Leadership

Robert Wood
Members Public

The top 10 lies we tell ourselves as security teams

Try as we might, security teams are often subject to the same sort of echo chamber groupthink dynamics that any other function might experience. There are subtle messages or biases that can creep into our collective consciousness and cause significant harm. This article will break down what I see as

Robert Wood
Members Public

Top 3 things that cybersecurity leaders can do to support team mental health

Last week's article focused on how individuals working in cybersecurity can better care for their mental health. The silent adversary in cybersecurity. This week, we will build on this and talk about things leaders can do to create and cultivate a team culture that supports mental health. This applies to

Frank Domizio
Members Public

The Intersection of Cybersecurity and Mental Health

Explore the unspoken impact of cybersecurity on mental health in our article. Discover the hidden challenges and the path to a healthier cyber-work balance.

Robert Wood
Members Public

5 Ways to Lead in Cybersecurity Without a Title

How do you step into a leadership role without a leadership or manager title? Should you be leading without the title? Should you be getting recognition with a title or other compensation if you're leading but don't yet have the title? All these questions and more are at the center

Robert Wood
Members Public

Skip the Exit Interview

And why you should show an interest in your team members before they make the decision to leave.

Robert Wood
Members Public

Where Soft Skills Meet Generative AI

The rise of generative AI tools has ushered in a new era in modern businesses, bringing with it untapped potential as well as unprecedented challenges. This technology has exploded onto the scene, and there are no signs that it will be slowing down anytime soon. Some organizations have decided that

Guest Author
Members Public

Leaning on Subject Matter Experts (When You Know Stuff Too)

Being boss doesn't mean you have all the answers, just the brains to recognize the right one when you hear it.” —Katherine Plumber.

Frank Domizio
Members Public

Mastering the Initial Incident Meeting: Top Ten Tips for Effective Cybersecurity Incident Response

In the world of cybersecurity, large-scale incidents require a swift and coordinated response. When facing a significant security breach, the initial incident meeting is critical for gathering the right people, setting the tone, and establishing a clear plan of action. This article will explore the top ten things to do

Robert Wood
Members Public

From Bits to Bias: Unveiling the Hidden Dangers of Toxic Cyber Cultures

On the Soft Side of Cyber, we've talked about what makes up a strong culture. This is also the final article in our short series on diversity, equity, and inclusion (DEI). We started this series with the different layers of diversity and the benefits of a diverse team. Next, how

Frank Domizio
Members Public

Part 3: Fostering an Inclusive Workplace Culture for Cybersecurity Teams

Welcome back for the 3rd installment in our series about diversity, equity, and inclusion (DEI) in cybersecurity.  In the first piece, we spoke about how diverse teams help advance cybersecurity.  We discussed how a wider range of people and viewpoints aid in the detection and mitigation of novel security threats.

Robert Wood
Members Public

The Feedback Factor: How Effective Feedback Drives Cybersecurity Excellence

Technical skills and knowledge are undoubtedly essential for anyone working in cybersecurity, whether you're a pentester or a SOC analyst, or something else entirely. However, at Soft Side of Cyber, we believe that the true potential of cybersecurity professionals can only be unlocked when they excel in their non-technical skills

Robert Wood
Members Public

From Words to Action: Crafting OKRs and Assembling the Team

Our last two posts in this series have discussed building a cybersecurity strategy and then communicating it to those needing to know. This need to develop a robust cybersecurity strategy is only getting more significant. However, the strategic plan doesn't add value until it is turned into action. This article