First%2090%20Days%20Of%20CISO%20Elevating%20Cybersecurity%20Leadership%3B%20Aligning%20Strategy%2c%20Communication%2c%20and%20Expertise.png?profile=RESIZE_710x

 

 
 
The speakers delve into the transformative power of self-assessment, team building, and aligning with business strategies within the cybersecurity domain. The discussion begins with the story of creating a fictional resume, which served as a gap assessment tool, guiding the speaker's journey to becoming a Chief Security Officer (CSO) over six to eight years. The narrative highlights the importance of recognizing and addressing personal and professional gaps to achieve career goals.

 

 

 

 

 

Here is the verbatim discussion:

 

Was uh to bring my resume and actually i brought two he gave me directions to bring my real resume that was truthful and also to bring a complete fake resume a total made-up fictional resume that made the fictional resume was me being qualified for a cso position that was currently posted in the area and so i had seen on the job description bachelor's degree required master's degree preferred experience in consulting experience in program or software development all these things that were not me and and what was an interesting you mentioned it earlier a gap assessment for many things that we do uh the difference between my fictional resume and my actual resume was the gaps right uh which became a to-do list for the next six to eight years and since then i've been a cso in two companies and um have completed my master's degree and have uh filled in every aspect of the gaps with the exception of software development i i'm never gonna be a software developer and and i'm just gonna be okay with that uh but all of the other gaps got filled so stablished team um i'll talk a little bit later about um a complete and accurate inventory but one of the things that's really important is to do an inventory of your team i personally do not want to surround myself with people that think like me act like me make decisions like me because then we'll all do the terrible things that i do i want to surround myself with people that think differently than me and act differently than me so that together we can achieve more on the the the task at hand so um so that that first before i get there or that initial stage is really about identifying the strengths and weaknesses of your team uh hopefully you already know your own strengths and weaknesses uh if not you should definitely be be working on that but um starting to build your team that reports to you or or within your organizational structure and then start to expand out what's the strengths and weaknesses of your peers and and their direct reports and that type of thing yeah that's a great point and in fact um there's some of the things which i have done and and i haven't kind of changed my role too many times by virtue of whatever i typically do but once when we got acquired and then my role changed quite obviously so one of the things which i did which was very important was actually to go and even before joining uh spend a good amount of time with the ceo uh going out may be overused but follow the money so meet the cfo find out where the revenue comes from find out where the expenses come from uh build that relationship so that you can start to understand your own budget but learning the business strategy if uh man if the if it's a manufacturing environment manufacturing quality control those those are things that are important to them the manufacturing area design software development quality assurance all those kind of things are important to those leaders so i  think that what's important is to um find out what that industry think is important right um pharmaceuticals is gonna have intellectual property concerns they're they're gonna have manufacturing quality uh they're gonna have uh fda studies or or statistics those things are important to them uh but completely opposite in the health care uh it's patient it's all patient records there there there's um very little inventions.
 
 
 

Highlights :

Self-Assessment and Career Development: The conversation emphasizes the significance of self-assessment and gap identification in personal and professional growth. The speaker's experience of creating a fictional resume and using it as a roadmap to fill gaps underscores the importance of proactive career development and continuous improvement.

Team Building and Diversity: The discussion transitions to the importance of building diverse teams and surrounding oneself with individuals who think differently. Recognizing the value of diverse perspectives, the speaker advocates for identifying strengths and weaknesses within teams to foster collaboration and achieve collective success.

Alignment with Business Strategy: The conversation concludes with insights into aligning cybersecurity initiatives with broader business strategies. By understanding industry-specific priorities and building relationships with key stakeholders, cybersecurity professionals can effectively contribute to organizational success.

 

As the conversation draws to a close, it leaves listeners with valuable insights into self-assessment, team building, and aligning cybersecurity initiatives with business strategies. The journey from self-assessment to career advancement underscores the importance of proactive career development, while the emphasis on diversity and alignment with business priorities highlights the holistic approach required to thrive in the cybersecurity domain. Overall, the conversation serves as a valuable resource for cybersecurity professionals seeking to navigate their career paths and make meaningful contributions within their organizations.

 
 
 
 
Speakers:
 

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to the cloud.

 

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/ 

 

Matthew Ireland serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure. With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders. serves as the Chief Information Security Officer (CISO) at NTT Research, where he leads cybersecurity initiatives to safeguard the organization's digital assets and infrastructure.

With a wealth of experience in cybersecurity, Matthew brings expertise in aligning security practices with business objectives and fostering collaboration across diverse teams. As CISO, he is dedicated to implementing robust security measures and staying ahead of emerging cyber threats to protect NTT Research and its stakeholders.

https://www.linkedin.com/in/mdireland/

 

 

 
 

 

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform