Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Released Tuesday, 16th January 2024
Good episode? Give it some love!
Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Breaking into Cybersecurity - Leadership - David Adeoye Abodunrin

Tuesday, 16th January 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

Welcome to another episode of Breaking

0:02

into Cybersecurity Leadership, where

0:04

we talk to cybersecurity leaders about

0:07

developing our next generation. Today

0:09

we have David will be sharing his

0:12

experience of getting into cybersecurity

0:14

leadership and sharing his

0:17

tips and tricks for you. Before

0:19

we get started call for everyone.

0:22

If you're seeing this, share this with

0:24

others. 'cause we do need

0:26

a diverse set of leaders

0:29

as well as a diverse set of individual

0:32

contributors within the cybersecurity environment

0:35

so that we could tackle the complex problems

0:37

of today and tomorrow. David

0:41

tell us a little bit about your background and

0:43

what got you into cybersecurity. I.

0:46

All right. My joining to cybersecurity is

0:48

a very interesting one. Having started my

0:50

career in core technology

0:53

telecommunications, Pure

0:55

signaling, uh, long

0:58

distance communication stuff, antennas

1:00

and all of those things. That

1:02

was the beginning after my first degree

1:05

in electronics, computer engineering, telecoms

1:07

was my passion and my love at

1:09

the time. So went round, did external

1:11

line plans switching some

1:14

routing. So basic stuff

1:16

for was C-N-E-C-C-M-P certified. Worked

1:19

with a few organizations in network administration

1:23

and all of those early stuff. And

1:25

somewhere at the fourth to

1:27

the fifth year in my career I began to

1:29

notice a couple of things. There was

1:32

a lot of prestige and respect around

1:35

security. That was the days

1:37

of the Cisco CCDP certification,

1:40

design, security, professional Security

1:43

Pro CCSP, security professional. There

1:45

was a lot of respect and

1:48

prestige along those lines and

1:50

just. And excited anytime the CCSP

1:53

guys came in, they came in only once

1:55

in a while and they collected fat monies

1:58

that the c the CCMP

2:01

guys weren't collecting. anD

2:03

I was like, what is going on here? These guys and

2:05

their routers are very expensive. tHe

2:08

switches are very expensive and they don't they

2:11

don't particularly do too much. They're just there. Not

2:14

much was but they got paid very highly. And

2:16

so that was also about the time

2:18

when the telecoms revolution

2:21

in my country started where we moved from

2:23

the pt PSTN network

2:25

to the core select technology. I

2:28

had the benefit and the advantage of being

2:30

part of that transition

2:33

and having understanding about external.

2:35

And also at the transmission

2:37

centers the long distance trans transmission

2:40

centers. I got interested in

2:42

security after an incident as

2:45

a young engineer where heads

2:47

began to roll. There was a

2:49

breach in the switch, uh,

2:52

the billing platform of the night

2:55

tale. Tel is communications

2:57

limited. There was a breach in

2:59

billing, and that breach

3:01

was very significant. So

3:04

my the entire, everyone caught

3:07

cold. Everyone was very troubled and

3:09

that started, they had to implement some security

3:12

features. In the switch. And that began

3:14

my foray and my interests beyond

3:17

traditional signaling, beyond

3:19

common channel signaling

3:22

seven systems and the common

3:24

things we do both in switching and routing. That's

3:26

apart from the traditional

3:29

network on the telco network

3:32

side. So I read up a few of

3:34

the chapters in the security professional

3:37

book and. Sensitized. Then

3:40

we had as a network administrator, one

3:42

of the clients I worked for, we

3:44

had a security breach where

3:46

someone's password was breached.

3:49

As a network, as a young network administrator,

3:52

the amount of pressure that came

3:54

with it, the user issues, the stress

3:58

and how much management hit energy

4:00

on further securing. Those

4:03

networks and those issues

4:05

and then it was amazing for

4:07

the first time. It was an rare moment for

4:09

me for the first time when I saw how

4:11

much potentially we could lose. In

4:14

that case, we didn't lose much, but how

4:16

much we could potentially lose was

4:19

a very big issue for me. It was, I

4:21

kept turning and tossing on my bed, what

4:23

if the wrong, because that's a very small

4:25

person who had. Access

4:28

to very sensitive systems.

4:31

He was the person who authorized everything

4:33

when payment is in and it's gonna go in

4:35

hundreds of millions, he was one to go to.

