.</li>
</ul>
<p>In looking at technical and people skills, these are all vital regardless of the industry. One thing to not get tripped up on in the skills discussion is someone’s hands-on experience. Yes, it would be ideal for new hires to have this, and it’s in demand from employers. However, those newly entering the field may not have this. If they are going to break into cybersecurity, they need to start somewhere. With the right coaching, training, and support, these people could become star employees.</p>
<p>Next, we’ll go through industries and what’s critical for cyber professionals to excel and thrive in these organizations.</p>
<h2>Industry-Specific Cyber Skills</h2>
<p>Let’s review the skills that are valuable by industry.</p>
<h3>Health Care</h3>
<p>Health care is an industry that embraces technology in so many ways. From electronic health records to medical devices to monitoring systems, health care depends on technology. However, it’s a really complicated vertical. There are compliance factors for data usage, legacy systems, an often-understaffed team, and extensive networks that keep growing.</p>
<p>Health care also has a huge target on its back. In 2022, the industry experienced a <a href="https://blog.checkpoint.com/2023/01/05/38-increase-in-2022-global-cyberattacks/" target="_blank" rel="noopener">74% increase</a> in attacks. Multiple hospitals were the victims of ransomware, with devastating consequences that impacted operations and patient care.</p>
<p>As a result, cyber professionals in health care should work to attain some specific skills, including:</p>
<ul>
<li>Becoming fluent in HIPAA compliance and guidelines</li>
<li>Honing knowledge of medical device cybersecurity</li>
<li>Understanding of IoT (Internet of Things) sensors, which often tie to medical devices</li>
<li>Aptitude in ransomware, as they are a hacker favorite when targeting health care</li>
</ul>
<p>Along with these technical attributes, some people skills are critical. First, awareness and perspective can be useful for health care cyber professionals. Understanding the hacker, on the other side, can drive the development of new defensive and proactive strategies. Another is the ability to collaborate with technical and nontechnical personnel. There are many stakeholders in the health care technology space, and working together is a must to reduce risk.</p>
<h3>Manufacturing</h3>
<p>Manufacturing’s pursuit of digital transformation and <a href="https://www.ibm.com/topics/industry-4-0" target="_blank" rel="noopener">Industry 4.0</a> infused technology throughout this mature industry. Leveraging technology like networked equipment and IoT creates efficiencies for the vertical, drives decision-making based on data, and modernizes workflows. All this connectivity also means cyberattacks are more prevalent.</p>
<p>One of the biggest risks for this industry is legacy systems. Those entering cyber careers in manufacturing should be proficient in understanding such a structure. Having experience in decommissioning these systems, migrating data, or integrating them with newer technology will be valuable.</p>
<p>For people skills, cyber professionals in manufacturing should be effective communicators who are great negotiators. That’s because many in the industry need education and awareness about risk in general. Technical folks need to be able to make a case for more cyber controls and security while battling the business side that wants everything to go faster.</p>
<h3>Finance</h3>
<p>Besides health care, finance is the most targeted vertical. In 2021, <a href="https://www.statista.com/statistics/221293/cyber-crime-target-industries/" target="_blank" rel="noopener">it led all others</a>. It’s another very appealing industry for hackers. Larger banking systems dedicate entire teams to this. Smaller community banks and credit unions have fewer resources but must manage the same kind of risk. So, what skills do financial cybersecurity professionals need to possess?</p>
<p>Like in health care, finance has compliance regulations, so familiarity with these is a good starting point. Identity and access management (IAM) knowledge is imperative too. Ransomware is trending up in banking, so skills regarding this help. Experience with app security will be key, as most financial institutions have consumer-facing apps.</p>
<p>On the soft-skill side, you’ll want excellent communicators who can deliver concise, clear, and timely information to all parties. Working well in a changing environment is another must-have because of the target on the back of banks. Critical thinking and problem-solving and the ability to collaborate effectively will also be great assets for your team members to have.</p>
<h3>Utilities</h3>
<p>This industry doesn’t usually command the cybersecurity attention of others, but it should. Water and power have been adopting more and more technology. As a result, it’s received more attention from hackers. Usually, their motivation is to disrupt operations and cause harm versus seeking data for monetary reasons.</p>
<p>Utilities are highly regulated industries, so awareness of this and the regulations is critical for cyber teams working in the field. There are also many vulnerabilities in these systems as they move to digitization. As a result, cyber professionals will need expertise in migrations and legacy reconciliation. A solid understanding of utility frameworks and infrastructure would also be valuable.</p>
<p>These give someone a good baseline. Adding in people skills improves their capabilities. First, they’ll need the ability to work backward from an incident to dig into root causes and determine remediation. Being organized and effectively managing projects are attributes that matter in utility cybersecurity.</p>
<h2>Developing Your Cyber Professionals: Skills That Always Matter</h2>
<p>Certain industries do have specific needs for cyber professionals. The soft skills addressed above are often the most critical. They are transferrable as well. Building and developing these in your team takes time, commitment, and a strategy. You can start with the <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">Secure Methodology</a><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a seven-step guide to transforming technical folks into excellent communicators and collaborators.</p>
<p>You can learn all about it in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. Check out the <a href="https://christianespinosa.com/programs/secure-methodology/" target="_blank" rel="noopener">Secure Methodology course</a>, available now.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Do Different Industries Need Cyber Professionals to Have Unique Skills?' data-link='https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Do Different Industries Need Cyber Professionals to Have Unique Skills?' data-link='https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/">Do Different Industries Need Cyber Professionals to Have Unique Skills?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/do-different-industries-need-cyber-professionals-to-have-unique-skills/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too</title>
		<link>https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/</link>
					<comments>https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Thu, 09 Feb 2023 04:17:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[people skills]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2802</guid>

