• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us
  • Block Examples
  • Landing Page

iHash

News and How to's

  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How to Make the Most of Your Budding Cybersecurity Career

Oct 28, 2020 by iHash Leave a Comment


Having a career in cybersecurity can be one of the most rewarding experiences of your life. But it can also be extremely difficult starting off. Where can you turn for allies? How can you relate your knowledge to non-technical employees?

To find some answers to these questions, Cisco asked numerous experts in the field of cybersecurity to answer the following question: “If given the chance, what advice would you give yourself when you first joined the industry?” Their insights help to reveal a number of resources that they wish they would have drawn on early in their careers. Provided below are their responses.

Table of Contents

  • Martijn Grooten | Researcher, Writer and Security Professional | @martijn_grooten | (LinkedIn)
  •   Jason Lau | Chief Information Security Officer, Crypto.com | @JasonCISO | (LinkedIn)
  • Phillimon Zongo | Chief Executive Officer at Cyber Leadership Institute | @PhilZongo | (LinkedIn)
  • Ambler T. Jackson | Senior Privacy Subject Matter Expert | (LinkedIn)
  •       Amanda Honea-Frias | Head of Product Security at Duo, Cisco | @pandaporkchop | (LinkedIn)
  •         Katie Moussouris | CEO of Luta Security | @k8em0 | (LinkedIn)
  •       Mo Amin | Independent Cyber Security Culture Consultant  | @infosecmo | (LinkedIn)
  •       Richard Archdeacon | Advisory Chief Information Security Officer, Duo Security | (LinkedIn)

Martijn Grooten | Researcher, Writer and Security Professional | @martijn_grooten | (LinkedIn)

Security likes “rock stars”, that is, people who have very good technical skills or who are loud, very present, and can tell a good story. When you’re new in the industry, as I once was, it’s tempting to look up to them and try hard to be liked by them. This might give you a short-term career or confidence boost, but in the long-run, I have learned it is much more important to look out for people who are kind and who have a good moral compass.

 

Jason Lau | Chief Information Security Officer, Crypto.com | @JasonCISO | (LinkedIn)

Like many others, my cybersecurity career didn’t really have a clear path, and it was through many side- channels and industry events that I met peers who ultimately gave me some great advice.

Looking back, I would have told myself much earlier on to focus on the human element of cybersecurity. I was one of the earliest to dabble with eLearning in the days when the Internet was first gaining popularity before the Dot Com boom. This was when it was being used and tested in university courses where I was teaching engineering.

Given the success of eLearning, I would tell myself to continue in this space since there was already so much focus on technology, systems and software in the early days of cybersecurity and not enough on the “people” side of things, which is the initial cause of many incidents. Focusing on this topic could have made a much bigger impact on the early days of the security awareness training industry.

Fortunately, it is not too late now! I have been lucky enough to continue teaching cybersecurity at many universities as well as to conduct corporate security and privacy training to help improve the awareness for all. I feel this is a critical part of any industry. Cybersecurity is a shared responsibility, so the more sharing we do, the safer we will all become as a whole.

 

Phillimon Zongo | Chief Executive Officer at Cyber Leadership Institute | @PhilZongo | (LinkedIn)

There’s certainly things that I could have done better. Now that I have spent a lot of time mentoring people, I would say it would have been better if I had looked for a highly experienced mentor from day one. That would have accelerated my career trajectory in those five years that I’ve been pushing myself.

I wouldn’t say it’s a big disadvantage. The path that I took was of self-discovery. I trained myself, I bought books and I scribbled everywhere. I just studied over time. But it’s true that persistence and resilience and never giving up are important because writing is very frustrating. For my first article, it took me about three and a half months to write a three-page article. That’s when I was aiming for quality. Eventually, I got it published in an international journal.

However, I would say if I were to go back, there’s not much that I would change because this formula is working for me now. I’m just continuously pushing myself, setting goals towards things that I’m afraid of doing. That’s what I do. Before I start doing something, I ask myself, “Am I scared?” If I’m not scared, then I don’t do it because it is through doing things that we are afraid of that we grow the most.