4:37

So I was like, wait a minute guys, what

4:40

if something happens to this

4:42

man? And his password is compromised,

4:45

is beaten up, and his password

4:47

is compromised, and we have to,

4:49

pay heavily for it. That began my

4:52

strong journey and

4:54

my strong desire to ensure

4:56

that I master cybersecurity. So I began

4:59

to, get interested, do conferences,

5:02

read more around it. And that started the journey

5:04

for me. And of course, I also,

5:06

I made a good transition into program

5:08

management, where now implement

5:10

projects and for whatever reason, Cybersecurity

5:13

projects started getting thrust at me strengthening

5:16

infrastructure, toughening

5:18

up infrastructure, improving identity,

5:21

uh, systems and all

5:24

of that. And then along the line, I

5:26

stumbled also into card transactions

5:29

and the import of those and the amount

5:31

of fraud that happens, or the

5:33

amount of fraud that industry up because,

5:36

geometric rise in the transaction

5:39

rates on the planet. thE

5:41

internet has become the place. You

5:44

have it online. You seldom buy. I use my phone,

5:46

the NF NFC here right now to,

5:48

to all the way from taxis. To

5:51

eating at the restaurant, to

5:53

ordering something on Amazon. Everything is

5:55

up ally but then at

5:57

this time it was still starting. aNd

6:00

so all of that energy and as I

6:02

observed the future trends and the challenges

6:04

around cards, I got more interested in

6:07

cybersecurity and I've been on this journey in

6:09

total for about. To decades kids

6:12

been there, done that. I've worked within

6:14

the ERP domain,

6:16

rolled out ERPs, rolled

6:18

out infrastructure on the technology

6:21

technical side, been here, done

6:23

that and it's been a very, pretty amazing

6:25

experience. Loads of

6:27

lessons lose of very difficult

6:29

moments, uh, where

6:31

you had to answer questions of conscience. And

6:34

think about the future, when the

6:36

future has not happened. How do you prepare

6:38

for a future? You can't see, you can't crystallize,

6:40

you don't understand the risks, uh,

6:42

because of the limitation

6:45

of where you are. So this is a major challenge.

6:47

I've also seen in my journey over

6:49

the years. How do you prepare for volume

6:52

of transactions that suddenly balloon

6:54

up

6:55

Yeah. Thinking about the future is definitely

6:57

important. What, as you think about your

6:59

journey why did you decide to pivot to

7:01

become a cybersecurity leader versus

7:04

staying an individual contributor?

7:06

I decided on the leadership route

7:08

be because anyway, leadership was thrust at

7:11

me. In my role as a project manager,

7:13

I have been forced to, whether

7:16

I like it or not, I have to take leadership,

7:19

from a communication standpoint,,

7:22

I had to be comfortable, for example, with

7:24

addressing the elephant in the room having

7:27

difficult conversations that nobody was willing

7:29

to have. Collaborating with difficult stakeholders

7:31

because the success of and

7:34

the failure of the project rests on

7:36

me. Generally typically I'm in charge of

7:38

scheduling and ensuring that things

7:40

happen as at when due.

7:42

When you are in those kind of roles, you

7:45

are like the proverb proverbial

7:48

dancer who cannot look

7:50

at the noise of the markets. You got a job

7:53

and everyone depends on you as a driver

7:56

to take them from point A to point B.

7:59

Now that requires a lot of

8:01

leadership, a lot of excellence,

8:04

a lot of dedication and passion

8:07

beyond being an individual. And

8:09

anyway, I enjoy their attention. It's

8:11

not very easy being a leader must confess to

8:13

you because then you

8:16

are much more aware of your own weaknesses.

8:19

And your fullness are heightened. And

8:22

indeed, your personal,

8:25

uh, private failing moments can

8:27

be easily amplified and

8:29

you can cause damage at a bigger level. Now, awareness

8:32

of those kind of things make it very sobering

8:35

and make it difficult for one to gloss

8:37

over. But all in all, I'm grateful

8:39

for the opportunity first to

8:41

serve. And to keep serving in

8:44

leadership position because, anyway, I

8:46

always, when I talk online, I find myself in

8:49

conversations all of a sudden taking the lead,

8:51

not because I want to demonstrate superior thoughts

8:54

or I want to show myself off,

8:57

but it's coming more from a heart of service. A hat

8:59

of help, a hat of a responsibility

9:02

that things could be better, and that

9:04

is the driving force. Although over the

9:06

years, that has been misunderstood

9:09

and people think you want to show off. People think you have

9:12

a desire to make others look stupid. But no,

9:14

it's just that you just want

9:17

things to be better. Than they

9:19

were and you think we can all benefit from

9:22

a better system and with no hidden agenda.

9:24

This is what thrust me into

9:26

the leadership positions. I found myself

9:29

either in the project room or in

9:31

the technology field or even in third leadership, that

9:33

I championed a lot. I.

9:34

So A, as you look

9:37

to grow your leadership skills, what

9:40

in your view are the critical

9:43

skills needed for a cybersecurity

9:45

leader? I.

