<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Mossé Cyber Security Institute Newsletter]]></title><description><![CDATA[MCSI equips cyber operators and warriors with the knowledge and abilities they need to maintain operational superiority in the cyber domain.]]></description><link>https://newsletter.mosse-institute.com</link><image><url>https://newsletter.mosse-institute.com/img/substack.png</url><title>Mossé Cyber Security Institute Newsletter</title><link>https://newsletter.mosse-institute.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 19 May 2026 05:21:22 GMT</lastBuildDate><atom:link href="https://newsletter.mosse-institute.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mossé Cyber Security Institute]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[learn@mosse-institute.com]]></webMaster><itunes:owner><itunes:email><![CDATA[learn@mosse-institute.com]]></itunes:email><itunes:name><![CDATA[Benjamin Mossé]]></itunes:name></itunes:owner><itunes:author><![CDATA[Benjamin Mossé]]></itunes:author><googleplay:owner><![CDATA[learn@mosse-institute.com]]></googleplay:owner><googleplay:email><![CDATA[learn@mosse-institute.com]]></googleplay:email><googleplay:author><![CDATA[Benjamin Mossé]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The #1 Thinking Skill That Separates Amateurs from Experts in Cyber]]></title><description><![CDATA[Train your brain to think in systems, not guesses.]]></description><link>https://newsletter.mosse-institute.com/p/the-1-thinking-skill-that-separates</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/the-1-thinking-skill-that-separates</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 15 Dec 2025 22:00:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oEMK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>How do elite professionals solve complex cybersecurity problems?</strong></p><p>In this newsletter, I&#8217;ll walk you through a simple, step-by-step framework using an MCSI exercise. It&#8217;s deliberately basic &#8212; because that&#8217;s the point. I want you to see that even the most advanced practitioners rely on clear, repeatable processes.</p><p>This method isn&#8217;t just for beginners. It&#8217;s designed to scale. Whether you&#8217;re troubleshooting daily threats or navigating enterprise-wide risk, the goal is to give you a process you can apply to any problem &#8212; especially the hard ones you&#8217;re facing at work.</p><h2>Step 1: Identify the Parts of the Problem</h2><p>Let&#8217;s start with one of the simplest exercises from MCSI: set up two virtual machines, connect them on a shared network, and verify they can communicate.</p><p>It&#8217;s a basic lab&#8212;but it trips up a lot of newcomers. Many have never done hands-on technical work or have only worked in pre-built environments. So building something from scratch is brand new territory.</p><p>Step one: slow down and read the exercise description carefully. As you go, identify every &#8220;part&#8221; that stands out. Don&#8217;t overthink it&#8212;just mentally note each element mentioned.</p><p>Below, you&#8217;ll see a diagram with the parts I identified. They&#8217;re unorganized for now; we&#8217;ll tackle that next.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oEMK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oEMK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 424w, https://substackcdn.com/image/fetch/$s_!oEMK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 848w, https://substackcdn.com/image/fetch/$s_!oEMK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 1272w, https://substackcdn.com/image/fetch/$s_!oEMK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oEMK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png" width="1456" height="871" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:871,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:122814,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/181643402?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oEMK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 424w, https://substackcdn.com/image/fetch/$s_!oEMK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 848w, https://substackcdn.com/image/fetch/$s_!oEMK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 1272w, https://substackcdn.com/image/fetch/$s_!oEMK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1808365e-e665-4ccf-8420-0dba1a95f8ee_1597x955.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1 - Identify the &#8220;parts&#8221;</figcaption></figure></div><p>But before you move forward, pause. Ask yourself: &#8220;Do I actually understand every part listed here?&#8221; If there&#8217;s anything you don&#8217;t fully grasp&#8212;like the command &#8220;ping&#8221;&#8212;this is where the real learning begins. Your job is to stop, research it, and build a basic understanding before continuing. That&#8217;s how professionals grow.</p><h2>Step 2 - Organize the Parts into Logical Wholes</h2><p>Now it&#8217;s time to organize the parts into logical groupings &#8212; or &#8220;wholes.&#8221; The diagram below shows one example, but it&#8217;s not the only way to do it. <em>There are multiple valid ways to structure the same system.</em></p><p>Notice how I introduced a new whole labelled &#8220;Hypervisors.&#8221; That wasn&#8217;t identified in the previous step.</p><p>The process isn&#8217;t rigid &#8212; it&#8217;s flexible and based on logic. As you deepen your understanding, new groupings or relationships may emerge. That&#8217;s completely normal and you can edit your diagrams as much as you need.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FydU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FydU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 424w, https://substackcdn.com/image/fetch/$s_!FydU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 848w, https://substackcdn.com/image/fetch/$s_!FydU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 1272w, https://substackcdn.com/image/fetch/$s_!FydU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FydU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png" width="1456" height="824" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:824,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95580,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/181643402?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FydU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 424w, https://substackcdn.com/image/fetch/$s_!FydU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 848w, https://substackcdn.com/image/fetch/$s_!FydU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 1272w, https://substackcdn.com/image/fetch/$s_!FydU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb9f8dfa-c1fc-47f4-90d0-680df5e952bf_1465x829.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2 - Organized the Parts into Logical Wholes</figcaption></figure></div><p>If there&#8217;s still a part you&#8217;re unsure about &#8212; where it fits or what it even means &#8212; that&#8217;s your growth moment! Stop. Do the research. Ask questions. This is how you build real understanding.</p><p><strong>Remember, these diagrams aren&#8217;t for decoration. They&#8217;re tools to help you </strong><em><strong>validate your own thinking</strong></em><strong> about the problem you&#8217;re solving.</strong></p><p>Looking at the diagram, a few things should be crystal clear by now:</p><ul><li><p>You need to set up two virtual machines&#8212;one Windows, one Linux&#8212;which means you&#8217;ll need the right ISO files.</p></li><li><p>You have three hypervisor options to choose from.</p></li><li><p>You need to configure network connectivity and confirm it works using the &#8220;ping&#8221; command.</p></li></ul><p>The next step is to take these elements and assemble them into a functioning system.</p><h2>Step 3 - Organize the Parts into a System</h2><p>Now it&#8217;s time to build a system diagram. The goal here is to show how all the parts come together into a working system.</p><p>In this case, I created a simple system diagram: two virtual machines connected to the same NAT network using VirtualBox.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LnSR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LnSR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 424w, https://substackcdn.com/image/fetch/$s_!LnSR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 848w, https://substackcdn.com/image/fetch/$s_!LnSR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 1272w, https://substackcdn.com/image/fetch/$s_!LnSR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LnSR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png" width="1303" height="585" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:585,&quot;width&quot;:1303,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:53552,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/181643402?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LnSR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 424w, https://substackcdn.com/image/fetch/$s_!LnSR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 848w, https://substackcdn.com/image/fetch/$s_!LnSR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 1272w, https://substackcdn.com/image/fetch/$s_!LnSR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2352e065-f713-4604-9a26-bab2dc662ea3_1303x585.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 3 - Organize the Parts into a System</figcaption></figure></div><p>Anyone looking at this diagram should immediately understand what needs to be built. And that&#8217;s the whole point.</p><p>By creating a diagram like this, I&#8217;m confirming that <em>I</em> understand every part, every whole, and every relationship. It&#8217;s a self-check. I can even share it with a colleague or mentor to get independent validation&#8212;make sure nothing&#8217;s missing or off.</p><p>Once it&#8217;s clear, I&#8217;m ready for the last step: validate the system solves the end-goal.</p><h2>Step 4 - Validate Approach Solves the End Goal</h2><p>To meet the requirements of this exercise, I need to accomplish four specific goals.</p><p>So I&#8217;ve added each of them directly onto the system diagram to keep the outcome front and center:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NYGD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NYGD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 424w, https://substackcdn.com/image/fetch/$s_!NYGD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 848w, https://substackcdn.com/image/fetch/$s_!NYGD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 1272w, https://substackcdn.com/image/fetch/$s_!NYGD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NYGD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png" width="1456" height="842" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:842,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:188541,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/181643402?