If there is one critical piece of advice that I’d give to aspiring cybersecurity professionals, it is that cybersecurity has become a product business issue with implications to the global economy; to the business value chain; to customer retention, business growth managers, and acquisitions; as well as to strategic business imperatives. If you can place yourself as someone who can communicate persuasively and with impact, who can simplify that critical message and push it to the wider business community, you’ll be able to differentiate yourself. Every time I mentor people, I see people doing the same old thing. They get certification after certification but forget that maybe 10 million people look like you. How are you different? What is something different that you bring to the table? I would say writing is something that you should strongly consider.

 

Ambler T. Jackson | Senior Privacy Subject Matter Expert | (LinkedIn)

If I had an opportunity to go back to the beginning of my career, I would have dedicated some additional time to learning about the technical considerations of data governance first. While I later studied data governance, what you learn from databases, data models, and data management helps to provide the big “forest-from-the-trees” picture for understanding why and how organizations capture data and how data elements move throughout the data lifecycle. I wish that I had obtained the formal education at the outset, as it would have helped to set the stage for fully understanding the lifecycle of a data element early on.

 

 

 

Amanda Honea-Frias | Head of Product Security at Duo, Cisco | @pandaporkchop | (LinkedIn)

I am not one to wish for a time machine in general. I believe each success and failure has made me who I am today. I do not want to sound like I have had a perfect journey and that I have achieved all that I have intended to accomplish. Quite the contrary. My life is a continuous journey, and my occupation is just a part of that journey.

 

 

 

 

Katie Moussouris | CEO of Luta Security | @k8em0 | (LinkedIn)

If I were to go back and give my younger self advice, I would probably aim myself towards early ventures that accumulated a lot of capital, a lot of cash. And the reason for that is not that everything comes down to money, it’s just that money makes a lot of things easier, such as making your ideas come to light and to fruition.

When you’re a minority woman in any industry, I think it’s a challenge for us to be taken seriously early in our careers, mid-career or late in our careers. I think that having access to capital and the means to make some of our ideas come true is important. That would have been the advice I would have given myself back then.

 

 

 

Mo Amin | Independent Cyber Security Culture Consultant  | @infosecmo | (LinkedIn)

If you can, try and find a mentor. There are more avenues and channels now than when I was starting out. When you find someone, make sure that you play your part in the relationship. You need to put the effort in, too. Also, remember to be patient with yourself. You can’t know everything at once. Pick an area that interests you and try to become the best that you can be in it.

 

 

 

Richard Archdeacon | Advisory Chief Information Security Officer, Duo Security | (LinkedIn)

It’s about people. We have to understand the technology. But the most important skill is communication. No matter how strong our technology controls are, we will get nowhere unless we can explain the “what” and the “why.” Otherwise, we will become an obstruction and not a help.

Our colleagues do not come to work to do security. They come in to carry out their tasks in their own departments in order to fulfill their roles. We need to ensure that they feel secure at work but not hindered from carrying out what they see as urgent.

An essential element of any change program is to articulate a vision and a set of objectives. This was a fundamental part of every IT transformation I have undertaken. However, all too often, technology solutions drove security. So, we have had to learn to build a network of the human sort in organizations as well as to ensure they understand the need and benefit of secure working. This has been the biggest change in security. Those CISOs who have succeeded have managed this aspect of their role well.

 

Want to learn more about what budding security professionals can do to advance their careers? Download Cisco’s eBook today!

Share:





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Budding, Career, cybersecurity

Special Offers

  • Luminox Black OPS Carbon Quartz Men's Watch XL.8802.F (Store-Display Model) for $199

    Luminox Black OPS Carbon Quartz Men's Watch XL.8802.F (Store-Display Model) for $199
  • Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52

    Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52
  • Accordina Ambient LED Collapsible Wireless Phone Charger for $29

    Accordina Ambient LED Collapsible Wireless Phone Charger for $29
  • Swarovski "Bee A Queen" Rhodium-Plated Crystal Necklace & Earring Set (Store-Display Model) for $84

    Swarovski "Bee A Queen" Rhodium-Plated Crystal Necklace & Earring Set (Store-Display Model) for $84
  • Swarovski New Love Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $65

    Swarovski New Love Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $65

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52

Apr 15, 2021 By iHash

Accordina Ambient LED Collapsible Wireless Phone Charger for $29

Apr 14, 2021 By iHash

Tags

* Apple computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPad iPhone iPhone 6 Malware microsoft network security OS X Yosemite Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news update video web applications
Copyright iHash.eu © 2021
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.