9:46

That's a very deep question right there,

9:48

iT's multidimensional. Chris that's

9:51

very deep. Let me say this. fIrst

9:54

of all, you must want it. You

9:56

must want it, and that is

9:58

not a skill you gather in any textbook

10:01

or a skill in any material. It's

10:03

pure personal desire when

10:05

your PDI Personal Desire

10:07

index or indicator, which is

10:10

a measure of your cautions,

10:13

which is a measure of PDQ, personal

10:15

desire. ENT when

10:17

it's below a certain number that

10:20

is beyond the equilibrium of

10:23

the industry and where you are in your

10:25

life. Don't take the leadership position. When

10:27

your internal willingness versus

10:30

the industry equilibrium and the

10:32

strength of events in the environment

10:35

is at a higher level of turbulence than you can

10:37

allow, for example, as one of the factors

10:39

we are measuring within your life

10:42

at that time. Don't take that position when

10:44

you, where your desire is higher than

10:47

that equilibrium point and

10:50

the higher. To lead. This is

10:52

genuine desire, not ambition,

10:54

because there's a difference between ambition

10:58

and assistance. I call

11:00

it assistance. The willingness to be

11:03

good and to help the willingness that everybody

11:05

trusts me to stand at this door and

11:08

the willingness to serve rather than I

11:10

want to be the most for

11:12

the purposes of advertisement

11:15

and size, ego and all of those kind of

11:17

things, and somewhere in the future of

11:19

your leadership. That metal will be

11:21

tested. You will either be converted.

11:24

A more humble leader or more authentic leader,

11:27

or you will grow much more narcissistic

11:30

or something, and eventually your

11:32

time will pass without you having

11:35

left any legacy or you

11:37

will learn the lesson. Or nature happens to

11:39

you, whatever happens, X. But I

11:41

think that personal desire is the place to start from. It's

11:44

even a calibrator of how far, how

11:46

well you would do. So I don't sidetrack the conversation.

11:48

So the rule is the hire your

11:51

personal desire to lead, especially from

11:54

the positive psychologist standpoint. The

11:57

higher it is than that equilibrium

11:59

point for the industry and the environment you are in

12:01

at large, the more your chances of

12:03

success as a leader. That's the first one.

12:05

Can I stop you there? Because it's, that's something

12:07

that I have not heard about. For those

12:09

that are looking to learn

12:11

more about this, where

12:14

did. Where's this where

12:16

did you find this from? Or where did

12:18

you learn this so that they could dig into this

12:20

themselves.

12:21

I do a lot of personal introspection and

12:24

I try to find my answers. I don't find my,

12:26

not pull, of course, I've

12:29

read a lot of things, but it's rooted in

12:31

the materials of self-awareness to be

12:33

aware of your desires. Self-belief,

12:36

first of all, self-awareness, self-belief,

12:39

self-esteem, self-acceptance and

12:42

self-promoting, and yet being

12:44

selfless.

12:45

Makes sense. Makes sense. Yeah. I'm

12:47

a big supporter of the north of having

12:49

your North Pole as well, to help

12:51

yeah, exactly. So having my north pull and

12:54

then not following the tide on

12:56

the outside, but having my north pull

12:58

on the inside was the

13:00

way I arrived at this particular solution.

13:03

That my personal desire indicator

13:06

based on all of this foundations of

13:08

my self understanding and awareness of

13:10

where I am. Must be beyond a

13:13

certain threshold of the entropy

13:15

or chaos of the environment. How

13:17

difficult is the leadership role? How

13:19

difficult is it to be a leader in that time?

13:22

What are the challenges the organization or

13:24

the context is facing? Who

13:26

are the players there? Would

13:28

they be willing to give me a chance to succeed

13:31

or fail? Is it context favorable?

13:34

If you're gonna be a leader in a place where you don't understand

13:36

the language, maybe you should not take up the

13:38

role. Maybe you should not just to be a leader there, you

13:40

don't even understand the language that you can't

13:42

even converse and you cannot even engineer.

13:44

Meaning beyond communication. Communication

13:47

is one thing, but meaning is

13:49

when David is

13:51

able to put the exact signal in

13:53

his mind, increase his mind, and

13:56

Chris's response. In such

13:59

a manner that David knows

14:01

that what he was originally intended to

14:03

pass across has been understood. This

14:05

is basic communication engineering.

14:08

So if you don't, if you're battling language

14:10

for example, then maybe you should

14:12

humbly not take the organization

14:15

or that leadership role up. So

14:17

those are the entropy factors. The questions

14:19

the threshold points. For example, another

14:22

one for example, is if you don't understand the culture.

14:24

Or you cannot fit it to the culture. Culture

14:27

will always eat strategy for

14:30

lunch and dinner and breakfast.