					<description><![CDATA[<p>Cybercriminals are persistent and determined. These are great qualities to have in a technical field, but for your organization, it means risk and threats are never static. They are always changing, evolving their techniques to exploit weaknesses and vulnerabilities. As a result, your cyber team must as well. You can’t use the same methods against [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/">Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too' data-link='https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2803 alignright" src="https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-300x169.jpg" alt="cybercriminals" width="300" height="169" srcset="https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-300x169.jpg 300w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-1024x576.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-768x432.jpg 768w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-1536x864.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-2048x1152.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-800x450.jpg 800w, https://christianespinosa.com/wp-content/uploads/2023/02/shamin-haky-Uhx-gHPpCDg-unsplash-640x360.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" />Cybercriminals are persistent and determined. These are great qualities to have in a technical field, but for your organization, it means risk and threats are never static. They are always changing, evolving their techniques to exploit weaknesses and vulnerabilities. As a result, your cyber team must as well. You can’t use the same methods against new challenges.</p>
<p>While some of this upskilling is technical, much of it involves <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">soft skills</a> and developing the attributes that enable flexibility, proactiveness, and perseverance. In this post, we’ll review trends related to cybercriminals and their approaches and discuss ways to arm your technical folks with the right skills to win the cyber war.</p>
<h2>Cybercriminal Trends</h2>
<p>Cybercriminals diversify their attacks and find new avenues to pursue all the time. The trends in cybersecurity relating to their approaches offer some insights for cybersecurity professionals.</p>
<h3>Vulnerable Entry Points Are Attractive Targets</h3>
<p>The proliferation of IoT (Internet of Things) devices has been a monumental implementation for many industries. They collect data for various applications that deliver intelligence to organizations, including health care, manufacturing, and retail.</p>
<p>For all the benefits they bring, they are also the most vulnerable endpoints. Cybercriminals are becoming IoT experts and have infiltrated these devices and been able to transfer between them. It’s familiar ground for hackers to find out how to endanger security through something that helps businesses operate based on data-driven decisions.</p>
<h3>The QR Code Comeback</h3>
<p>Cybercriminals look for ways to use technology trends to plan attacks. QR codes have been around for some time and had a resurgence during the pandemic, including scanning them for menus. Advertisers use them in CTV (connected TV) and broadcast TV ads, prompting users to scan them while watching. A <a href="https://www.theverge.com/2022/2/13/22932397/coinbases-qr-code-super-bowl-ad-app-crash" target="_blank" rel="noopener">Super Bowl commercial in 2022 for Coinbase</a> featured a QR code (and not much else). It was so popular that the site crashed.</p>
<p>Hackers follow consumer preferences and create malicious QR codes that direct people to fake sites.</p>
<h3>Ransomware Keeps Adapting</h3>
<p>Cybercriminals invested lots of time and energy into ransomware attacks in 2022. According to data, ransomware increased <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">by 13%</a> in 2022. Cybersecurity has great concerns over ransomware, as many organizations experience it regularly, some with dire consequences, such as disrupting healthcare delivery.</p>
<p>The attraction to this method is the money. Many businesses have paid the ransom to retrieve access to data. Even those with backups and mature cybersecurity defenses can be a victim. The adaptation of ransomware occurs as hackers attempt to breach networks.</p>
<h3>Hackers Expose Multifactor Authentication Shortcomings</h3>
<p>Multifactor authentication (MFA) has been a tenet of cybersecurity and access control. The premise is to require more than a password, but hackers have found ways around this. One example is an attack created by Lapsus$ and Yanluowang threat actors. It bypasses the MFA framework through spamming original account holders, referred to as MFA bombing, MFA spamming, or MFA fatigue. It’s worked successfully in incidents involving Microsoft and T-Mobile.</p>
<h3>Phishing and Social Engineering Are So Sophisticated</h3>
<p>The earliest days of phishing were almost comical in delivery. The misspellings and awkward phrases were easy to spot. That was long ago, and hackers are more advanced and sophisticated in social engineering efforts.</p>
<p>It hinges on manipulation and the receiver believing the hacker is truly someone else. More of this is happening at the business level, with employees receiving communications from leadership asking for help. This email spoofing to impersonate others has become very effective. Hackers also use multiple channels, including email, SMS, SIM jacking, and piggybacking.</p>
<p>There has also been an increase in the use of <a href="https://www.techrepublic.com/article/hackers-exploit-google-docs-in-new-phishing-campaign/" target="_blank" rel="noopener">Google properties for phishing</a>. Millions of people use Google Drive and Google Ads for business. Hackers are attempting to “share” documents, “tagging” in the comments of documents, or inviting you to access a Google Ad account. For many, it would seem a logical email to receive and click, and that’s what hackers are counting on them doing.</p>
<h3>Cybercriminals Focus More on Smaller Fish</h3>
<p>Most of the headlines about cyberattacks involve well-known companies. It’s more newsworthy since these can cause outages and downtime and impact millions. However, most hackers don’t put a target on these whales. Smaller fish are easier to penetrate, and many have valuable data. Small- and medium-sized businesses (SMBs) often have less robust cybersecurity protocols and may be dealing with being understaffed as well.</p>
<p>It’s an ideal scenario for hackers eager to infiltrate a network and take control. The result can be a data breach with the aim of selling these assets on the dark web or ransomware. SMBs are highly aware that they are a target but lack the resources to combat them in many cases.</p>
<h3>Cybercrime as a Service Lowers the Barrier to Entry</h3>
<p>A new phenomenon, cybercrime as a service, is another troubling hacking trend. Hackers are for hire, so bad actors no longer need technical aptitude. Rather, they can find a cybercriminal on the dark web to do their bidding. These groups operate like legit businesses in many ways, with developers and engineers.</p>
<p>Seeing the commoditization of cybercrime is a concern for tech teams. It’s increasing the number of attacks, and their sophistication is improving daily.</p>
