Kim Jones (42:41)
Have you ever imagined how you'd redesign and secure your network infrastructure if you could start from scratch? What if you could build the hardware, firmware and software with with a vision of frictionless integration, resilience and scalability? What if you could turn complexity into simplicity? Forget about constant patching, streamline the number of vendors you use, reduce those ever expanding costs and instead spend your time focusing on helping your business and customers thrive. Meet Meter, the company building full stack of zero trust networks from the ground up, with security at the core, at the edge, and everywhere in between. Meter designs, deploys, and manages everything an enterprise needs for fast, reliable and secure connectivity. They eliminate the hidden costs and maintenance burdens patching risks and reduce the inefficiencies of traditional infrastructure. From wired, wireless and cellular to routing, switching, firewalls, DNS security and vpn. Every layer is integrated, segmented, and continuously protected through a single unified platform. And because Meter provides networking as a service, enterprises avoid heavy capital expenses and unpredictable upgrade cycles. Meter even buys back your old infrastructure to make switching that much easier. Go to meter.com CISOP today to to learn more about the future of secure networking and book your demo. That's M e t e r.com CISOP. Deeds, not Words I first ran across this phrase some 40 years ago while indulging in one of my longtime secret pastimes watching B grade action movies. While I remember the movie as being cheesy beyond belief, for some reason the phrase etched itself into my teenage psyche. The idea that what you do is more important than what you say, that your actions define who you are and what you're about. That resonated with me. I've taken this philosophy into my adult life, approaching the world with a show don't tell attitude. Specifically, don't tell people who you are. Show them, do what you say you're going to do, and above all else, be consistent in word. And indeed, ironically, I find that these three tenets appear to be what's lacking in today's cyber talent ecosystem, and that deficit seems to be one of the root causes of our challenge. It's clear from this season's explorations that there is no one correct path to enter into and progress along the path in cybersecurity, but there are certainly a number of wrong paths. All of those wrong paths have one thing in common they are riddled with inconsistencies on the part of the profession. Common themes are 1 the lack of agreed upon job descriptions 2 the prominence of nonsensical job descriptions 3 the seemingly endless complaining about a lack of skills without defining skill requirements 4 the continued prominence of talent theft versus talent growth and 5 the prominence of myopic tactical approaches to the talent problem, focusing on the immediate needs of an organization but ignoring long term operational goals. There continues to be a cacophony of loud discussions on these themes without any change taking place, which has left us with a lack of credibility both within and outside the cybersecurity profession. If we want to get serious, truly serious about the cyber talent challenge, there are a handful of things that we need to do. 1. Map the terrain in response to our industry's complaints, as well as our misreading of the data, there are now a plethora of pathways for entry level candidates that are producing well in excess of the entry level opportunities that exist. The first step must be for us to delineate clearly what positions we consider to be entry level positions. Soc analyst, for example, comes to mind, or infosec security Specialist. Next, we need to reframe our message to talent creation organizations to focus on those entry level positions and the true quantity of opportunities available. This approach will most likely disappoint organizations and institutions who have invested time and resources in creating now bloated pipelines, but it remains disingenuous of us as a profession not to address this situation with candor. Lastly, we need to reset experience expectations for entry level candidates. As discussed in an earlier episode, we need to realize that entry level experience may be a combination of internships and other cyber related or IT work. If you're expecting new hires to have more than a year's experience, though, you're not looking for entry level candidates, but rather looking to steal experienced assets. 2. Create internal pathways for Cyber Talent Many organizations treat cyber talent like mercenaries who are there to perform a specific task. There are no clear pathways for promotion nor to expand one's capabilities by taking on other cyber roles within the security organization. Indeed, many companies and sadly many so called leaders within the cyber community are afraid to educate, train and promote their personnel for fear of losing a resource that is performing a specific task right now with this attitude, is it any wonder that talent tends to rotate out of organizations routinely? While promotion should never be automatic, it should always have a large merit component driving them. Holding resources back for fear of losing talent is a surefire way to, well, lose talent. Make sure your team understands all requirements for promotion, including skill levels, abilities and knowledge required, and that you are providing them opportunities to acquire the necessary tools to be considered for advancement. 3. Create consistency throughout your talent lifecycle this point has serious rant potential for me, so please bear with me. If I were to pick the one major source of our challenges, this would be it folks. I genuinely do not care which of the myriad opinions you hold regarding creating and advancing talent. I do care that for the most part, we are failing to walk the talk around our opinions. If you believe, for example, that we are more trade than profession, great. If that's the case, then stop recruiting for talent exclusively at colleges and universities and create interview processes that focus on knowledge and skill demonstration. If you believe that a good cyber professional needs solid IT experience before entering the field, also great. If that's the case, then adjust your starting salaries for junior cyber professionals to account for the additional years of experience and start creating programs with each in your organization to migrate IT professionals into cyber. If you believe the best way to acquire cyber folks is to grow them organically from anywhere within the company, that's wonderful. If that's the case, then you need to create the organic pathways and training programs to allow this to occur. In one of my former organizations, I propose creating a pathway for our customer care people to become entry level cyber professionals. These folks had already been vetted and hired as assets to the company. This initiative would give them a pathway to progress from holding a job to having a career. As an added bonus, since customer care staff tend to be more diversified than technology teams, it produced a mechanism to organically create more diverse organizations. If you believe that cybersecurity requires a degree, that's positively fantastic. If so, then you need to support the degree programs that are out there by providing meaningful internships, guest lecturing, or joining extended faculty in their degree programs and hiring graduates. Above all else though, you need to stop nattering about how it should be without also fighting to create the ecosystem that can get you there. Stop complaining about it and act rant over this season, we talked about the various pathways to entry into the cybersecurity arena and the advantages and disadvantages of each. We explored some of the misconceptions, prejudices and myopia cybersecurity leaders can cling to about these pathways. While there is no one right way to enter the the field, we've shown this season that there are some wrong ways, and those all center around the inconsistencies that we as cyber leaders promulgate in the environment. If we want to restore our credibility and arete, we badly need to standardize our definitions and expectations of cyber candidates and stop being so afraid of having to backfill positions. We refuse to educate, train and mentor our people. It's time to stop talking and start doing, in other words, deeds, not words. My two cents.