SBN

Cyber Work Episode Recap: How is the open exchange of information affecting cybersecurity?

Introduction

Cody Cornell, CEO of Swimlane, is a passionate advocate for the open exchange of security information. Infosec recently chatted with Cody about his rise to the cybersecurity challenge and how he sees the sharing of security information as an important movement across industry.

Cody summed up his stance in an interview for Cyberdefense Magazine in February 2019: “To transform cybersecurity from a source of consternation into an opportunity, everyone in the industry, not just collaborative SOCs and ISACs must work together to share intelligence, best practices, and lessons learned, amongst a network of trusted peers.”

Becoming a security professional by knowing how technology works

“I am a systems security person.”

Cody’s career did not start with a technology background. However, once he started working with the Coast Guard, he was introduced to a more technical career. Here he was trained in electronics and began to work more on the IT side. It was during this time that Cody quickly realized there were great opportunities in the tech industry and especially in the security sector.

From there, Cody moved into security management. He admits that pentesting was not his passion; instead, he ended up on the blue team side of security. Here he discovered his love of collaboration.

Cody told Infosec that being a security professional and a start-up founder were different paths for him. Back then, network and system engineers were a great influence as they understood the underpinning of the technologies they had to secure.

To bolster his career, Cody worked on achieving certifications, including Cisco and Microsoft certification. This taught him how infrastructures worked: “I would have struggled if I had not understood the underpinning of the system I was trying to secure.”

How do collaborative sharing initiatives work?

Previously, on CyberSpeak, Infosec spoke (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Susan Morrow. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/4iEDCPYBP08/