<p>As you can see, hackers never rest on their laurels. They evolve their methods consistently to reach their goals. It’s the same approach the good guys should also take. Here’s how to keep pace with cybercriminals.</p>
<h2>Keeping Pace with Cybercriminals; Cyber Professionals Must Adapt Too</h2>
<p>Developing your team’s capabilities and expanding them should be a priority for you as a leader. Such a strategy involves both technical and people skills. Focusing on continuous improvement is a requirement to outperform today’s hackers. Here are some critical steps you can take.</p>
<h3>Being Proactive versus Reactive</h3>
<p>A lot of cybersecurity is reactive. It’s how you’ll respond to a threat or attack. All that’s necessary. You have to have a cyber resilience and contingency plan in place. It can often overshadow being proactive, which is something organizations find difficult.</p>
<p>The barrier to being proactive is not so much technical failures. Much of the time, it’s the people and the way they communicate, collaborate, and operate. Cyber professionals tend to think in black and white and crave certainty. There’s much fear around what they perceive as new territory, so they stay set in their ways. As a result, you incur more risk because there’s limited exchange of information or ideas.</p>
<p>To be more proactive, you’ve got to break down those silos and create an environment where communication and collaboration are a priority. You must be an example and find ways to hone these people skills through exercises and other activities. If everyone’s not on the same page, you’ll be stuck in reactive mode, which gives hackers an edge.</p>
<h3>Creating a Cybersecurity Culture</h3>
<p>A <a href="https://christianespinosa.com/blog/the-cyber-threat-no-one-talks-about-the-absence-of-a-cybersecurity-culture/" target="_blank" rel="noopener">cybersecurity culture</a>, in this respect, alludes to the principles and values of your technical team. Building a team that can swiftly adapt requires healthy people skills, including <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/" target="_blank" rel="noopener">communication</a>, awareness of self and others, trust, a growth mindset, and empathy. It may seem daunting to pursue this, but it’s critical in the cyber war.</p>
<p>When these things are absent, your company increases risk. The environment may be toxic, with bullying, posturing, and disengagement. Any hacker would love to attack such an organization, so it’s critical not to be one of these!</p>
<p>Constructing and maintaining this culture requires several key elements:</p>
<ul>
<li>Employees need to know that their contributions matter and how they align with the company’s goals and wins.</li>
<li>Encouraging the growth of each individual and acknowledging their improvements.</li>
<li>Continuous development of strong communication skills, including what people say, how they say it, and how they listen.</li>
<li>Removing self-centered thinking patterns and embracing <a href="https://christianespinosa.com/blog/the-secure-methodology-step-six-empathy/?roistat_visit=172849" target="_blank" rel="noopener">cognitive empathy</a>.</li>
</ul>
<h3>Emphasizing Innovation</h3>
<p>Cyber professionals understand innovation, often more from a technical lens. That’s crucial, but a culture of innovation is where new ideas thrive. If you open up your team to operate this way, many great things can happen regarding security. One way to make it front and center is to define what innovation means to your team and discuss ways to sustain it over time.</p>
<p>There is often a misnomer about security being the downfall of innovation. That’s not true, and the two can work in tandem, such as in the framework of <a href="https://christianespinosa.com/blog/why-organizations-should-pivot-to-devsecops/" target="_blank" rel="noopener">DevSecOps</a>. There should be a constant link between security and innovation. It’s a continuous cycle of improvement that enables better results, which are easy to understand for technical folks.</p>
<h2>Cybercriminals vs. Cyber Professionals: Winning the War</h2>
<p>On the battlefield, cybercriminals and cyber professionals are at war. Cybercriminals have had many advantages, much of which are due to their constant evolution and adaptability. Keeping up with hackers involves cyber professionals doing the same thing.</p>
<p>With these tips, your team can forge ahead. You can find more advice and resources for this in my book, <em>The Smartest Person in the Room</em>, which features the Secure Methodology<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a seven-step guide to transforming technical people into better communicators and collaborators. <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">Get your copy today</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too' data-link='https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too' data-link='https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/">Cybercriminals Are Always Evolving Their Techniques; Your Cyber Team Should Too</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/cybercriminals-are-always-evolving-their-techniques-your-cyber-team-should-too/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving Cybersecurity Communication Skills: Why It’s More Than Just Being Articulate</title>
		<link>https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/</link>
					<comments>https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Mon, 14 Nov 2022 20:54:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[people skills]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2763</guid>

					<description><![CDATA[<p>Communication is a skill vital to every role in an organization. Without it, we make assumptions, and breakdowns occur in processes and workflows. It’s often the leading reason for dysfunction in a group. It has equal importance in cybersecurity. However, cybersecurity communication skills are often poor or nonexistent. When communication fails, your cybersecurity provisions and [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/">Improving Cybersecurity Communication Skills: Why It’s More Than Just Being Articulate</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Improving Cybersecurity Communication Skills: Why It’s More Than Just Being Articulate' data-link='https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="size-medium wp-image-2764 alignright" src="https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920-300x190.jpg" alt="Cybersecurity Communication skills" width="300" height="190" srcset="https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920-300x190.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920-1024x650.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920-768x487.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920-1536x974.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920-640x406.jpg 640w, https://christianespinosa.com/wp-content/uploads/2022/11/students-1822449_1920.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" />Communication is a skill vital to every role in an organization. Without it, we make assumptions, and breakdowns occur in processes and workflows. It’s often the leading reason for dysfunction in a group. It has equal importance in cybersecurity. However, cybersecurity communication skills are often poor or nonexistent.</p>