14:32

Culture will always destroy

14:35

the strongest of our good

14:38

lofty idea. So as a leader, as a

14:40

cyber leader, if you don't have

14:42

the cultural intelligence to lead

14:45

in that environment, maybe you

14:47

should pursue that. But there are complement skillset,

14:49

like cultural adaptability. If

14:51

you are culturally adaptable, you know

14:53

you are strong on the agility leg,

14:56

which is another, that being agile or understanding

14:58

agile frameworks helps you to do when you're a cyber leader.

15:01

So it's not a doom and gloom thing. If

15:03

you notice that there's a gap between where

15:05

your personal desire index

15:08

is. And where the level of

15:10

the threshold level is, then

15:12

you can bridge the gap and yet you

15:14

can lead. So it's not, but it's to be aware that's

15:16

a gap between your personal desire is

15:19

and some of the person's desires, mislead them your

15:21

desire. You may not be ready, you

15:23

may not be competent. So desire is empty

15:26

if it does not pass through. Personal desire

15:28

is empty if it does not pass through

15:30

the very lens of self discovery.

15:33

Self-awareness, self-acceptance,

15:36

then self-esteem. And then before you

15:38

now go to self-promoting in

15:41

all of these, yet being selfless.

15:44

So that you're not full of yourself, but you

15:46

want to serve and really solve a

15:48

problem. And if we were

15:50

to choose between Chris and I

15:52

will vote for Chris if Chris is a better

15:54

candidate than I am to help

15:56

us through the bridge. Chris knows how to swim.

15:59

I don't know how to swim. So

16:01

this organization is at the point within their

16:04

corporate lifecycle where they

16:06

are rolling out a lot of new products. And

16:08

Chris has had experience in products

16:11

rollout and Chris understand

16:13

the cybersecurity challenges and

16:15

the risks that happen in that particular

16:17

sector. Why do I want to

16:19

rob the organization? I. Of

16:22

his expertise because I want to earn

16:24

a few dollars, or I want to be the known

16:27

guy or want to be the one who is leading

16:29

the team. That's one thing ago. On

16:31

the day, something critical will happen then

16:34

to a paid that. I don't know how to navigate that. Ben,

16:36

Chris is the better driver there. Why don't I give

16:38

him the leadership? You've been in podcasting

16:40

for a while and, there's audience

16:42

intelligence, for example, that you have around

16:44

the cyber regime and cyber world. Why

16:47

don't, I want Chris to lead the

16:49

conversation because everyone has

16:52

what they're useful for, even in

16:54

cyber leadership. Everyone has a use.

16:56

Every leader has the moment

16:58

and defined occasion of your use.

17:01

There's your ah, in leadership and

17:04

do not stay longer than those hours.

17:06

That's also a sub to council there.

17:08

Your tenure may be two years. You

17:10

may be a very strong risk manager, or

17:13

you are a strong infrastructure deployment

17:15

leader. Because you have project management

17:18

and agile understanding, like me, and

17:20

you could actually be a strong people leader

17:22

because the team needs more confidence as

17:25

they need someone who is a CISO or

17:27

a cyber lead that understands

17:29

that level of energy and intelligence, if

17:31

you get what I mean. So at the end

17:33

of the day, wisdom is

17:36

to select your location. A

17:38

moment of brilliance and know your own

17:40

leadership, DNA, and leave

17:42

that ethos and not be driven by external opportunity.

17:45

Again, that cushions personal

17:47

desire that is intelligent, so we

17:50

can call it intelligent personal desire

17:52

that's willing to be personally developed to

17:54

meet the threshold and need of the occasion,

17:56

and the willingness to leave when the

17:59

time is due, not necessarily when the vision is

18:01

loudest, when the time

18:03

is due for that occasion.

18:05

So it, it sounds like if I'm,

18:07

if I could paraphrase, understanding.

18:10

Your leadership abilities and your

18:12

readiness to be a leader is

18:14

one of those core critical skills in

18:17

your perspective. Are there any other critical

18:19

skills.

18:20

yes, there is what is called kudo or situational

18:22

intelligence or awareness. The ability to

18:24

understand situations quickly and

18:27

the ability to take decisions quickly,

18:29

that will help you need

18:31

it. In cyber security leadership,

18:34

you cannot afford not

18:37

to have it, but how do

18:39

you get The problem with experience is

18:41

that you gain good experience from bad

18:44

experiences,

18:45

There's cheap experience and there's expensive

18:47

experiences.

18:48

Thank you. I like that. That's true thank

18:50

you. Thank you So every

18:53

time someone listens to Chris Fullon

18:55

a podcast, that's good experience. You

18:58

listen to David or you subscribe to any of

19:00

the seminars that do in cyber leadership

19:02

or any, or anything that you do, or we

19:05

organize something together and someone listens.