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NYGD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 424w, https://substackcdn.com/image/fetch/$s_!NYGD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 848w, https://substackcdn.com/image/fetch/$s_!NYGD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 1272w, https://substackcdn.com/image/fetch/$s_!NYGD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F075ea252-182a-4843-9d71-49b46a4f2243_1704x985.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 4 - Validate Approach Solves the End Goal</figcaption></figure></div><p>Each goal is now mapped directly onto the relevant part of the system. This makes it crystal clear <em>where</em> each action needs to happen and <em>what</em> needs to be done.</p><p>And again, this step is a check. If I&#8217;m unsure where a requirement fits, that&#8217;s a red flag. It means I&#8217;ve either misunderstood something or missed a part entirely. That&#8217;s my cue to pause, dig deeper, and fill the gap.</p><h2>Conclusion</h2><p>What I&#8217;ve just walked you through&#8212;step by step&#8212;is exactly how cybersecurity professionals think. They might not draw it out every time, but they mentally break things down into parts, organize them into wholes, see the relationships, and build the system in their head.</p><p>This is why the IT industry is filled with diagrams. They&#8217;re <em>mental models</em> that reflect how someone understood a system at a specific point in time.</p><p>If you want to solve harder problems, you need to get better &#8212; and faster &#8212; at thinking this way.</p><p>And here&#8217;s the key: there&#8217;s no &#8220;one diagram to rule them all.&#8221;</p><p>There are infinite ways to map a system. What matters is whether the diagram helps <em>you</em> think clearly and act confidently. It&#8217;s a tool for understanding before execution. And it&#8217;s a tool for feedback&#8212;something you can share with a teammate or mentor to check your thinking and sharpen your approach.</p><div><hr></div><p>If you&#8217;re serious about levelling up your problem-solving and critical thinking skills to grow your cybersecurity career in 2026, now&#8217;s the time to act.</p><p>Use code <strong>EOY25</strong> before year-end to get access to one of our top-rated cyber courses. You&#8217;ll work through real-world problems, get direct, personalized feedback from expert instructors, and start seeing massive improvement fast.</p><p>Don&#8217;t wait - invest in your growth now, so you&#8217;re ready for what&#8217;s next.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ej_1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ej_1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ej_1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ej_1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ej_1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ej_1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg" width="1456" height="761" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:761,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;graphical user interface, text, application, chat or text message&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="graphical user interface, text, application, chat or text message" title="graphical user interface, text, application, chat or text message" srcset="https://substackcdn.com/image/fetch/$s_!ej_1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ej_1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ej_1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ej_1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11e38cd2-e93e-4a97-83ba-92010efffc77_2048x1070.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[LAMO vs VUCA: Why Even IT Veterans Struggle With Cybersecurity]]></title><description><![CDATA[Why does learning cybersecurity feel so hard?]]></description><link>https://newsletter.mosse-institute.com/p/lamo-vs-vuca-why-even-it-veterans</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/lamo-vs-vuca-why-even-it-veterans</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Wed, 19 Nov 2025 22:15:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zc9K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Why does learning cybersecurity feel so hard?</strong></p><p>Over the past six months, we&#8217;ve trained hundreds of experienced IT professionals. Confident, technical, capable - yet almost all of them struggled with cybersecurity. And I kept wondering: <em>why?</em></p><p>To get answers, I sat down with one of our lead instructors. For an hour, she unpacked the same frustrations and roadblocks she sees every week - the moments where seasoned IT veterans suddenly feel lost.</p><p>As we talked, something clicked. We realised there&#8217;s a simple mental model that explains why cybersecurity feels like a completely different universe, even for highly skilled IT professionals:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zc9K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zc9K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Zc9K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Zc9K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Zc9K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zc9K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png" width="1456" height="644" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:644,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2210579,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/179318413?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zc9K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Zc9K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Zc9K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Zc9K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9ffd473-bf50-443e-a6a3-591565932881_2314x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1 - Mental Model of IT Professionals Learning Cybersecurity</figcaption></figure></div><p>Most IT professionals walk in expecting cybersecurity to look like the rest of their toolkit: clean GUIs, neat dashboards, predictable workflows. They expect the work to be linear, human-centred, mechanistic, and orderly.</p><p>But cybersecurity refuses to fit that frame.</p><p>The structure of cybersecurity looks like this:</p><ul><li><p><strong>Volatile:</strong> Techniques, tactics, tools, and entire technology stacks evolve constantly. What works today may not work tomorrow.</p></li><li><p><strong>Complex:</strong> Cybersecurity sits at the intersection of systems, networks, software, human behaviour, the law, economic incentives, and adversarial intent. Everything is connected, and small details matter.</p></li><li><p><strong>Uncertain:</strong> Most cyber problems are investigations. You don&#8217;t know the answer upfront; you uncover it by researching, testing ideas, and proving your solution all the way up to 100% correctness.</p></li></ul><p>And the biggest surprise for these IT veterans? Technical cybersecurity work is <em><strong>low-level</strong></em>. No dashboard. No wizard. Just raw analysis using hex editors, disassemblers, packet captures, log dumps and file headers.</p><p>It&#8217;s better to think of it as reverse engineering rather than the &#8220;drag-and-drop&#8221; or &#8220;click-and-connect&#8221; IT they&#8217;re use to.</p><p>This mismatch between expectation and reality is where the struggle begins.</p><h3><strong>How Instructors Learned Cybersecurity</strong></h3><p>After mapping the IT veteran&#8217;s mindset, I asked our instructors to write down their own mental model for how <em>they</em> learned the field:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TDdg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TDdg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 424w, https://substackcdn.com/image/fetch/$s_!TDdg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 848w, https://substackcdn.com/image/fetch/$s_!TDdg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 1272w, https://substackcdn.com/image/fetch/$s_!TDdg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TDdg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png" width="1456" height="902" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:902,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1309808,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/179318413?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TDdg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 424w, https://substackcdn.com/image/fetch/$s_!TDdg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 848w, https://substackcdn.com/image/fetch/$s_!TDdg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 1272w, https://substackcdn.com/image/fetch/$s_!TDdg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3780152-c41c-4894-962b-30ddd6e7e8d2_2094x1297.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2 - Mental Model of Instructors Learning Cybersecurity</figcaption></figure></div><p>They had faced the exact same challenges as the IT veterans when they started learning cybersecurity. But instead of getting frustrated, they adapted. They understood the actual structure of the field, so their mindset aligned with its reality.</p><p>They approached every problem with curiosity and a desire to investigate. They enjoyed uncovering how things worked. And over time, that mindset sharpened their problem-solving skills. They became more capable, more confident, and more eager to tackle deeper, harder, low-level challenges.</p><p>The difference wasn&#8217;t talent.<br>It was mindset.</p><h3>The Secret</h3><p>So what&#8217;s the secret to learning cybersecurity?</p><p><strong>Align your mindset with the structure of how cybersecurity really works.</strong></p><p>Lean into curiosity. Treat every problem as something to explore, not something that should already be solved for you.</p><p>Once you adopt that mental model, the path becomes clear: work through a series of problems that gradually increase in difficulty and variety. With each one, your skills grow, your confidence builds, and the journey stops feeling daunting and starts feeling exhilarating.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[This Is the Era of the High-Value Cyber Problem Solver]]></title><description><![CDATA[The cybersecurity &#8220;talent shortage&#8221; has been overstated but the market opportunity has been understated.]]