<p>When communication fails, your cybersecurity provisions and safety nets can, too. It raises risk and creates distrust in the group. It’s also the most vital soft skill that organizations seek in hiring, according to a <a href="https://www.isaca.org/state-of-cybersecurity-2022" target="_blank" rel="noopener">recent industry survey</a>.</p>
<p>So, there’s no argument from the field that cybersecurity communication skills are critical. The problem is that most companies aren’t doing anything to develop it in their people. If they are, the training may be obsolete or ineffective, such as online learning classes. Can you really hone your communication skills by watching a video? The answer is likely no. It requires interactive exercises and a strategic approach.</p>
<p>Further, companies often put communication skills in a box that doesn’t apply to all facets. For example, being a great communicator isn’t simply about being articulate. Many technical people are. Yet, communication failures still occur. Communication is a multi-faceted skill that includes being aware of others and their perspectives, understanding nonverbal cues, being active listeners, and communicating to be inclusive (versus lots of jargon and tech-speak).</p>
<p><a href="https://christianespinosa.com/blog/the-secure-methodology-step-four-communication/" target="_blank" rel="noopener">Communication is step four of the Secure Methodology</a>, which is a seven-step guide I documented in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">The Smartest Person in the Room</a>. Its purpose is to help cybersecurity leaders transform their people with soft skills to work together more effectively to combat cyberattacks.</p>
<p>In this post, I’ll break down each element of communication and offer tips to develop those in your people.</p>
<h2>Cybersecurity Communication Skills: The Four Facets</h2>
<p>There are four components of becoming a great communicator as a technical professional. Consider all these when crafting a program that lifts <a href="https://christianespinosa.com/blog/how-to-develop-soft-skills-in-your-cybersecurity-team/" target="_blank" rel="noopener">soft skills</a>.</p>
<h3>Inclusive Language</h3>
<p>Technical people have a reputation for talking in jargon that only “insiders” understand. They do this for several reasons. First, it makes them feel more confident and that they have control of the conversation. They feel comfortable with the geek speak as a nod to their superiority over all things cyber-related.</p>
<p>Using this language also means that others are less likely to call them out, which they secretly fear. If other people understood what they were saying about risks, threats, and solutions, they might receive more questions and requests for explanations. They would see this as losing “control” of the interaction.</p>
<p>Ultimately, this type of communication helps no one. Your technical people don’t get better at defining threats and solutions, so you don’t improve in that area. Also, they won’t be able to convey critical information to leadership, which could impact funding and resources. As a result, the entire organization suffers from greater risk exposure. These patterns are the hardest to break but pivotal because shared language leads to success.</p>
<h3>Understanding Nonverbal Cues</h3>
<p>A big part of communication is the things we don’t say. Body language presents context around what people say. Often, words don’t match these cues. According to <a href="https://www.bl.uk/people/albert-mehrabian" target="_blank" rel="noopener">Mehrabian’s 7-38-55 theory</a>, most comprehension is via body language (55%). So, what does that mean exactly?</p>
<p>Focusing only on the spoken words can be an opportunity to miss the message. Ignoring body language as a part of communication causes communication breakdowns. When interacting with others, we need to pay attention to body language because it conveys more than words.</p>
<p>Body language can change suddenly in a conversation, and catching those clues is critical. When a technical person speaks to someone who isn’t, they often use a lot of jargon and acronyms. As the other party takes in this information, they may say little. The body language, however, may say more. They may become guarded or disinterested. This matters because your cyber professionals are talking to their clients (whether internal or external). If they shut down because they don’t understand what the person is saying, it’s not good for anyone. It causes silos between groups, and no one knows the biggest priorities.</p>
<p>There can often be inconsistencies between spoken words and body language. Facial expressions that seem opposite to what words are said or failure to make eye contact indicate the person isn’t comprehending the message. That’s not a good place to be with cybersecurity. This can happen between co-workers and with cybersecurity professionals and leadership.</p>
<h3>Tone of Voice</h3>
<p>Another aspect of Mehrabian’s 7-38-55 theory is tone, which is 38% of the communication bubble. Tone is the way you speak, which adds context to the words. There is a variety of different tones that people use. Here are some examples</p>
<ul>
<li><strong>Assertive</strong>: This tone represents a declarative approach where the person speaking is not amiable to moving their position. It’s often considered rude and curt and is usually counterproductive.</li>
<li><strong>Respectful</strong>: The person speaking is careful with their words and does not let frustration or bias impact what they say. It can motivate others in the conversation to feel they are free to voice opinions or concerns.</li>
<li><strong>Accommodating</strong>: This tone promotes collaboration and cooperation. It’s like respectful but even more non-threatening.</li>
<li><strong>Dismissive tone</strong>: This tone of voice is harmful in that the person speaking is flippant about the situation and anyone else’s position on it. In this category, technical folks are posturing, often speaking quickly, believing no one else could understand.</li>
</ul>
<p>We can all relate to sentences having different meanings depending on the tone. For example, the simple response of “I don’t know” could have many connotations. An assertive tone could communicate anger. If said dismissively, it could come off as sarcastic. On the other hand, if said with a respectful or accommodating tone, it could be a starting point to go deeper and find the answer together.</p>
<p>Tone interpretation can lead to assumptions, resentment, and disillusionment when negative. If positive, it can change how people respond and interact. It clarifies and conveys meaning.</p>
<h3>Active Listening</h3>
<p>The last component of cybersecurity communication skills is the ability to be a good listener. In many cases, people listen to prepare their response, either as agreement or dissension. That’s the first obstacle to overcome. Active listening is making a conscious effort to hear the words spoken and the tone to receive the message.</p>
<p>Becoming an active listener takes practice, and several techniques are valuable:</p>
<ul>
<li>Pay attention to the speaker by giving them eye contact and removing distractions from the environment.</li>
<li>Illustrate you’re listening with body language gestures, such as nodding, smiling, having an open posture, and encouraging the speaker to continue with comments like “uh huh.”</li>
<li>Reflect on what’s being said by paraphrasing back to the speaker (“I’m hearing you say…), asking questions for clarity, and summarizing what you hear.</li>