19:07

Good experience. You don't

19:09

want to wait until crisis happens.

19:12

For example, I've seen cyber leaders who don't

19:14

know their, they're excellent panicker. I've

19:17

met CISOs who are panicker. That

19:19

is their profile. Their panic profile

19:21

is on the roof. They panic and

19:23

then they panic, and they pile

19:25

budgets at panic. So the full panela

19:28

and then they get before the executive team and

19:31

their leadership communication skills.

19:33

And futuristic skills begin

19:35

to be torn to pieces, only because the

19:38

excellent people, when there is no tension,

19:41

they can take their decisions. But

19:43

because they are good panicker or

19:45

warriors, they hip budgets

19:48

and they hip reinforce steel. They

19:51

toughen up, architectural toughen

19:53

up infrastructure, toughen up, and

19:55

management is asking. But there's been no incidents

19:58

in the past five years. Why do I need

20:00

another server or another thing this year?

20:02

And the guy goes that's because I'm good. I'm doing my

20:04

job. They're like, so that means we don't need it And

20:07

it won't be in that frame of mind, if

20:09

not for his personal panic. But again,

20:11

some amount of panic is good for a CSO

20:13

because in the school of cyber warfare,

20:16

as in real time warfare, only

20:18

the paranoid survive so

20:20

some amount of paranoia is needed. Paranoia

20:23

is needed in cybersecurity, but

20:25

at the same time, it's also

20:27

very difficult for

20:29

you to be extra paranoid when you are leading people

20:32

and not use panic to drive the

20:34

bus of the road. So panic profiling,

20:37

for example. You must understand

20:39

your panic profile from

20:42

situation awareness perspective in

20:44

a situation what's going on. What

20:46

are the main things? What's most profitable

20:48

action? Which level of panic

20:50

am I supposed to switch on? Medium, low,

20:53

or high? How do you apportion

20:55

or identify the necessary

20:57

efforts or response to

20:59

an incident in a personal profile? So all

21:01

of those internal readiness work must

21:05

be there. Then I say that leaders

21:07

must have the full grill

21:09

things, the fall. Of leadership,

21:12

mentor, coach, facilitator,

21:15

trainer, mentor, coach.

21:17

Not necessarily in that order, if you want me

21:20

to order it. Coach, mentor, fac.

21:22

Sorry, coach, facilitator, mentor,

21:25

trainer, coach, facilitator,

21:28

mentor trainer. Training is the last

21:30

one, but many leaders try to do training first.

21:33

Yeah, that makes sense. Some of

21:35

the other skills that I've found over the years

21:37

to be really critical,

21:39

and maybe I'll ask you to rate yourself

21:42

from a, a scale of one to five

21:45

is delegation. How. Would

21:47

you describe delegation and rate

21:49

yourself one to five?

21:51

On delegation, I'll probably rate myself four.

21:54

That's because I've done some wrong delegations. I'm

21:56

like, how did I make that mistake? But I read

21:58

myself four on delegation, um,

22:01

because I'm blessed with a real ability

22:03

to see people. And watch

22:06

and observe without any

22:08

bias until I understand what's going on.

22:10

I've learned that over the years. I

22:12

watch people carefully and I'm very

22:15

non-judging in the beginning to

22:17

ensure that I understand what's really going on, and

22:19

I'm also sufficiently friendly. I try

22:21

to be friendly to walk

22:23

across the beach, to understand, even if

22:25

I see an external behavioral pattern

22:28

calibrated by. What is behind it? And

22:31

is this something that can be brought up in a

22:33

direct conversation or something? We're

22:35

gonna use indirect conversations to deal with.

22:37

So on delegation, I have about four of

22:39

five in total because I still

22:42

have some hit and misses. That's part my method. Number

22:44

one with delegation is that there are tasks

22:47

to delegate and there are things you cannot delegate.

22:49

The wisdom to know what to delegate, I

22:51

wanna delegate is very important for

22:53

a cyber leader. Number two.

22:55

And yeah. Next. Collaboration.

22:58

How would you rate yourself in collaboration

23:01

on a scale of one to five and why?

23:03

Collaboration. I read myself again, four

23:06

because I've done some bad collaborations in

23:08

the past, and I am a

23:11

collaboratively shy person

23:14

now. Because I've had some bad

23:16

experiences, so I do more rigorous

23:18

interviewing the and

23:21

Trustingly. I do collaboration, intelligence

23:24

coaching. So there are people who come to me and say, I wanna collaborate

23:26

with this guy. What do you think? Because

23:28

I have some intuitive coaching practice I do by

23:30

the side and I'll just do an analysis, say,

23:32

what do you want? Do you want a person to

23:34

person profiling or you want a business to

23:37

business, whether your business and that business can collaborate.