></description><link>https://newsletter.mosse-institute.com/p/this-is-the-era-of-the-high-value</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/this-is-the-era-of-the-high-value</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 04 Nov 2025 22:00:42 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9bd46621-f556-4c8e-8b57-9d311ae22a95_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The cybersecurity &#8220;talent shortage&#8221; has been overstated. There aren&#8217;t millions of jobs sitting empty for eager graduates - and even seasoned professionals can spend months searching for their next role.</p><p>Yet, despite this reality, opportunity has never been greater.</p><p>In this post, I&#8217;ll show you how to rethink the cybersecurity job market, understand what&#8217;s actually happening beneath the headlines, and position yourself to take advantage of the real opportunities that exist right now.</p><h3><strong>Reality Check: Growth Happened, Not the Hype</strong></h3><p>The image below shows a <a href="https://www.isc2.org/Insights/2022/10/ISC2-Research-Reveals-the-Cybersecurity-Profession-Must-Grow-by-3-4-Mil-to-Close-Workforce-Gap">2022 study</a> by ISC2 reporting that the cybersecurity profession needed to grow by 3.4 million individuals worldwide to close the workforce gap.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3s1T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3s1T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 424w, https://substackcdn.com/image/fetch/$s_!3s1T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 848w, https://substackcdn.com/image/fetch/$s_!3s1T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 1272w, https://substackcdn.com/image/fetch/$s_!3s1T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3s1T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png" width="1456" height="527" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:527,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:138568,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/177938931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3s1T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 424w, https://substackcdn.com/image/fetch/$s_!3s1T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 848w, https://substackcdn.com/image/fetch/$s_!3s1T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 1272w, https://substackcdn.com/image/fetch/$s_!3s1T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8527880f-0323-41e4-9478-0a11c99d70d0_2085x754.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 1 - ISC2 2022 Cybersecurity Professional Study</figcaption></figure></div><p>This is one of many studies that estimate workforce demand based on survey responses, such as: &#8220;<em>72% of respondents expect their cybersecurity staff to increase somewhat or significantly within the next 12 months.</em>&#8221;</p><p>The reality is that cybersecurity <strong>has</strong> grown. Industry associations are larger than ever, and major enterprises that once had security teams under 100 people now operate with several hundred.</p><p>The misconception for graduates came from two places.<br>First, many believed employers would hire and train university graduates for roles that actually require hands-on skills and a deep understanding of technology.<br>Second, the projected explosion in open roles never reached the scale those studies predicted.</p><p>This doesn&#8217;t mean you can&#8217;t break into cybersecurity today. It means you need a different mindset - one that understands how the market really works and how to create an edge.</p><h3><strong>The Real Problem: You Were Never Properly Trained</strong></h3><p>At <a href="https://www.mosse-security.com/">Moss&#233; Security</a>, we offer an <a href="https://www.mosse-security.com/jobs/it-security-intern.html">internship position</a> that requires zero prior cybersecurity experience. Our goal is to identify newcomers with talent, critical thinking ability, and strong problem-solving skills.</p><p>Each year, we receive between 600&#8211;800 applications. We don&#8217;t read CVs or review LinkedIn profiles. Instead, we send candidates a technical aptitude test to determine whether they meet a minimum baseline of practical skills:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qu5J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qu5J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 424w, https://substackcdn.com/image/fetch/$s_!qu5J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 848w, https://substackcdn.com/image/fetch/$s_!qu5J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 1272w, https://substackcdn.com/image/fetch/$s_!qu5J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qu5J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png" width="1339" height="417" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:417,&quot;width&quot;:1339,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:60558,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/177938931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qu5J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 424w, https://substackcdn.com/image/fetch/$s_!qu5J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 848w, https://substackcdn.com/image/fetch/$s_!qu5J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 1272w, https://substackcdn.com/image/fetch/$s_!qu5J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94bb4544-fce3-4628-8aaf-00a2cdd54183_1339x417.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 2 - Moss&#233; Security&#8217;s Internship Aptitude Test</figcaption></figure></div><p>Some years, we already have enough interns, so we simply ask candidates to re-apply in six months. Other years, we&#8217;ve sent the aptitude test to every single applicant. What we consistently discovered is that only <strong>5&#8211;15 people per year</strong> can pass this baseline test.</p><p>Since the launch of ChatGPT, we noticed a shift - candidates who previously struggled began leveraging AI to complete the assessment. To adapt, we raised the bar slightly. We now evaluate whether a candidate can <em>use</em> tools like GPT effectively <strong>without becoming dependent on them</strong>. The goal isn&#8217;t to exclude AI-assisted applicants - it&#8217;s to identify those who understand the technology well enough to incorporate it intelligently, not hide behind it.</p><p><strong>The biggest challenge for most graduates is simple: they don&#8217;t yet have skills that solve problems worth paying for. If you&#8217;re expecting employers to train you from scratch, you&#8217;re putting yourself at a disadvantage.</strong></p><p>Companies aren&#8217;t hiring to run training programs - they&#8217;re investing in automation to scale existing teams, outsourcing where quality allows, and prioritizing efficiency. Most employers don&#8217;t see themselves as training organisations. They expect contributors, not apprentices.</p><h3>The Market Rewards Problem-Solvers &#8212; Massively</h3><p>The cybersecurity market has experienced explosive growth and forecasts show strong continued expansion:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ecP1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ecP1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 424w, https://substackcdn.com/image/fetch/$s_!ecP1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 848w, https://substackcdn.com/image/fetch/$s_!ecP1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 1272w, https://substackcdn.com/image/fetch/$s_!ecP1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ecP1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png" width="1228" height="703" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:703,&quot;width&quot;:1228,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:262336,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/177938931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ecP1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 424w, https://substackcdn.com/image/fetch/$s_!ecP1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 848w, https://substackcdn.com/image/fetch/$s_!ecP1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 1272w, https://substackcdn.com/image/fetch/$s_!ecP1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92f0afd4-54a2-456b-9b82-90f0cd4f14d3_1228x703.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Figure 3 - <a href="https://www.grandviewresearch.com/industry-analysis/cyber-security-market">Cyber Security Market (2025 - 2030)</a></figcaption></figure></div><p>The opportunity isn&#8217;t just large &#8212; it&#8217;s enormous. There is more than enough demand and capital in this industry for capable problem-solvers to achieve their financial goals.</p><p>Look at the largest companies in your region, and the fastest-growing ones. Every single one of them needs competent cybersecurity talent.</p><p>To win opportunities you need three things:</p><ol><li><p>A champion inside the organisation</p></li><li><p>A clear point of view on how you will solve high-value problems for their business</p></li><li><p>Proof that you can deliver, not rhetoric</p></li></ol><p>The hardest part of this formula is finding a champion. Everything else is within your control right now &#8212; no permission needed, and with skills you can build to become unstoppable.</p><p>Nothing stops you from learning application security and threat-modelling the software built by the companies you want to work for.</p><p>Nothing stops you from researching vulnerabilities in a specific technology and reaching out to CTOs, CIOs, and CISOs whose organisations depend on it.</p><p>The key is in how you communicate. You don&#8217;t push. You don&#8217;t demand a meeting. You don&#8217;t ask for money.</p><p>You write in a way that shows you&#8217;re here to help, to build trust, and to take initiative on meaningful security problems &#8212; if they decide it matters. And they will.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #036 - From Zero to Profitable in 6 Weeks. The Cybersecurity Model That Still Works]]></title><description><![CDATA[Security gets funded when it protects revenue, reputation, or regulatory compliance&#8212;not just when it impresses a very small number of people.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-036-from-zero-to-profitable</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-036-from-zero-to-profitable</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 29 Sep 2025 22:00:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hr-i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I launched Moss&#233; Security at 20 years old.<br><br>Within 6 weeks, we were profitable.<br>Within 15 years, we became a respected brand in cybersecurity.<br><br>But in those early days, many people mocked the idea.<br>They didn&#8217;t get it.<br>They thought cybersecurity was about "<em>finding bugs</em>".