<li>Allow the speaker to finish their points before you interrupt, as that only frustrates the person and creates a negative experience.</li>
<li>Be honest and open with responses, opinions, and other information in a respectful manner, even if you have differing perspectives.</li>
</ul>
<p>Remember that your people will only improve if they take the need to change seriously and practice it consistently. Every conversation they have should include active listening!</p>
<h2>Cybersecurity Communication Skills: More Tips and Tricks</h2>
<p>Within each realm of communication, you now have a view of what impacts communication. Each aspect requires practice and work. Making this part of your organization’s foundation is crucial for your team to be cohesive. Here are some more tips to consider:</p>
<h3>Encourage Transparency in Communication</h3>
<p>Do you think your people are afraid to say things? Some avoid transparency to keep the upper hand, but others may be apprehensive because they’re concerned about questioning things. You want people to question stuff and look outside typical approaches. Thus, you’ll need to create a space to “question.” Show your employees that you appreciate and expect honesty. It can improve communication and trust levels.</p>
<h3>Lead by Example</h3>
<p>How are your communication skills? Do you need to practice what you preach? You have to be the ultimate example to your staff. As they see you leading as a strong communicator, they’ll realize that you are taking this seriously, and it can immediately begin to improve rapport in the group.</p>
<h3>Ask Them to Consider Perspective</h3>
<p>When technical people communicate with others outside the field, they should keep in mind their perspective. They should think about what this person’s role is in cybersecurity. Is it to support the team? Provide funding? Manage risk? Have visibility into the threat landscape. From perspective, your employees can better manage tone in conversations. What they say will mean different things to different people, and making these adjustments drives better communication.</p>
<h2>Communication Is the Most Vital Skill to Develop</h2>
<p>Throughout my book, I harp on communication. The emphasis on it is deliberate because it’s where most things go off the rails. In the book, you’ll find exercises, tips, and techniques to develop your staff into effective communicators. <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener">Read it today to get started</a>.</p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Improving Cybersecurity Communication Skills: Why It’s More Than Just Being Articulate' data-link='https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Improving Cybersecurity Communication Skills: Why It’s More Than Just Being Articulate' data-link='https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/">Improving Cybersecurity Communication Skills: Why It’s More Than Just Being Articulate</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/improving-cybersecurity-communication-skills-why-its-more-than-just-being-articulate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Communication Aptitude Is the Number One Soft Skill Cybersecurity Professionals Must Possess</title>
		<link>https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/</link>
					<comments>https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sun, 03 Jul 2022 23:02:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[people skills]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2698</guid>

					<description><![CDATA[<p>Having effective communication skills is an asset in any career, even cybersecurity. It’s a soft skill that nicely complements technical ones. Having communication aptitude is a must for cybersecurity professionals. Without this cybersecurity soft skill, a lot can go wrong. Poor communication and interpersonal skills are often the roots of cybersecurity incidents. That’s a theme [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/">Why Communication Aptitude Is the Number One Soft Skill Cybersecurity Professionals Must Possess</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Communication Aptitude Is the Number One Soft Skill Cybersecurity Professionals Must Possess' data-link='https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/' data-app-id-name='category_above_content'></div><p><img loading="lazy" decoding="async" class="alignright wp-image-2699 " src="https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-scaled.jpg" alt="communication skills" width="384" height="256" srcset="https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-scaled.jpg 2560w, https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-300x200.jpg 300w, https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-1024x683.jpg 1024w, https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-768x512.jpg 768w, https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-1536x1024.jpg 1536w, https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-2048x1365.jpg 2048w, https://christianespinosa.com/wp-content/uploads/2022/07/communication-skills-640x427.jpg 640w" sizes="(max-width: 384px) 100vw, 384px" />Having effective communication skills is an asset in any career, even cybersecurity. It’s a soft skill that nicely complements technical ones. Having communication aptitude is a must for cybersecurity professionals. Without this cybersecurity soft skill, a lot can go wrong.</p>
<p>Poor communication and interpersonal skills are often the roots of cybersecurity incidents. That’s a theme in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. Unfortunately, some organizations may not see the value in developing communication because they believe cybersecurity is black and white. It’s not. It’s many shades of gray filled with assumptions and a lack of understanding. These things breed when communication isn’t consistent and clear.</p>
<p>The question becomes how to improve communication and make it a priority. In this post, I’ll explain <a href="https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/" target="_blank" rel="noopener">why technical people struggle with people skills</a>, why they need them, and how to develop them in your team.</p>
<h2>Why Cybersecurity Professionals Struggle with Communication</h2>
<p>My perspective on the struggle comes from years of being a cybersecurity leader as well as research. The points I make in no way are a denunciation of the field. I’m just here to help organizations improve with employees with well-rounded skillsets.</p>
<p>Here are the key reasons cybersecurity teams have a hard time being excellent communicators.</p>
<h3>They Are Afraid to Look Vulnerable or Incompetent</h3>
<p>One thing that’s necessary for healthy communication is asking questions. Cybersecurity professionals rarely do this for fear they’ll look like they don’t know everything. They’ll make assumptions and fall back to standard ways of resolving issues. That’s not effective in a dynamic and ever-changing landscape with new threats always on the horizon. Fear keeps these people from discovering what they don’t know, which increases risk.</p>
<h3>Technical Folks Never Want to Be Wrong</h3>
<p>Instead of facing the fact that everybody is wrong at some point, cybersecurity professionals cling to certainty. Except certainty is impossible in the field. This, combined with never wanting to be wrong, prevents healthy communication.</p>