23:39

And in most of the cases, nine out

23:42

of 10 times, I get it correct. That's for others,

23:44

but for me, I'm slower because

23:47

I would watch, ask questions,

23:50

understand intent, but the key

23:52

is to contract in the beginning. That's

23:55

my summary of it. Contract

23:57

what the transmission will be like. I.

24:00

Contract. What the trans, what? What is? What

24:03

is going to be the recipient's expectation?

24:05

What is the sender's expectation? What

24:08

will be the handshake in the middle? Design the

24:10

contracting of the collaborative efforts.

24:13

Put parameters at it. Let it be well

24:15

defined when issues happen, they're not covered

24:18

within the framework you've set up. Go

24:20

back again and look at the framework. This works all the

24:22

time. I've seen it work all the time. All

24:25

the time. It works.

24:26

Okay. And for communication,

24:29

how would you rate yourself on

24:31

a scale of one to five for communication

24:33

and why?

24:34

I give myself four, 4.5

24:36

over five, and that's because I

24:39

don't wanna be proud. I have seen a lot of, I,

24:41

I understand communication at the

24:43

human engineering human fiber

24:45

level. I know I have

24:47

developed, I've, because I want to

24:49

help people communicate better, and I've

24:51

seen cybersecurity leaders stumble

24:53

on communication a lot, technical leaders generally

24:56

over the years being, having

24:58

the blessing of being in many boardrooms, even

25:00

as a young engineer, just sitting down to observe

25:02

and the power of erasing one word and putting another

25:04

word. The power of raising a sentence, the power

25:07

of changing the body language. For

25:09

example, I dunno whether you know that technical

25:11

people communicate lower value

25:13

without them knowing just by body language

25:15

and presence. The average chief marketing

25:17

officer will always end higher than the CTU

25:20

and the CISO and every, and they're all on the same

25:22

level. What typically happens is that. Technical

25:25

leaders are communicating without knowing they're

25:27

even communicating body language conversations.

25:30

Watch when the CMO wants to talk or

25:32

a chief product officer, someone that's in the csuite

25:35

on the commercial side of the business. There's

25:38

some, there is some order, there is some practice.

25:41

aNd because I have worked in

25:43

the marketing regime. I've worked in the

25:45

core marketing comms group, the

25:48

largest one in West Africa by the way. I

25:50

saw what goes into those things. Technical

25:53

people are sought wire and technicality,

25:55

concerned that they don't know

25:58

that we should practice communication. That

26:00

we should literally practice

26:02

go before the mirror. If you go, if it's a real

26:04

big presentation to a board, it's a budget

26:07

presentation. Go nitty gritty. Ask

26:09

for feedback present within your team first,

26:11

before you go for the bigger one where you're gonna defend them. But

26:13

many Cs or CTOs or

26:15

CEOs, we just put together a slide the

26:18

morning of the presentation, they just

26:20

serve, move some things around, and then

26:22

they go there and present. Typically

26:24

there's a response. So for communication,

26:26

I read myself 4.5 over five and I also communicate

26:29

better. And lastly I have

26:31

some answer. Like I told you what is

26:33

in my mind and vice versa must

26:35

come into your mind. And we must get

26:38

feedback that we got what the

26:40

other party was saying. That is

26:42

when communication has happened. And I understand

26:44

the nuances and communication

26:47

is the biggest to adjust behavior.

26:49

And how would you describe the

26:51

skill of influence and why is it so

26:53

important in cybersecurity?

26:55

Influence is very important influence.

26:57

In fact, one of the things I'm researching

26:59

now because crime as a service.

27:01

Has become big and crime

27:04

as a service will become big. Second reason

27:06

why I'm studying this, the signs of influence

27:08

and psychology of influence in cybersecurity is

27:11

that criminal gangs are, have moved into

27:13

advanced persistent nature. They

27:16

morphed and now there's the nature

27:18

of advanced persistent rates, and we say that organizations

27:20

that there are two kind of organizations, those

27:22

that have not been hacked, and those that will be hacked eventually.

27:25

The other factor why influence is important

27:27

is that we are having more

27:29

energy. And more order

27:32

on the side of the criminals and law enforcement

27:34

is trailing behind and litigation is

27:36

also trailing behind as a global trend.