<br><br>I knew it was about business drivers.<br><strong>Security gets funded when it protects revenue, reputation, or regulatory compliance</strong>&#8212;not just when it impresses a very small number of people.<br><br>That mental model has guided every sale I&#8217;ve ever made.<br><br>So if you're thinking about becoming a solopreneur in cybersecurity, here&#8217;s the exact mental model I still use to this day&#8212;sketched out in 2 minutes, but rooted in 15 years of lived experience.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hr-i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hr-i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 424w, https://substackcdn.com/image/fetch/$s_!hr-i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 848w, https://substackcdn.com/image/fetch/$s_!hr-i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 1272w, https://substackcdn.com/image/fetch/$s_!hr-i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hr-i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png" width="1126" height="805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:805,&quot;width&quot;:1126,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:113483,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/174316563?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hr-i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 424w, https://substackcdn.com/image/fetch/$s_!hr-i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 848w, https://substackcdn.com/image/fetch/$s_!hr-i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 1272w, https://substackcdn.com/image/fetch/$s_!hr-i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6832ebda-5157-498c-bf53-f5dc066c4b5f_1126x805.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Before you build a business, build </strong><em><strong>yourself</strong></em><strong>.</strong></p><p>You don&#8217;t earn trust, shift mental models, or close deals by winging it.<br>You do it by becoming an expert&#8212;on your industry, your customer, and your solution.</p><p>That takes reps. Study. Client work. Reflection.<br>Put in the hard work now, so when the moment comes, you're ready.</p><p>Want to build a real business?<br>Start by becoming someone worth buying from.</p><p>Check out our <a href="https://www.mosse-institute.com/certifications.html">certifications</a>, pick one, and work on becoming an expert.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Would professionalisation have stopped the Hacker from Hell?]]></title><description><![CDATA[A man faked his way into cybersecurity leadership &#8212; not because the system lacked rules, but because no one cared to check his credentials. Professionalisation won&#8217;t fix that.]]></description><link>https://newsletter.mosse-institute.com/p/would-professionalisation-have-stopped</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/would-professionalisation-have-stopped</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 19 May 2025 23:00:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a7ed5818-bc6e-4d68-a536-190c26497207_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Around 2008, Stephen Allan Olsen was broke, unemployed, and living in a community house. His CV was unimpressive: no IT certifications, and a criminal record for stealing $13,000 from a local hotel.</p><p>Desperation breeds creativity. Olsen forged a police clearance and faked IT certifications, allegedly downloading sample images and pasting his name onto them. This crude forgery was enough to land him the role of IT Security Manager at Racing &amp; Wagering WA (RWWA).</p><p>According to sources familiar with the case, Olsen billed himself on his CV as &#8220;The Hacker from Hell&#8221; &#8212; a kind of self-awarded badge of honour to brag about his cybersecurity skills. Before his crimes surfaced, he was highly rated by his employer, recommended for several pay rises, and even considered by one staff member to be the best IT security manager RWWA ever had.</p><p>His downfall came not from routine checks or industry gatekeeping, but from his own overreach: he was jailed for 18 months after framing a colleague to secure his six-figure salary.</p><p>When I first learned of Olsen&#8217;s story, I wondered: would professionalisation have stopped him?</p><p>It didn&#8217;t take long to realise that Olsen&#8217;s story is not an argument for professionalisation, but a warning against its hollow promises.</p><p>First, RWWA&#8217;s HR department never checked his credentials. Nor, it seems, did any recruiter. Even in 2008, major certification bodies offered simple online verification tools &#8212; a certificate reference code, a database, a click. No one bothered.</p><p>A register is only as useful as the people who choose to consult it. If HR departments won&#8217;t validate credentials today, what fantasy suggests they&#8217;ll religiously cross-check a register of accredited professionals?</p><p>Second, if Olsen&#8217;s version of events holds any truth, the cost of legitimate certification may have helped lock him out of the market in the first place. When qualifications are prohibitively expensive, some will always find cheaper ways to meet expectations &#8212; including fraud.</p><p>Professionalisation risks erecting yet another financial barrier to entry &#8212; one that incentivises the very behaviour it claims to eliminate.</p><p>Third, even today, Olsen would not be stopped from re-entering the cybersecurity market. He could become a bug bounty hunter. Offer cybersecurity services overseas. Professionalisation cannot fully close the market; it only raises costs for those who try to enter it via professionalisation&#8217;s pathways.</p><p>Olsen&#8217;s story reminds me of a scene in the excellent Netflix documentary on Bernie Madoff. Called before the SEC in New York, Madoff handed over account numbers that could have instantly exposed his fraud. Except no one checked.</p><p>They had the truth in their hands &#8212; and they didn&#8217;t check.</p><p>The proponents of professionalisation promise to cleanse the industry of charlatans. But Olsen&#8217;s case &#8212; like Madoff&#8217;s &#8212; shows the real problem is not lack of regulation.</p><p>It is human laziness, bureaucratic incompetence, and blind faith in processes that no one actually enforces.</p><p>I wonder what the professionalisers will say when they realise employers and businesses aren&#8217;t even using the tools they so proudly built.</p><p>Or much worse: when they realise that professionalisation has not driven out the charlatans &#8212; it has enabled a new breed: chartered charlatans.</p><p>Particularly the type that will want to climb onto the board of the professionalisation body to advance their own interests under the banner of &#8220;standards&#8221;, &#8220;ethics&#8221; and &#8220;protecting businesses.&#8221;</p><p>Professionalisation may yet give us a more orderly industry &#8212; but if it also gives power to those who never earned it, then we will have traded chaos for capture, and called it progress.</p><p></p><p><strong>Sources:</strong></p><ul><li><p><a href="https://www.abc.net.au/news/2004-03-26/court-finds-man-guilty-of-hotel-funds-theft/158590">Court finds man guilty of hotel funds theft</a>, ABC News, 26 March 2004</p></li><li><p><a href="https://www.abc.net.au/news/2009-09-29/corruption-trial-starts/1446450">Corruption trial starts</a>, ABC News, 29 Sep 2009</p></li><li><p><a href="https://thewest.com.au/news/australia/former-rwwa-manager-convicted-ng-ya-232896">Former RWWA manager convicted</a>, The West Australian, 23 October 2009</p></li><li><p><a href="https://www.abc.net.au/news/2010-01-14/it-manager-jailed-for-fabricating-evidence-against/1208956">IT Manager jailed for fabricating evidence against colleague</a>, ABC News, 14 January 2010</p></li></ul><p></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #035 - You’ve Been Promised a Job. You’ve Been Lied To.]]></title><description><![CDATA[There are no guarantees &#8212; only the courage to continue without them.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-035-youve-been-promised-a-job</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-035-youve-been-promised-a-job</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 06 May 2025 23:00:30 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/78aef2f2-6ff6-4c73-b7a5-dd227c3e17e5_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the years, hundreds of students &#8212; across all levels of experience &#8212; have written to me in frustration, despair, or quiet hope. Many are trying to land their first cybersecurity job. Some are out of work entirely. Others are years into their careers but feel like they&#8217;ve hit a wall.</p><p>What I&#8217;ve come to understand, and what isn&#8217;t said nearly enough, is this: trying to find a job in cybersecurity can be a profoundly disorienting and even traumatic experience. Not because people aren&#8217;t trying &#8212; but because so much is out of their control. And too often, what is in their control is never clearly explained.</p><p>Let&#8217;s speak plainly.</p><p></p><h3>Location Matters</h3><p>Where you live still determines how far your skills can take you.</p><p>MCSI has users in over 80 countries. If you're based in a region with no tech sector, or one where remote work is viewed with suspicion, the road ahead is harder.</p><p>Even in the West, students from rural or economically stagnant areas are at a disadvantage. Some employers still won&#8217;t hire remote workers unless they&#8217;re known quantities. Why? Because to them, you're an unknown. In the worst-case scenario, a security risk.</p><p>None of this is fair. But it is real.</p><p></p><h3>Gender Matters</h3><p>For many of our female students &#8212; particularly in countries where women face legal or cultural barriers to work &#8212; the struggle is not about skill. It's about permission.</p><p>Some of the most technically gifted people I&#8217;ve seen in our program are women who are legally barred from practicing the very craft they&#8217;ve mastered. It&#8217;s enraging. But pretending otherwise helps no one.</p><p></p><h3>Skills Matters</h3><p>This may sting &#8212; but it must be said: you might not be as good as you think you are.</p><p>In cybersecurity, value is measured by your ability to solve problems worth paying for. If your skills aren&#8217;t at the right level, employers notice quickly. Even if they don&#8217;t say so.</p><p></p><h3>Cultural Fit Matters</h3><p>You can be technically brilliant &#8212; and still get rejected because you didn&#8217;t &#8220;click.&#8221;</p><p>Workplace culture is a real factor. If you come across as a &#8220;social risk&#8221; &#8212; you might never hear back, no matter how strong your CV.