CISO Gems

For destination overworked CISO's

Why You Don’t Need Every Job Qualification

CISO Strategy
December 7, 2024
Sanju Misra shares career tips, taking risks, and growing beyond job descriptions to build inclusive, dynamic teams.
Topics discussed in the episode:
-
Why is it important to take on new roles despite not knowing everything?
-
How can prior IT experience contribute to a cybersecurity role?
-
Can security skills be taught to individuals without prior experience?
-
Why is it important to address web security and virus protection together?
-
What are the benefits of training non-security staff for cybersecurity roles?
-
How can internal hiring improve cybersecurity teams?
-
Why are individuals with desktop support experience valuable in cybersecurity roles?
-
How does implementing PKI and certificates enhance organizational security?
-
Why is building relationships crucial in implementing effective security measures?
-
How to build a security team to address evolving cyber threats?

Why is it important to take on new roles despite not knowing everything?

Taking on new roles can help address cybercrime by bringing fresh perspectives to cybersecurity challenges.

\"I'm glad that I took a chance with not knowing the new role 100%. I think sometimes people feel they have to know how to do the whole role before they even apply for it or entertain it.\"

  • Sanju encourages stepping out of comfort zones.
  • New roles bring new perspectives on cybercrime.
  • Develops innovative security solutions.

How can prior IT experience contribute to a cybersecurity role?

Prior IT experience can be valuable in addressing vulnerabilities and exploits in cybersecurity roles.

\"I said, well, you're right. I don't have direct security experience, but I've worked with networks, I've worked with desktop, I've worked with UNIX Admins.\"

  • Sanju leveraged her IT background.
  • Transferable skills are valuable.
  • Broad IT knowledge aids vulnerability management.

Can security skills be taught to individuals without prior experience?

Security skills can be taught to those without prior experience, addressing identity and access challenges.

\"I can teach the security stuff.\"

  • Steve believes in training staff.
  • Emphasizes potential over experience.
  • Addresses identity and access issues.

Why is it important to address web security and virus protection together?

Protecting against viruses and securing websites are critical to prevent cyber attacks and vulnerabilities.

\"We grew out that team to help protect from viruses to going on with websites.\"

  • Sanju covered viruses and web security.
  • Combining efforts strengthens defenses.
  • Comprehensive approach reduces vulnerabilities.

What are the benefits of training non-security staff for cybersecurity roles?

Training non-security staff for cybersecurity roles can address vulnerabilities and strengthen defenses against cyber attacks.

\"Over half of our staff were non-security people, meaning we move them into being security people.\"

  • Steve highlights training internal staff.
  • Expands team's skill set.
  • Effectively addresses vulnerabilities.

How can internal hiring improve cybersecurity teams?

Internal hiring can strengthen cybersecurity teams by leveraging existing talent familiar with identity and access systems.

\"Whenever I have new roles to fill, I always look internally first and I look for those folks that are in the desktop or network operations that want the next challenge or have a lot of, you know, creative ideas on how to resolve things and build out those relationships.\"

  • Sanju prefers hiring internally for security roles.
  • Internal hires understand company systems.
  • They enhance identity and access management.

Why are individuals with desktop support experience valuable in cybersecurity roles?

Individuals with desktop support experience bring valuable knowledge to cybersecurity roles, aiding in addressing vulnerabilities and exploits.

\"I find that people that have done desktop support, sysadmin or even help desk have been some of the best security analysts I've ever hired because they know the technologies and the tribal knowledge on how the processes work and how the technology is deployed.\"

  • Steve values hiring from desktop support roles.
  • They understand technology and processes.
  • They can address vulnerabilities effectively.

How does implementing PKI and certificates enhance organizational security?

Implementing PKI and certificates is vital for securing identity and access within an organization.

\"And then we grew to PKI and certificates and Wi Fi and it just kept rolling one after the other.\"

  • Sanju expanded security to include PKI and certificates.
  • Strengthens identity and access management.
  • Evolving security protocols are necessary.

Why is building relationships crucial in implementing effective security measures?

Building relationships is key to effective identity and access management, ensuring security practices are adopted across the organization.

\"You'll want a security person that's able to build those relationships with all these groups because security is part of everybody's role. And I have to build the relationship, build the trust and get people to do things that sometimes they don't wanna do.\"

  • Building trust helps implement security measures.
  • Security is everyone's responsibility.
  • Effective communication encourages adoption.

How to build a security team to address evolving cyber threats?

Building a security team that can adapt to evolving cyber threats is crucial for protecting against vulnerabilities and exploits.

\"I came in as a security engineer into the company and we grew out that team to help protect from viruses to going on with websites. And then we grew to PKI and certificates and Wi Fi and it just kept rolling one after the other.\"

  • Sanju built a team addressing multiple cyber threats.
  • Emphasizes adaptability and continuous learning.
  • Highlights need to evolve security measures.