Leadership In Cybersecurity; Sweet Talkers’ Effect
by Dr. Luis Noguerol
About the book
Leadership is undoubtedly a complex topic mainly because this is about human behaviors, attitudes, motivations, historical moments, preferences, and particular reasons to lead in one or another way. The subject of cybersecurity is problematic by itself because of all the ramifications, inclusions, obscurity, lack of knowledge to truly understand the possible consequences of insecure actions when working with information systems, frustrated employees, “bad” actors around the world motivated by multiple reasons from financial gain to a particular kind of ideology; the tremendous and growing amount of misinformation in social media about information security, dogmas, unbiased repetition of what others said, and a mounting number of different technologies used at the workplace. For all these reasons and many others, cybersecurity leadership in the 21 century is even more complicated and a very poorly developed topic. It was the primary motivation for this book.
This volume is the very first in approaching the specific topic of leadership in cybersecurity. It proves that those individuals that believe they can make informed decisions based on social media and/or internet findings are putting their organizations at risk, unintentionally or not. An old saying says, “I don’t need to know how each instrument is played to be the director of the band,” is obsolete and in complete opposition to what is required today to minimize the possibilities of security breaches at your place of work. Cybersecurity leaders need to master the topic or relies on those than do, but the opposite position is well rooted, even taught at many levels and educational institutions.
2020 will be remembered for years to come as the “pandemic year.” The world was not prepared for, neither the workforce. The COVID-19 crisis dramatically increased telework, and the majority of the organizations worldwide were required to rapidly adapt to the new reality; work from remote locations. The traditional office rapidly and unexpectedly becomes virtual, and people historically custom to work physically close, found their-self working as part of virtual teams, geographically segregated, and with that, with those “simple” ups and downs, cybersecurity becomes one of the biggest challenges on the 21 Century related to survival and competitiveness at the corporate level. Previous to the crisis, the topic of leadership in cybersecurity was already under exploration because of the prominent role of information technologies and the immense need for protecting electronic data at the enterprise level. However, no previous investigations explore the possible risks associated with non-experts making decisions related to the topic.
Leadership in Cybersecurity; Sweet Talkers’ Effect offers an all-inclusive approach in terms of what considerations to keep in mind if you lead a team that includes cybersecurity operations or information technology. Written by Dr. Luis O. Noguerol, who is a worldwide recognized cybersecurity expert in digital forensics, penetration testing, and data recovery, with over 36 years of experience in the private and public sector and 93 Information Technology /Information Security certifications, this book offers multiple insights and an operational equilibrium between the leadership and technical skills needed nowadays to minimize the leakage of the electronic data, and focus, specifically, in small businesses. Through the 292 pages, the author present, discuss, recommends, and endorses those characteristics that need to be considered by cybersecurity leaders or those that lead anything related to the newest information technologies, from mobile to the cloud.
Leadership in Cybersecurity; Sweet Talkers’ Effect is not a book based on empirical assumptions or personal beliefs. On the contrary, the book is result of an investigation conducted by the author for over five years, including face-to-face interviews with cybersecurity leaders from three continents that operate in different sectors, from the public to private. Electronic surveys were conducted as well and includes only personal non-related to the IT Department or the Cybersecurity division. More importantly, the author based all the conclusions and recommendations on a specific scientific qualitative research method that was considered the most appropriate to understand the topic under investigation based on the following research question: How do leaders of small businesses influence employees concerning electronic data security at the company level?
The qualitative research method was preferred over the quantitative approach because, in a quantitative approach, the investigator assumes an objective reality that the researcher may know through collecting valuable information about new concepts, schemes, relationships, and organizations in explanatory theoretical strategies. In a qualitative study, the researcher starts with the premise that a phenomenon can only be understood from the participant’s perspective. When considering the scientific research to be used to respond to the research question, the author decided that the exploratory case study method was the most appropriate based on the intention of the researcher to investigate the unit of analysis intensively; this can refer to a person, a family, a group, an organization, an institution, or situation (in this case, the specific topic of leadership in cybersecurity), and the consequences of having non-experts making decisions related to the cybersecurity operation.
Effects of organizational culture, emotional intelligence, cybersecurity metrics, the role of technology in team performance, and leadership in protecting electronic data are some of the main areas discussed and deeply explored in this book. The author approach the topic of cybersecurity metrics from a different perspective and take distance from traditional approaches; analyzes existing methods and their impracticality and suggest multiple practical and easy to use new techniques to know what is happening from the mathematical point of view related to the cybersecurity operation. The premise that manages this idea is that you cannot control what you do not measure.
Each chapter ends by summarizing the key concepts and definitions discussed and introduces the new section based on the need to have the next debate. A comprehensive review of what others said, cultural differences, leadership styles, virtual teams’ operations, and cybersecurity metrics are well discussed and analyzed in this book, free of the author bias and based exclusively on the data collected and analyzed through the investigation, and NVIVO, version 12.
When you finished reading this book, you will be better prepared about the factors to consider if you are part of the leadership team in charge, or related in any way, to make decisions related to cybersecurity or information technology.
For questions about the content, presentations, and IT / Cybersecurity Training, Dr. Noguerol can be contacted at email@example.com
Dr. Luis Noguerol
November 11, 2020