</p><p></p><h3>The Market Matters</h3><p>Sometimes, it&#8217;s just timing.</p><p>You can have the right skills, the right attitude, and still miss out &#8212; because the market has turned, or budgets have frozen, or some senior leaders just received some new information and decided to &#8220;pause hiring.&#8221;</p><p>It&#8217;s not personal. But it feels personal. That&#8217;s what makes it so brutal.</p><p></p><h3>Connections Matters</h3><p>Many cybersecurity jobs come through referrals and reputation. If no one knows your work, getting hired is harder &#8212; plain and simple. Even with connections, there are no guarantees.</p><p>Networks open doors, but they don&#8217;t carry you through.</p><p></p><h3>No Guarantees. Only the Real.</h3><p>No one &#8212; no program, no credential, no institution &#8212; can guarantee you a job in cybersecurity. That&#8217;s not cynicism. It&#8217;s the Real. And coming to terms with it is the first act of freedom.</p><p>If you&#8217;ve enrolled in a bootcamp, a degree, or a certification on the promise of guaranteed employment, you&#8217;ve been misled &#8212; and perhaps, if you're honest, you've misled yourself.</p><p>It&#8217;s a hard truth. But far better to face it now than build your hopes on a foundation of sand.</p><p>At MCSI, we make no promises of employment. What we offer is harder &#8212; and more honest.</p><p>We teach real skills: the kind that solve problems, not just impress recruiters. We simulate the pressures, the ambiguity, the stakes of the work itself. And we keep our training as accessible as possible &#8212; because talent shouldn't depend on wealth.</p><p>Still, some of our students struggle to find jobs. Not because they failed &#8212; but because the world is not fair. Bias, timing, geography, gatekeeping &#8212; these aren't footnotes. They're structural.</p><p>But here is the line you must cross:</p><p>To stop asking for guarantees.</p><p>To let go of the fantasy that the system will reward you for doing everything right.</p><p>To see the Real &#8212; the contingency, the arbitrariness, the indifference &#8212; and decide to act anyway.</p><p>That&#8217;s not optimism. It&#8217;s not resignation.</p><p>It&#8217;s courage without illusion.</p><p>And it's where real growth begins.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #034 - The Spectres of Cybersecurity Professionalisation]]></title><description><![CDATA[Professionalisation is haunted by spectres: contradictory evidence, uncertain promises, unresolved concerns, lingering doubts, incomplete solutions, false closure, unseen exclusions, and past scandals.]]></description><link>https://newsletter.mosse-institute.com/p/the-spectres-of-cybersecurity-professionalisatio</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/the-spectres-of-cybersecurity-professionalisatio</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 31 Mar 2025 22:01:23 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fcdbea7e-264c-43a1-8f63-b68128b7e129_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Professionalisation is haunted by spectres: contradictory evidence, uncertain promises, unresolved concerns, lingering doubts, incomplete solutions, false closure, unseen exclusions, and past scandals.</p><p>This essay aims to call out these spectres so they can be examined in themselves but more importantly so that their influence on how we&#8217;re approaching professionalisation can be properly examined.</p><p>We do not summon the spectres, and even if we choose to ignore them, they still exist.</p><p></p><h3>The Spectre of Racketeering</h3><p>Someone must pay for professionalisation to be possible &#8211; no matter how the fees are presented or who does the presenting.</p><p>Here&#8217;s published research from legal scholar <a href="https://law.vanderbilt.edu/bio/?pid=rebecca-allensworth">Rebecca Allensworth</a> that provides empirical evidence from other industries that professionalisation can become a racket: <a href="https://www.amazon.com/Licensing-Racket-Decide-Allowed-Wrong/dp/0674295420">book</a> and <a href="https://freakonomics.com/podcast/is-professional-licensing-a-racket/">podcast</a>.</p><p>You can also read her provocative 2013 research paper titled &#8220;<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2384948">Cartels by Another Name: Should Licensed Occupations Face Antitrust Scrutiny?</a>&#8221;. Here&#8217;s a quote from the abstract:</p><blockquote><p><em>&#8220;It can't surprise when licensing boards comprised of competitors exclude competition and regulate in ways that raise their profit. The result for consumers is higher prices and less choice, as licensing raises wages by 18% and bars competition from unlicensed workers. For African-style hair braiders, the result is either an illicit business or thousands of hours of irrelevant training imposed by a cosmetology board. For lawyers, the result is less competition from tax accountants, paralegals and out of state lawyers.</em></p><p><em>The great accomplishment of the Sherman Act has been to make cartels per se illegal and relatively scarce. Unless the cartel is managed by a professional licensing board. Most jurisdictions consider such boards, as creations of states, to be exempted from antitrust scrutiny by the state action doctrine, leaving would-be competitors and consumers no recourse against their cartel activity.&#8221;</em></p></blockquote><p>Now that you have seen this research, and there&#8217;s a lot more of it, the idea that cybersecurity professionalisation could never become a racket on the industry, businesses, or consumers, is no longer certain, no matter how much evidence supports its benefits.</p><p>Professionalisation can never fully prove itself &#8220;pure&#8221; or &#8220;just&#8221;, as the risk of it becoming a racket is always present. This risk will always be present.</p><p>Payment sustains professionalisation yet places it in doubt, creating a cycle of uncertainty. It raises questions about who benefits, whether it delivers value, and if those paying can ever stop.</p><p></p><h3>The Spectre of the Authoritarianism</h3><p>The rules will be decided by a few for the many, even with industry consultation. And it is all too easy to dismiss inconvenient voices. Hard choices will be made, some ideologies will dominate, and certain voices will be ignored. Some decisions will rely purely on claims of authority &#8211; accepted as the "right thing" without proof or concern for opposing views.</p><p>Power and authority enable professionalisation but also undermine its credibility. Participants are always left unsure if their interests are valued or if those in power are pursuing another agenda.</p><p></p><h3>The Spectre of Insufficient Control</h3><p>Imagine a terrible person who commits a serious crime. Their cybersecurity license is revoked, yet they can still write, teach, sell, and profit from the very businesses and consumers professionalisation claims to protect.</p><p>Now imagine a small MSP &#8211; a two-person company that services micro and small businesses. None of its staff are accredited under the proposed professionalisation scheme. One of their clients requests support to meet Essential Eight Level 1 requirements. Could professionalisation stop the MSP from implementing Airlock, enabling MFA, building an asset inventory, or patching Windows machines? Of course not.</p><p>Professionalisation promises protection by controlling who can participate in the market, yet it can never fully deliver &#8211; its control is always limited. What and who is being protected then?</p><p></p><h3>The Spectre of Illegitimacy</h3><p>To prove professionalisation&#8217;s legitimacy, supporters point to a 2022 AISA survey showing one in two people in favour. What they overlook is that the survey&#8217;s report doesn&#8217;t specify the number of respondents, their demographics, or how informed about professionalisation they were. AISA itself chose not to proceed with professionalisation after the survey.</p><p>The problem of legitimacy runs deeper than it seems. People may embrace professionalisation today and reject it tomorrow. Legitimacy is never stable &#8211; it shifts, stumbles, and resists control.</p><p>The push to professionalise cybersecurity in Australia rests on a single, debatable survey. Is that enough to claim legitimacy? Perhaps professionalisation survives not by proving itself, but by insisting we believe in what it cannot prove.</p><p></p><h3>The Spectre of Disbelief</h3><p>Having a credible group of people run the scheme is critical, yet also impossible because the conditions that establish credibility are always provisional. Credibility can come and go in the blink of an eye. All attempts to assert credibility can be challenged, questioned, or reinterpreted.</p><p>Therefore, whoever wins the government&#8217;s grant will be trapped in a constant performance, striving to prove their credibility by mimicking the language, structure, and tone of authority to create the illusion of legitimacy. Yet credibility is always haunted by what it denies &#8212; the lingering presence of doubt and disbelief.</p><p></p><h3>The Spectre of Endless Regulation</h3><p>The US DoD&#8217;s professionalisation scheme, the <a href="https://public.cyber.mil/wid/dcwf/">DoD Cyber Workforce Framework</a> (DCWF), defines <a href="https://dl.dod.cyber.mil/wp-content/uploads/dcwf/ElementsMap/story.html">72 cyber-related roles</a>, with more added every few months. Will it ever stop growing?</p><p>With no clear boundaries neatly surrounding cybersecurity, the DCWF includes roles like <a href="https://public.cyber.mil/dcwf-work-role/it-investment-portfolio-manager/">IT Investment Portfolio Manager</a>, <a href="https://public.cyber.mil/dcwf-work-role/product-support-manager/">Product Support Manager</a>, <a href="https://public.cyber.mil/dcwf-work-role/program-manager/">Program Manager</a>, <a href="https://public.cyber.mil/dcwf-work-role/cyber-legal-advisor/">Cyber Legal Advisor</a>, <a href="https://public.cyber.mil/dcwf-work-role/service-designer-user-experience-ux/">Service Designer User Experience (UX)</a>, <a href="https://public.cyber.mil/dcwf-work-role/data-steward/">Data Steward</a>, and <a href="https://public.cyber.mil/dcwf-work-role/ai-adoption-specialist/">AI Adoption Specialist</a>.</p><p>Professionalisation does not simply expand &#8212; it survives by remaining unfinished. Each new role claims to define cybersecurity, yet each addition reveals new gaps that demand yet more definitions. The system sustains itself not by achieving closure, but by taking advantage of the fact that cybersecurity doesn&#8217;t have any clear boundaries.</p><p>Regulation follows the same pattern. Each rule attempts to impose order, yet every rule creates new uncertainties that call for even more regulation &#8211; think of workplace safety standards for example.