27:38

So we need to begin to learn

27:41

adversarial influence strategies so

27:43

that we can go beyond just influencing

27:46

our teams to influencing the

27:48

criminal behavior. We should go to the point where

27:50

we will be able to do prescriptive

27:53

analytics. That will almost

27:56

help us to know where the crime will come from because

27:59

the tools that are gonna be available to criminals

28:02

from, I mean that's been available since year

28:04

2020, COVID-19

28:07

date, and that will begin. There are people that commit

28:09

a thousand dollars a month. They

28:11

work and then you commit a thousand dollars a

28:13

month. And they can, and 10 of them can come together

28:16

into hacking and exploring breaches,

28:18

and they're willing to commit that kind

28:20

of money for five years. Trust me,

28:22

if they keep at it and hire professionals

28:25

and they're not go into crime as a service, they'll

28:28

begin to succeed. So how do we begin from a

28:31

security standpoint to influence criminal

28:33

behavior? What are the technologies that

28:36

we. Help us to lead them in

28:38

a certain direction. And that's

28:40

so that's an area that's a niche area. Adversarial

28:43

influence management, where we are

28:45

able to use influence tactics so that we will

28:47

be able to cage crime, for example, the

28:49

concept of the corporate cul-de-sac, where

28:51

you actually create vulnerabilities within your system.

28:54

wIndows is not to be doing that right

28:56

now. I think Azure has started and

28:58

Amazon, but you create, you,

29:00

you create spaces in the cloud where they, where

29:02

some data will be thrown at the guys so that they can

29:04

come at it, and then we use that to isolate

29:07

that place and use it like a lab to study

29:09

the intrusion. And what they're trying to do and

29:12

cage all the influence. Influence will

29:14

be in the future, very important for cybersecurity

29:16

leadership because it's a useful

29:19

adversarial tool. It'll

29:21

be a useful counter intelligence

29:23

tool. And another one is when you

29:26

are beginning to have anti forensics. wHen

29:29

criminals starts from understanding for forensics.

29:31

They understand cyber forensics, so

29:34

they start designing the crime

29:36

with the view to be OB,

29:39

oblivious or transparent so

29:41

that they're like water or you can't even plant.

29:43

So that our forensics process and tools can't

29:46

even capture their existence. So

29:48

we need to go influence. Because

29:51

now and then they go anti because, okay.

29:53

So we discovered that they're anti forensic. Okay.

29:57

Okay. Okay. Yep. Can I go on. So

29:59

we discovered that they're anti forensic, so

30:02

we do new tools. So it

30:04

is anti when you catch, when

30:06

you find a new way, the criminal fights another way. So

30:08

when you're going anti forensic, we

30:11

may begin to think about influence engineering. Where

30:13

we begin to engineer tools and techniques specifically

30:16

deliberately to begin to influence

30:18

the behavior of the nature of the

30:20

crime and how the criminal gangs

30:22

are ring themselves because of

30:25

anti forensic. The other thing is we would need

30:27

influence to inspire teams to do higher.

30:29

We need to challenge. The

30:31

blue teams or the internal security teams

30:34

and the red teams. In this case, were everybody

30:36

working with us to do more because

30:38

for every single cyber security professional

30:41

there about three or four criminals who

30:44

are ready to, do an

30:46

undo. So we have to develop

30:49

influence strategies to break

30:51

the human limit of our teams. And

30:53

make them superheroes and, create

30:56

bigger solutions that will keep

30:58

all of us safer. Because our infrastructures

31:01

are going to be exposed in the coming days. We're

31:03

getting connected in connected cities. We're

31:05

seeing water systems, and sewage systems with

31:08

just a single line of code being

31:10

breached together, where a whole community

31:12

found their sewage going into their water. Plan

31:14

that was processed because somebody got

31:16

into a computer system and opened a

31:19

gateway. So we need to find a way

31:21

of influencing our teams to become

31:24

far more cyber resilient

31:27

and go anti-fragile, which

31:29

is the upper limit of human response

31:32

to incidents.

31:33

Okay. Another topic that

31:35

I like to bring up. Is the

31:37

concept of networking, but not

31:39

networking like we, we started our

31:42

conversation with in telecom, but

31:44

networking with people. Why

31:46

is that such a critical skill for cybersecurity

31:48

leaders?

31:49

Yeah, because at which criminals

31:51

are going, again, they're networking.

31:55

There are websites now, not

31:57

even in the dark web, openly where Windows

31:59

vulnerabilities are described and discussed.

32:01

If we don't have find ways of

32:03

positive networking, the cyber criminals

32:07

will always network because if

32:09

they make a single hit hits, it's a

32:11

big deal for everybody. They understand

32:13

the idea of bounty sharing. And

32:16

it's a primitive way where criminals

32:18

want to rob one village, and by the way, we

32:20

are now a global village. tHe

32:22

village is strong if they're

32:24

attacking at individual times of the

32:26

day. But if they come at once, then

32:28

the village army is overwhelmed. Now

32:31

criminals are trying to engineer that kind of, there are

32:34

hotbeds, some of them, to

32:36

the point that countries are now involved. Are

32:38

sponsoring state sponsored cyber

32:41

criminal activity, state sponsored terrorism. Now,

32:45

we cannot just afford not to network.