<h3>Misconceptions That Technical People Don’t Need to Be Great Communicators</h3>
<p>There’s a deep fallacy that exists in technical jobs. The prevailing misconception is that technical people don’t need to be great communicators. They’ll let their technical skills do the talking. But they really need to engage in conversation to improve their technical aptitude and do their job effectively.</p>
<p>Lack of communication sinks cybersecurity. It doesn’t just apply to the technical person’s inability to have productive conversations. They also don’t actively listen when others share their insights, opinions, or other information. They only listen to respond in a defensive posture, so they don’t hear what the other person is conveying. They are only planning their rebuttal.</p>
<p>We’ve touched on the need for cybersecurity communication skills. Next, we’ll dive further into why they are so critical.</p>
<h2>Why Do Cybersecurity Professionals Need to Be Effective Communicators?</h2>
<p>At a foundational level, cybersecurity professionals need to be effective in their communications because they are part of the problem without it. Data breaches, ransomware attacks, and other <a href="https://christianespinosa.com/blog/your-cybersecurity-methods-are-failing-heres-why/" target="_blank" rel="noopener">cybersecurity failures</a> are often directly tied to poor communication. It’s not that you didn’t have the best technology or strategy. It’s that your people didn’t talk to each other or anyone else!</p>
<p>Here are the other reasons why technical roles need these soft skills:</p>
<ul>
<li>It improves transparency in operations, which typically leads to a greater understanding of the threat landscape and greater trust among teams.</li>
<li>Healthy, consistent communication supports problem-solving. That’s a big part of a technical person’s job, and teams can’t excel at this without proper discussions.</li>
<li>Good communication builds trust and respect among teams, and that’s essential for their ability to solve cybersecurity problems.</li>
<li>Soft skills allow people to be more adaptable to change, and cybersecurity is full of that. New people and threats come into the ecosystem routinely. Without flexible communication skills, adaptability remains low.</li>
</ul>
<h2>Current Communication Styles Are Often Off-Putting</h2>
<p>Some of your cybersecurity employees may be talkers. Again, that doesn’t make them great communicators. The style they use is often off-putting and aggressive. They like to use a lot of jargon, which doesn’t mean anything to people outside their technical bubble.</p>
<p>They approach communication in this way because it makes them seem superior. It also covers up their lack of comprehension. The strategy is to make communication so technical and abstract that non-technical people will simply defer to them and end the conversation.</p>
<p>This type of speak can also impact how technical people work together. Because cybersecurity is so broad, there are many roles, and they all have their own “language.” As a result, communication failures happen here, too.</p>
<p>When they learn these soft skills, it can change the dynamic completely. However, communication isn’t just about what you say. It also includes body language and nonverbal cues. Those are just as critical as words.</p>
<h2>The 7-38-55 Theory of Communications</h2>
<p>Mehrabian’s <a href="https://www.bl.uk/people/albert-mehrabian" target="_blank" rel="noopener">7-38-55 Theory of Communication</a> highlights that it’s more than just words. The principle states that communication is 7% word choice, 38% tone of voice, and 55% body language.</p>
<p>This is an important concept to share when helping people evolve their communication styles and how they interact in conversations. It can also make them more aware of their tone and body language, which may be causing a barrier. Awareness is the place to start when you begin to navigate communication skills.</p>
<p>Such a theory also taps into technical minds. Communication isn’t just some soft skill. They can recognize its power in influencing how they work and why it could mitigate risk.</p>
<p>Once you have more awareness, you can begin implementing plans to improve communication. The process will take time and commitment. What you get in return is well worth the work.</p>
<h2>How to Improve Cybersecurity Soft Skills</h2>
<p>We’ve looked at the why and how of communication failure. Now it’s time to talk about how to fix the problem. That’s not an easy road because you’re up against a resistance to change. That resistance often consists of your people being unaware of the communication issues.</p>
<p>Thus, they have to become aware before they can work toward adapting behavior.</p>
<h3>Encourage Self-Awareness</h3>
<p>Technical people have to get out of their own way, so to speak. They need to be self-aware of how they communicate and why it’s an issue. This requires introspection and a new perspective.</p>
<p>In <a href="https://christianespinosa.com/blog/the-secure-methodology-and-cybersecurity-leadership/" target="_blank" rel="noopener">The Secure Methodology</a>, the framework from my book, Awareness is the first step. In that chapter, I offer multiple ways to help your people through this transition.</p>
<h3>Demonstrate the Importance of Communication</h3>
<p>If you want your team to be better communicators, you need to make it a priority and lead by example. If there are specific examples you can point to that were communication breakdowns and the consequences, it’s no longer this intangible thing. Now it’s in front of them, and that’s impactful to those that are more logic-based in their thinking.</p>
<h3>Champion Active Listening</h3>
<p>Technical people who master active listening perform much better than those that don’t. In every conversation we have, we may hear the words but not really absorb and comprehend them. It goes back to the earlier notion of people just listening to prepare their response.</p>
<p>Providing guidance on how to listen actively and exercises can make a difference. As with any change, your team has to be willing and able to adapt.</p>
<h3>Make Perspective Key to Communicating</h3>
<p>Perspective is another challenge in communication. Often people have no way to see anything other than from their own eyes. That impacts how people collaborate and solve problems.</p>
<p>If you can guide people to open up their perspectives, better communication is more likely. In my book, I spend a bit of time talking about perspective and the best ways to approach it.</p>
<h3>Tap into Their Motivation</h3>
<p>Everyone has different things that motivate them to change (or not). If you can understand their motivation and make it part of their awareness, communication will improve. It can also help people think with their hearts and minds. Motivation doesn’t have to be altruistic for this to work.</p>
<h3>Coach People to Be Flexible</h3>
<p>Being flexible and adaptable is critical to becoming a successful communicator. Technical folks are usually either of these. However, that doesn’t mean they can’t be, and it will serve them well in a dynamic landscape like cybersecurity. You can coach your people to be more agile with the right strategy. You&#8217;ll find tips and exercises to do this in my book.</p>