</p><p>Professionalisation does not expand because boundaries are unclear &#8211; it expands because no boundary can ever be final.</p><p></p><h3>The Spectre of Insufficiency</h3><p>Cyber professionalisation pursues ideals like protecting businesses, consumers, and progress itself. Yet these ideals can never be fully reached. When will the public be truly safe? When will progress arrive?</p><p>Professionalisation&#8217;s desired outcomes are shaped by unreachable ideals &#8211; always shifting, arbitrarily defined, never perfectly definable.</p><p>How many businesses must be protected for professionalisation to have succeeded? Why this number and not a bigger number? Is success ever knowable at all?</p><p>Ideals provide a mechanism for professionalisation to protect itself from scrutiny and accountability: when it benefits the scheme, success can be defined by what has already been achieved. When the scheme needs to justify its continued existence, success can be defined by what still needs to be done.</p><p>Professionalisation therefore survives by exploiting ideals. It creates an endless race where participants convince themselves they must keep running. Does that sound familiar?</p><p></p><h3>The Spectre of Exclusion</h3><p>Which voices are amplified, and which ones are devalued? Professionalisation is an ideology that has winners and losers. It causes a perpetual fear of being on the losing side at some point.</p><p>Read <a href="https://www.linkedin.com/pulse/professionalisation-profane-made-sacred-benjamin-moss%25C3%25A9-v4dkc/">my essay</a> about the ideology of professionalisation to learn who and what it devalues. The devaluation works by elevating certain ideas, rewarding conformity, and shaping meaning.</p><p></p><h3>The Spectre of Failure</h3><p>Other cybersecurity professionalisation schemes have failed or fallen short &#8211; what will make this one different? For example, CREST ANZ is now considered illegitimate by some:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NDUR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NDUR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 424w, https://substackcdn.com/image/fetch/$s_!NDUR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 848w, https://substackcdn.com/image/fetch/$s_!NDUR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 1272w, https://substackcdn.com/image/fetch/$s_!NDUR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NDUR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png" width="470" height="471.8305744888023" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1031,&quot;width&quot;:1027,&quot;resizeWidth&quot;:470,&quot;bytes&quot;:216251,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/160243385?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NDUR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 424w, https://substackcdn.com/image/fetch/$s_!NDUR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 848w, https://substackcdn.com/image/fetch/$s_!NDUR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 1272w, https://substackcdn.com/image/fetch/$s_!NDUR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f8ff5e2-d893-4d2f-8d99-72c576dee1b7_1027x1031.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Katherine Robins</figcaption></figure></div><p>CREST UK and CREST ANZ are no longer affiliated because of a dispute over the CREST brand and a $10M dollar grant awarded to CREST ANZ under the Australia&#8217;s 2016 Cyber Security Strategy:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2zAj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2zAj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 424w, https://substackcdn.com/image/fetch/$s_!2zAj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 848w, https://substackcdn.com/image/fetch/$s_!2zAj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 1272w, https://substackcdn.com/image/fetch/$s_!2zAj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2zAj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png" width="480" height="298.95781637717124" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:502,&quot;width&quot;:806,&quot;resizeWidth&quot;:480,&quot;bytes&quot;:70656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/160243385?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2zAj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 424w, https://substackcdn.com/image/fetch/$s_!2zAj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 848w, https://substackcdn.com/image/fetch/$s_!2zAj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 1272w, https://substackcdn.com/image/fetch/$s_!2zAj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F644766e7-d6d8-4959-acf1-e3e5f59d294a_806x502.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Corch and Christian Heinrich</figcaption></figure></div><p>Any new professionalisation scheme carries the shadow of past failures, scandals, or poor leadership. People may not want it to fail, but the scheme cannot outrun failures from this or other industries, nor put to bed concerns that have arisen from these.</p><p></p><h3>The Spectre of Accountability</h3><p>Promises of oversight, ethics committees, and whistle-blower policies create the impression that someone can be held to account, yet accountability can never be guaranteed. Therefore, it lingers in doubt, kept alive by the hope that someone, somewhere, might be held responsible &#8211; if everything works out. And if accountability does come, to who&#8217;s standard?</p><p>Each time we inquire about accountability, we reveal its uncertainty. It is a promise that might not be kept. Yet it is also a promise that can have power over us. It controls us by comforting us, at least temporarily, until it fails &#8211; and then what?</p><p></p><h3>Conclusion</h3><p>The spectres cannot be avoided. They haunt everything tied to professionalisation. As a result, for many, professionalisation lives in a place of limbo &#8211; they are &#8220;unsure&#8221; (AISA 2022 Survey).</p><p>The deeper we look, the more professionalisation reveals itself as a paradox. It promises control, protection, progress, legitimacy, credibility, inclusion, sufficiency, and accountability, yet it can never fully deliver any of these &#8211; neither for itself or nor anyone associated with the industry.</p><p>Those who pursue professionalisation would do well to understand the spectres.</p><p>Whoever leads the effort to professionalise cybersecurity will be haunted by the spectres. We should empathise with the personal and relational costs they may face in this endeavour.</p><p>For the right leaders, the spectres could become an opportunity to listen deeply to the concerns that haunt professionalisation &#8212; not to dismiss or control them, that&#8217;s impossible, but to create the conditions where people feel safe enough to face those doubts together.</p><p></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #033 - The Authoritarian Ideology Overtaking Cybersecurity]]></title><description><![CDATA[The cybersecurity industry is being overtaken by a push for professionalisation.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-033-the-authoritarian-ideology</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-033-the-authoritarian-ideology</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 17 Mar 2025 22:00:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c93a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The cybersecurity industry is being overtaken by a push for professionalisation. Its proponents justify this push as a necessary step to better protect the public, businesses, and consumers. But a closer look reveals an ideology that elevates certain values, devalues others, and even excludes some values altogether.</p><p>What is the cost of this devaluation, and who pays the price? To answer this, we will look to a case study of the UK&#8217;s cybersecurity professionalisation scheme, specifically the <a href="https://www.ukcybersecuritycouncil.org.uk/media/un0j1eur/v-4-21-12-22-uk-csc-spcc.pdf">UK Cyber Security Council Competence &amp; Commitment (UK CSC SPC)</a>. We&#8217;ll refer to UK CSC as &#8220;the Council,&#8221; as that&#8217;s how its <a href="https://www.ukcybersecuritycouncil.org.uk/about-the-council/meet-the-team/">creators</a> describe themselves.</p><p>My end goal is to encourage reflection and questioning throughout the industry. By thinking critically about professionalisation, we can reflect on our ethical responsibilities toward those who are devalued or excluded &#8211; and decide whether change is necessary.</p><h2><strong>1) What is professionalisation&#8217;s ideal and how is it used for power grabbing?</strong></h2><p>The first objective of the Council is to &#8220;<em>promote high standards of practice in the cyber security profession for the benefit of the public.</em>&#8221; (p. 5)</p><p>This ideal of protecting the public sets up the entire justification for the Council&#8217;s existence. It is repeated in different ways throughout the document, such as on page 7 &#8220;<em>Society necessarily places great faith in its cyber security specialists</em>&#8221; &#8211; implying once more that the society needs cybersecurity professionalisation and, through deduction, the Council.</p><p>It&#8217;s worth noting that all cybersecurity professionalisation schemes legitimise their existence using a similar ideal. For example, in Australia, AISA talks about &#8220;protecting consumers&#8221; and Home Affairs about &#8220;protecting businesses&#8221;.</p><p>Whilst the wording might change, the mechanism is the same: an ideal is stated, made absolute, and it becomes the reason for forcing the entire sector into a professional licensing scheme.</p><p>But what else might lurk under this ideal aside from good intentions? Before we can answer this question, we must first expose the instruments of power used by professionalisation schemes.</p><h2><strong>2) How does an ideal impose itself onto an industry?</strong></h2><p>The Council uses the following mechanisms to operate the scheme:</p><ul><li><p>Registers of cybersecurity professionals</p></li><li><p>Three titles that establish a hierarchy: associate, principal, and chartered</p></li><li><p>Licensees that assess and recommend individuals that can be added onto the register</p></li><li><p>A professional standard, a certification framework, and commitment statements</p></li><li><p>A Code of Ethics</p></li></ul><p>The Council can take &#8220;<em>any action it deems necessary to protect the integrity of the Registers and to ensure that its post-nominal designations are used only by those Registrants entitled to do so</em>&#8221; (p. 5).