32:47

In fact, regulatory organizations

32:50

both in the United States and the United Kingdom

32:52

and most of Europe. Are now

32:54

going cyber networking as a

32:57

regulatory demand. For example, share information,

32:59

the obligation to share. If something happens

33:02

to your network, please share because

33:04

you're connected to everybody one way or the other. Just

33:06

a memory stick in your laptop

33:09

can bring down a whole

33:11

nation's financial system. It can bring

33:13

down a old nation's electrical system. Please

33:16

don't keep quiet. And those are found. So

33:18

it's it's water. It's the way water

33:20

is to human life or

33:23

the way food is to existence. As cybersecurity

33:26

professionals, we must network criminals

33:28

are networking and the power of aggregation is

33:30

beginning to play out. We have no choice.

33:33

Chris, we have to network. It'll

33:35

be an anima to be a hacker. You

33:37

don't have a hacking group or a hacking community

33:39

where you organize private hackathons and

33:42

you have hacking weekend hangouts.

33:45

You cannot be a GRC consultant and

33:47

not belong to a. GLC group that

33:50

does Friday evening bear out,

33:52

or Friday evening, uh,

33:54

sushi or dinner. We must

33:56

network and grow

33:59

in communities beyond the

34:01

ordinary. Of course the only challenge is

34:03

that communities a domic side on trust.

34:06

But the bigger problem is that trust is

34:08

not a very easy commodity to combat. Cyber

34:11

professionals are naturally

34:13

skeptical and paranoid as.

34:15

Yes. Yes. That is true. That

34:17

is true. A as we wrap up our

34:19

podcast any final advice that

34:21

you would give to future cybersecurity leaders?

34:24

David, I.

34:25

Yeah, the future is green. Groom

34:27

your leadership without demand.

34:30

Go for supply before. The demand for

34:32

it will come. Meaning. Supply

34:35

yourself with knowledge. Expose your mind.

34:38

Join networks, learn and

34:40

prepare. Your day will come. We are

34:42

in combat zone. In cybersecurity

34:45

today, there is the

34:47

traditional. Council I would give was

34:49

the response of King David. My possession

34:51

is Christianity king David as

34:54

a young boy of about 18. His

34:56

father sent him that as the story goes

34:58

to go to the battlefront to check

35:00

his brothers up and give them some provisions and

35:03

some food and write

35:05

their his eldest brother Iab,

35:08

who was A much more stronger soldier.

35:11

And he was already known as

35:13

a war veteran, looked at him. He

35:16

said, I know your heart. Who did you leave the ship with?

35:18

How come you are outside here and trying

35:20

to, look at the war you want to show off?

35:23

And David said to him, is there not a

35:25

course? Many is are not a reason. Seeing

35:28

that these uncircumcised listings

35:30

are defiling the armies of

35:32

Israel. Forgive my reference to the Bible, but

35:35

that is a state we are in. In cybersecurity, there

35:38

is a course, C-A-U-S-E.

35:41

There is a course and your

35:43

day will come. Every bit of knowledge

35:46

and capacity you grow as a professional will

35:49

eventually pay off the day of,

35:51

pay off. You won't be ready. If

35:53

you did not go to the gym every day on

35:55

the day of payoff, when your specific type

35:57

of cyber leadership, your specific

36:00

capacity will be

36:02

required. If you are not in the gym two

36:04

hours a day, three hours a day,

36:06

you won't be fit for battle, but your day

36:09

will come. Don't despair. If you're

36:11

looking for a job, you're looking for a cybersecurity

36:13

role and engage Chris

36:15

as a coach. Subscribe to Chris's

36:18

coaching program. Engage him.

36:20

Give it 12 months, 24 months. Let

36:23

him guide you, for example, as a cyber coach, or

36:25

anyone around you, or whoever you

36:28

think, but engage your

36:30

muscles in advance because

36:32

the day of glory will

36:34

still come. Forgive me if I look

36:36

motivational or I sounded like a.

36:39

Well, David, thank you very much for joining

36:41

us. Really appreciate it. And

36:43

again, a reminder for those that

36:45

are listening, share with others. 'cause David

36:48

said we need a variety of people. We

36:50

need a variety of different skills and

36:53

everyone has their skills that

36:55

they can rely on. And we, we need

36:57

all sorts of different leadership. David,

36:59

thank you very much.

37:00

Thanks a lot, Chris. I

37:02

appreciate thanks for having me and thanks for

37:04

the great work you're doing in preparing leaders

37:07

in the cyber realms. We need more of

37:09

you and thank you so much for that.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features