<p>Through exercises and the development of soft skills, your team can embrace flexibility. When they do, it can be a turning point in their success and performance.</p>
<h2>Help Your Team Master Cybersecurity Soft Skills</h2>
<p>Setting your cybersecurity team up for success depends a lot on their communication soft skills. If they hone and develop these, they’ll be better at their job and more engaged. It’s also a skill that can have a profound impact beyond their career.</p>
<p>There will be challenges in evolving people. The exercises, tips, and strategies presented in my book, <a href="https://christianespinosa.com/books/the-smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, can help. Get your copy today to start the journey.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Communication Aptitude Is the Number One Soft Skill Cybersecurity Professionals Must Possess' data-link='https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Why Communication Aptitude Is the Number One Soft Skill Cybersecurity Professionals Must Possess' data-link='https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/">Why Communication Aptitude Is the Number One Soft Skill Cybersecurity Professionals Must Possess</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/why-communication-aptitude-is-the-number-one-soft-skill-cybersecurity-professionals-must-possess/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Do Technical People Struggle with People Skills? And How Can Companies Fix It?</title>
		<link>https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/</link>
					<comments>https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Fri, 19 Feb 2021 14:00:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Secure Methodology]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotional intelliegnce]]></category>
		<category><![CDATA[eq skills]]></category>
		<category><![CDATA[secure methodology]]></category>
		<category><![CDATA[soft skills]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2383</guid>

					<description><![CDATA[<p>People skills are a challenge for many individuals. It’s often a combination of personality and experiences. Technical people often get put in a category of lacking them. While this is not universal, it does account for some of the failings of cybersecurity strategies. Without a robust soft skill set, these professionals get caught in a cycle [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/">Why Do Technical People Struggle with People Skills? And How Can Companies Fix It?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Do Technical People Struggle with People Skills? And How Can Companies Fix It?' data-link='https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/' data-app-id-name='category_above_content'></div><figure id="attachment_2100" aria-describedby="caption-attachment-2100" style="width: 581px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="wp-image-2100 " src="https://christianespinosa.com/wp-content/uploads/2021/01/7StepSecureMethodology-ChristianEspinosa.jpg" alt="7 Step Secure Methodology - Christian Espinosa" width="581" height="576" srcset="https://christianespinosa.com/wp-content/uploads/2021/01/7StepSecureMethodology-ChristianEspinosa.jpg 745w, https://christianespinosa.com/wp-content/uploads/2021/01/7StepSecureMethodology-ChristianEspinosa-300x297.jpg 300w, https://christianespinosa.com/wp-content/uploads/2021/01/7StepSecureMethodology-ChristianEspinosa-150x150.jpg 150w" sizes="(max-width: 581px) 100vw, 581px" /><figcaption id="caption-attachment-2100" class="wp-caption-text">The Secure Methodology Improves People and Life Skills</figcaption></figure>
<p>People skills are a challenge for many individuals. It’s often a combination of personality and experiences. Technical people often get put in a category of lacking them. While this is not universal, it does account for some of the <a href="https://christianespinosa.com/blog/your-cybersecurity-methods-are-failing-heres-why/" target="_blank" rel="noopener">failings of cybersecurity strategies</a>.</p>
<p>Without a robust soft skill set, these professionals get caught in a cycle of bad communication practices, a lack of curiosity, and posturing. It’s time to peel back the onion on why they struggle in this area and how to fix it.</p>
<h2>Why Technical People Struggle with People Skills</h2>
<p>This analysis comes from years of experience, research, and asking the hard questions. Again, it’s not a condemnation of those in technical fields. Many have a nice balance and are thriving. Through the years, I’ve met and worked with many highly articulate, open, and excellent cybersecurity experts. However, in general, this is the exception, not the rule.</p>
<p>In my book, <a href="https://christianespinosa.com/book/smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>, I lay out the evidence for why this struggle is all too real.</p>
<h3>They See the World Exclusively in 1s and 0s</h3>
<p>It’s hard to communicate and collaborate with others when your world is solely 1s and 0s or very black and white. The reality is that the world, people, and cybersecurity are gray. That’s hard for some technical minds to grasp.</p>
<p>In a lot of technical disciplines, there is a right answer and a wrong answer. No discussion required. It’s probably more applicable to some areas of math and science. However, cybersecurity isn’t just math and science. It’s an ever-evolving field. New risks and threats emerge all the time.</p>
<p>Further, it requires asking questions and understanding business needs. That can send some technical folks into a free-fall. They don’t have a naturally curious nature in public, so they fall back on what they know and don’t try to find out what they don’t. They fear curiosity in front on others may appear as a lack of knowing or incompetence.</p>
<h3>Insecurity Leads to Soft Skill Failure</h3>
<p>Many cybersecurity professionals never want to be wrong — another reflection of black/white thinking. The feeling often comes because they are insecure. They cling to certainty, and interacting with other people and having meaningful conversations are too uncertain.</p>
<p>They let insecurity guide what they do, pushing back on the need for two-way dialogue. They’ll figure it out on their own and don’t want to entertain outside ideas. That then leads to posturing.</p>
<h3>Poor Communication Sinks Cybersecurity</h3>
<p>There is a misconception that technical jobs don’t require communication skills. That’s not true. Every role depends on communication, and when that’s a challenge, it’s a house of cards filled with assumptions. It’s the biggest shortfall for many technical people. It doesn’t mean they aren’t articulate or don’t have a good vocabulary. It means they can’t converse in a healthy and productive manner. Having honest and transparent communication is about listening more than talking. Unfortunately, many people aren’t good at that. These communication issues will bring down any company department.</p>
<p>People fail at communication for many reasons, as discussed above — insecurity, fear, a closed mind, a lack of empathy. This revelation isn’t unknown. A <a href="https://www.project.co/communication-statistics-2020/" target="_blank" rel="noopener">study on business communications</a> found that 89 percent of respondents believe effective communication is important. Yet, 80 percent of those same people said that communication in their company was average or poor.</p>