</p><p>It is now clear that the document enacts tools of power, but against what or whom?</p><h2><strong>3) What is valued and devalued under this ideal?</strong></h2><p>The premise is clear: unprofessionalised cyber professionals are inadequate for society. The Council therefore sets out to professionalise them. This process begins with an ideology of devaluation:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c93a!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c93a!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 424w, https://substackcdn.com/image/fetch/$s_!c93a!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 848w, https://substackcdn.com/image/fetch/$s_!c93a!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 1272w, https://substackcdn.com/image/fetch/$s_!c93a!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c93a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png" width="1292" height="309" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:309,&quot;width&quot;:1292,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37029,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.mosse-institute.com/i/159227147?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c93a!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 424w, https://substackcdn.com/image/fetch/$s_!c93a!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 848w, https://substackcdn.com/image/fetch/$s_!c93a!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 1272w, https://substackcdn.com/image/fetch/$s_!c93a!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f411257-9e9e-461f-bcf0-398beb4001b1_1292x309.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Is this ideology truly stable and absolute? Of course not. We will now examine an example in detail to show how professionalisation cannot exist without the elements it devalues.</p><h2><strong>4) Institutional Validation above Self-Taught Expertise</strong></h2><p>The Council has divided cybersecurity into what it calls &#8220;specialisms,&#8221; such as penetration testing and incident response. But where did the knowledge behind these specialisms come from? It came from individuals who thought of new ideas and taught themselves solutions to solve problems. Only decades later did the Council appear, and declared itself the legitimate authority over who knows this knowledge and what the right pathways are.</p><p>For example, the first documented case of antivirus removal was in 1987 by Bernd Fix, who holds a degree in astrophysics. Bernd was involved in computer virus research and even wrote viruses himself, something some might now see as controversial. However, his work played a key role in launching the field of cybersecurity. Reviewing his online CV, I noted that he does not list any cybersecurity certifications despite working in cybersecurity for 39 years.</p><p>I did a search for &#8220;Bernd&#8221; across the Council&#8217;s and CyBok&#8217;s websites but could not find any reference to his work &#8211; even though many of the specialisms were shaped by his contribution (i.e., digital forensics, cyber threat intelligence, incident response and intrusion detection).</p><p>Industry innovations come from people like Bernd &#8211; those who dare to step outside established ways of thinking. They challenge existing mindsets, ideas, ideals, and ideologies, teaching themselves new approaches to tackle problems that others can&#8217;t solve. Should we be devaluating people like that? What opportunities might be missed in doing so?</p><p>Proponents of professionalisation claim they do not devalue self-taught approaches &#8211; of course! Yet, by promoting an institution that defines who qualifies as a cyber professional, what knowledge matters, and which pathways are valid, they create a system that shapes meaning. This system elevates certain ideas and practices while pushing others aside, ultimately rewarding conformity and limiting what people can do, think, or imagine.</p><p>Such an institution forces people to consider whether it approves of their curiosity, creativity, ethics and ideas. What does that do to a person? What will that do the industry?</p><p>Unfortunately for the Council, no matter how much authority over knowledge and norms it claims, it remains dependent on the very self-taught people its ideology covertly devalues.</p><h2><strong>5) Professionalisation or &#8220;Profanessionalisation&#8221;? Which is more accurate?</strong></h2><p>No matter the Council&#8217;s discourse, it depends on the people and ideas it devalues:</p><ul><li><p>Leaders emerge from merit-based, non-traditional pathways that later become codified</p></li><li><p>Pioneers start in open environments, later making standards for regulation possible</p></li><li><p>Self-created norms are first recognized by peers as valuable before being normalised</p></li><li><p>Competence is first achieved by unregistered experts, only later absorbed into a system</p></li></ul><p>As a play on word, I propose we rename professionalisation to &#8220;profanessionalisation&#8221; &#8211; because it is the profane, the devalued, the excluded, the unregistered and the unlicensed, that enables professional licensing and sustains it via appropriation.</p><h2><strong>6) What can Australia learn from the UK Cybersecurity Council?</strong></h2><p>Now that we have shown that professionalisation&#8217;s ideology is neither stable nor absolute, that it devalues what it depends on and even excludes those who made it possible in the first place, what should we do?</p><p>We must resist the authoritarian pull of ideology itself. We must give voice to those who are devalued because their contributions are essential to professional licensing, society, businesses, consumers and the industry as a whole. We must commit to self-criticism, challenge our norms and question our ways of thinking to prevent absolutist ideals and ideologies from taking hold unchallenged.</p><p>Professionalisation seeks to cement a power structure, a hierarchy between professionals, an economic model that benefits some more than others, and even exclude entire categories of industry contributors. Its ultimate victory will be making people think that no alternatives ever existed &#8211; or that they were unrealistic, incomplete, maybe even na&#239;ve. But was that really the case?</p><p>Therefore, we must create ways to encourage behaviours that defy our preconceived ideas of right and wrong. This demands a politics of constant renegotiation with ourselves and with each other. In this way, professionalisation&#8217;s true strength becomes its incompleteness. Whereby acknowledging it as a system that always fails makes innovation, ethics and progress possible.</p><p>Who will do the honour of challenging the Home Affairs, AISA, and others into a renegotiation?</p><p></p><p>Original post: <a href="https://www.benjamin-mosse.com/professionalisation/2025/03/12/professionalisation-as-the-profane-made-sacred.html">https://www.benjamin-mosse.com/professionalisation/2025/03/12/professionalisation-as-the-profane-made-sacred.html</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #032 - Who decides who is a cyber professional and why trust them?]]></title><description><![CDATA[Professionalisation is both the mechanism that enforces an economic model and the ideology that justifies it.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-032-the-construction-of-the</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-032-the-construction-of-the</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 25 Feb 2025 22:01:00 GMT</pubDate><content:encoded><![CDATA[<p>Professionalisation is both the mechanism that enforces an economic model and the ideology that justifies it. In this essay, I set out to analyse the <a href="https://business.gov.au/-/media/grants-and-programs/growing-and-professionalising-the-cyber-industry/growing-and-professionalising-the-cyber-security-industry---grant-opportunity-guidelines-pdf.pdf?sc_lang=en&amp;hash=F81330A2ACF1A5B5DEC75F1E34A9BE3A">Grant Opportunity Guidelines</a> published by the Australian Government and ask dangerous questions.</p><p></p><p><strong>1) Who called for professionalisation? Who was left out of the discussions?</strong></p><p>The grant program claims its legitimacy in five words: <em>&#8220;In response to industry calls&#8221;</em> (p. 5). But who called? No sources are named - only an assertion that assumes its own truth. If these calls exist, the absence of details about them grants power. Confidentiality can be important in a government document, but it might also be a fa&#231;ade that power hides behind.</p><p>Cybersecurity isn&#8217;t one profession but many, with multiple voices. Each has different priorities and ideas about expertise. Yet, the text smooths over these differences, presenting a unified demand for professionalisation. Whose calls are amplified, and whose are ignored?</p><p>Shouldn&#8217;t we get the chance to ask: if this is going to determine our industry, which voices should be represented, and heard? How many is enough? Not everyone can be heard, but why do only a few get to shape the outcome?</p><p>We, as the industry, need to voice our perspectives now, and continue to voice them. It doesn&#8217;t matter who controls the scheme. What matters is to critically examine the processes and forces in place and the real-world impact they will have on an ever-evolving industry.</p><p></p><p><strong>2) Where&#8217;s the proof?</strong></p><p>By writing <em>&#8220;In response to industry calls&#8221;</em> (p. 5), the industry is framed as unstructured, in need of an urgent response, with professionalisation as the only way to fix it. However, no evidence of the problem and no proof of that professionalisation works is cited. Were other options ever considered? Are there better alternatives?</p><p>Professionalism promises that accredited cyber professionals will be properly trained. It promises confidence in skills. However, no evidence is cited that professionalism achieves this.</p><p></p><p><strong>3) Does professionalisation provide clarity, or just power over definitions?</strong></p><p>The scheme&#8217;s purpose is clear: <em>&#8220;Provide employers and businesses with assurance that the cyber security professionals they hire have the necessary skills and training&#8221;</em> (p. 5).</p><p>Yet, the term <em>cyber</em> is unstable. It evolves with technology and threats, always shifting in context. To define it is to distil it in a moment, to impose limits where none naturally exist. Unsurprisingly then, the grant program never defines what a <em>cyber professional</em> is - despite its promise to produce and regulate them.</p><p>Who benefits from not defining the very <em>thing</em> professionalisation is all about?</p><p></p><p><strong>4) Will professionalisation remove barriers or create new ones?