<p>However, it’s not a dead end. There are ways to develop communication and other soft skills.</p>
<h2>Fixing the People Skills Problem for Technical Professionals</h2>
<p>Attaining better people skills was a self-journey. The consequences, however, didn’t just benefit me. They helped me create a process that any technical employee can navigate and come out the other side.</p>
<p>There’s no magic fix for evolving people, and they must want to change. So, that’s a barrier for sure. If you’re going to invest in helping your team, you want to know they’re open and have a growth-mindset.</p>
<p>What I’ve developed to counter this problem is the Secure Methodology. The following is a quick review of the framework and how it works. By employing it, people can start to see the gray in the world and be better cybersecurity professionals and experience personal growth as well.</p>
<h3>The Secure Methodology</h3>
<h4>Step One: Awareness</h4>
<p>The first step is about being aware of yourself and others. The lack of awareness in a professional setting causes you to miss blind spots. It also causes relationship issues at work because without awareness, communication is poor, and posturing reigns.</p>
<h3></h3>
<p>The mind has to open itself to new perspectives to achieve awareness. That requires coaching on communication and understanding what motivates a person. There are exercises that can strengthen the awareness “muscle” and open eyes.</p>
<h4>Step Two: Mindset</h4>
<p>You either have a fixed or growth mindset. Those with poor people skills are trapped in fixed. It’s not permanent. The key to a growth mindset is accountability. It’s no secret that a growth mindset is critical for cybersecurity. So, you must open those minds. The best way to approach it is to encourage reflection, ask the right questions, and urge quick decision-making.</p>
<h4>Step Three: Acknowledgment</h4>
<p>Acknowledgment in the workplace is a rampant issue. In cybersecurity, without positive acknowledgment, employees fall into disengagement and resentment. Many times, if there is acknowledgment, it’s negative, which feeds into further anger.</p>
<p>The other issue is that a cybersecurity team that receives no acknowledgment can’t concede their overly complex framework isn’t working. They lose the ability to simplify. To end this cycle, you should recognize their positives in the present before you expect them to master acknowledgment. You can improve this by building rapport and trust with exercises from the book.</p>
<h4>Step Four: Communication</h4>
<p>We’ve talked a lot about communication because it’s applicable in every aspect of nurturing people. We’ve identified the reasons why people are bad at it. Another critical factor is that technical folks like to speak geek as a sign of their higher intelligence. For those outside the industry, it may as well be another language, and technical professionals have to interact with non-technical folks. They build a wall with it instead of a bridge.</p>
<p>Shared language is inclusive and promotes active listening. Getting to this involves reframing and simplification, achievable through specific activities.</p>
<h4>Step Five: Monotasking</h4>
<p>The world wrongly praises multitasking, believing it epitomizes capability. In fact, humans weren’t born to multitask. It’s a real problem in the cybersecurity field, leading to errors and mistakes. It also creates a lot of anxiety — as if anyone needs more of that.</p>
<p>Retraining to <a href="https://christianespinosa.com/blog/the-value-of-monotasking-what-jesse-itzler-and-rainbow-taught-me/" target="_blank" rel="noopener">monotask</a> means that you can focus completely on one task. It can be much more productive than trying to do five things at once. Fostering this behavior includes blocking time for specific tasks and blocking out distractions (that means not answering a call, email, or text immediately).</p>
<h4>Step Six: Empathy</h4>
<p>A cybersecurity culture without empathy will not succeed, at least not long-term. You may wonder why it matters in technical roles. It matters in everything, really. The problem in the workplace is an us vs. them mentality. There’s no room for consideration and compassion in this model.</p>
<p>Empathy is a core people skill, but we’re not born with it. It’s something people develop. When it’s nonexistent, technical people don’t care about their clients or their data. Nor do they have concern for colleagues. If you’ve been able to make it through the first five steps, then you’re on a path to spreading empathy. There are also specific activities to do on the team level to develop it further.</p>
<h4>Step Seven: Kaizen</h4>
<p>The final step is a Japanese term meaning “continuous improvement.” In terms of the Secure Methodology, it’s a more tangible action of root cause analysis. Root cause analysis helps understand real problems and how to improve them. That applies to cybersecurity and people skills. Mastering it requires constant change and adaption, and you can’t get there without the former six steps.</p>
<h2>Do Better People Skills Really Lead to Better Cybersecurity?</h2>
<p>You may look at the Secure Methodology and think it sounds great in theory but are skeptical about its real-world implications. That’s fair. Again, there isn’t a guarantee because nothing is. What you should know is that it’s proven. I’ve witnessed it, and I can without hesitation say that better people skills lead to better cybersecurity.</p>
<p>If this is a path you want to send your team on because you realize the deficit of soft skills, your next step is to get the complete picture of the Secure Methodology by reading my book, <a href="https://christianespinosa.com/book/smartest-person-in-the-room/" target="_blank" rel="noopener"><em>The Smartest Person in the Room</em></a>. In it, you’ll find activities specific to the seven steps to build the people skills they’re missing.</p>
<p><!--HubSpot Call-to-Action Code --><span id="hs-cta-wrapper-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-wrapper"><span id="hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-node hs-cta-94f60ee8-4fbe-483b-8a0f-ad83ab12a665"><!-- [if lte IE 8]>


<div id="hs-cta-ie-element"></div>


<![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665" target="_blank" rel="noopener"><img decoding="async" id="hs-cta-img-94f60ee8-4fbe-483b-8a0f-ad83ab12a665" class="hs-cta-img" style="border-width: 0px;" src="https://no-cache.hubspot.com/cta/default/7462611/94f60ee8-4fbe-483b-8a0f-ad83ab12a665.png" alt="Check Out The Smartest Person in The Room" /></a></span><script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script><script type="text/javascript"> hbspt.cta.load(7462611, '94f60ee8-4fbe-483b-8a0f-ad83ab12a665', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Why Do Technical People Struggle with People Skills? And How Can Companies Fix It?' data-link='https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Why Do Technical People Struggle with People Skills? And How Can Companies Fix It?' data-link='https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/">Why Do Technical People Struggle with People Skills? And How Can Companies Fix It?</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/why-do-technical-people-struggle-with-people-skills-and-how-can-companies-fix-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