</strong></p><p>The program claims to remove barriers. But to professionalize is to decide who can call themselves a cyber professional and who cannot.</p><p>How does it do that? By leveraging definitions, &#8220;skills frameworks&#8221; and &#8220;professional accreditation streams&#8221;. And how are these used? As barriers of entry into the profession and barriers within the profession to create a hierarchy.</p><p>If barriers did not exist, then professionalisation could not claim to &#8220;<em>provide employers and businesses with assurance that the cyber security professionals they hire have the necessary skills and training</em>&#8221; (p. 5).</p><p>Professionalisation therefore relies on barriers so that it can claim to provide assurances about skills and training. It also uses barriers to enact a hierarchy between cyber professionals that is based certifications, skills, experience and titles. Once established, this hierarchy can only be challenged by changing the rules. And isn&#8217;t that the biggest of all barriers?</p><p></p><p><strong>5) Is the pilot testing a system or training you to accept it?</strong></p><p>The word <em>pilot</em> appears 14 times in the grant. It suggests something temporary, a test before a final decision. But is this really a test to gather feedback? Which feedback, and from whom, will inform change and which will not?</p><p>A <em>pilot</em> promises flexibility but it also locks in precedent. Once the pilot begins, the conversation shifts from <em>should we do this?</em> to <em>how will it be done?</em></p><p>The most concerning part of this pilot is that the winner gets to define the rules of how their performance will be measured and they self-report on their performance: &#8220;<em>at the end of the project you will provide: an assessment of how your project has addressed the gap of a national professionalisation scheme and standard for cyber security professionals</em>&#8221; (p. 10).</p><p>The government commits to performing its own review of the pilot based on &#8220;<em>information you provide to us and that we collect from various sources.</em>&#8221; (p. 4) The &#8220;<em>various sources</em>&#8221; are not listed. Do cyber professionals and employers benefit from this evaluation mechanism?</p><p></p><p><strong>6) If expertise can exist without authority, why do we crave its approval?</strong></p><p>The grant program gives cyber professionals little more than &#8220;<em>clear career, skills, and education pathways</em>&#8221;, while focusing on benefits for employers and businesses. Still, many will support it - not because it guarantees better cybersecurity, but because it offers incentives to do so by those who implement and oversee it. These incentives are belonging, money, status and power.</p><p>Professionalisation provides inadequate answers to questions that matter most in an industry but also in a career: Do I have skills that are progressing my industry? Is my knowledge up-to-date and cutting-edge? Am I following a checklist or truly understanding a complex problem?</p><p>Professionalisation does not just shape careers - it shapes minds. Will it make the minds of cyber professionals stronger or more complacent to rules?</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #031 - Will Professionalization Fix Cybersecurity or Break It?]]></title><description><![CDATA[There is a growing trend in cybersecurity toward professionalization&#8212;a push to establish formal standards, certifications, and accreditation frameworks similar to those in law and medicine.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-031-will-professionalization</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-031-will-professionalization</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 10 Feb 2025 22:01:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zfvl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a growing trend in cybersecurity toward professionalization&#8212;a push to establish formal standards, certifications, and accreditation frameworks similar to those in law and medicine. Advocates argue that this would improve competency, accountability, and trust within the industry.</p><p>The 2023-2030 Australian Cyber Security Strategy includes a recommendation to professionalize the industry, with an active $1.9M grant to design, test, and promote a national, self-sustaining cybersecurity professionalization scheme.</p><p>Following the publication of this grant, 40 senior cybersecurity leaders shared their points of view on LinkedIn. I used that data to perform a sentiment analysis which revealed that 7.5% of them are firmly in favour of the scheme, 2.5% mostly in favour, 15% are &#8216;in the middle&#8217;, 50% mostly against and 25% firmly against.</p><p>The key themes identified from their perspectives are as follows:</p><h3><strong>Theme #1: There is mixed support for a professionalization scheme</strong></h3><p>In addition to the Sentiment Analysis in this paper, a 2022 <a href="https://www.aisa.org.au/">AISA</a> survey found that 53.1% of members supported regulation and accreditation, 26.4% opposed it, and 20.5% were unsure, indicating divided opinions within the industry.</p><p>This means that the scheme is at risk of not being adopted by at least 1 in 2 cybersecurity professionals &#8211; possibly more than that.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Z51w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Z51w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 424w, https://substackcdn.com/image/fetch/$s_!Z51w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 848w, https://substackcdn.com/image/fetch/$s_!Z51w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 1272w, https://substackcdn.com/image/fetch/$s_!Z51w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Z51w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png" width="1155" height="273" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:273,&quot;width&quot;:1155,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:146347,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Z51w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 424w, https://substackcdn.com/image/fetch/$s_!Z51w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 848w, https://substackcdn.com/image/fetch/$s_!Z51w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 1272w, https://substackcdn.com/image/fetch/$s_!Z51w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39677c3e-822e-4615-8629-8eb84ecac7d9_1155x273.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Source: Research into Cyber Security Accreditation, AISA, September 2022, page 6</figcaption></figure></div><h3><strong>Theme #2: Many are concerned that vested interests will hijack the scheme</strong></h3><p>There seems to be no consensus on the best entity to implement the scheme &#8211; ideas include non-profits, government agencies, or quangos. Leaders also raised ongoing concerns about risks of vested interests. This suggests that senior leaders view the risk of the scheme being hijacked by vendors or unscrupulous parties as very high, which could pose a significant threat to the entire industry and the success of this project.</p><div class="pullquote"><p><em>&#8220;Mandating an Australian cybersecurity certification will create a supply line for a demanded product, being the Australian cybersecurity certification. It will also create significant demand if this certification is mandated as a condition of being able to perform specific cybersecurity roles. The immediate conclusion is that while I can't say if certificate holders or the cyber industry will benefit from this scheme, the certain beneficiaries will be the businesses and organisations that successfully integrate themselves into the Australian cybersecurity certification supply line, as they will benefit financially.&#8221;<br>Theo Nassiokas, Founder of Cyber8Lab, ex APAC CISO at Berclays</em></p></div><div class="pullquote"><p>&#8220;I would say that some people who are pushing a specific single scheme also hold executive or governance roles where there&#8217;s a clear conflict of interest that is not typically disclosed&#8221;<br>Honorary Professor Dr. Paul Watters and vCISO</p></div><h3><strong>Theme #3: The scheme oversimplifies a deeply complex profession</strong></h3><p>Cybersecurity is an exceptionally complex and dynamic field, with frameworks like NIST NICE identifying over 50 work roles and DoD Directive 8140 listing more than 70&#8212;and these numbers continue to grow. The field encompasses numerous distinct domains of expertise, and it is uncommon for individuals to master even a few, let alone all, of these areas, particularly given the rapid pace of change.</p><p>Simplifying job credentials into broad categories such as &#8220;associate,&#8221; &#8220;principal,&#8221; and &#8220;chartered,&#8221; tied to pre-selected certifications, degrees, and years of experience, oversimplifies this complexity. Such an approach fails to capture the diverse roles, specialized domains, and competencies required of cybersecurity professionals.</p><p>If the goal of the professionalization scheme is to clarify individual competencies, this kind of oversimplification may have the opposite effect: create more confusion and undermine its intended purpose of providing clarity.</p><div class="pullquote"><p>&#8220;Having been responsible for looking at large-scale cyber workforces, including Whole of the Victorian Government with 350,000+ total staff [&#8230;]. I am firmly of the opinion that there are many different skillsets that consist of being a Cyber Professional.&#8221;<br>Shane Moffitt, ex CISO of the Victorian Government</p></div><h3><strong>Theme #4: There&#8217;s a misalignment between the scheme&#8217;s goals and proposed solutions</strong></h3><p>Expectations for the scheme are widely varied, ranging from:</p><ol><li><p>improving classroom education</p></li><li><p>increasing the availability and quality of teachers</p></li><li><p>increasing gender diversity</p></li><li><p>establishing ethical standards</p></li><li><p>removing underperforming or delinquent actors from the marketplace</p></li><li><p>either creating or eliminating barriers to entry (depending on whom you ask)</p></li><li><p>and many other claims</p></li></ol><p>These diverse objectives make the scheme&#8217;s goals overly ambitious.</p><p>This lack of clarity suggests that, for many, the scope of the professionalization scheme is uncertain, making its value equally unclear. A poorly defined scope risks either failing to achieve its goals or focusing on the wrong objectives, ultimately preventing the intended value from being realized.</p><div class="pullquote"><p>&#8220;As a proponent for professionalization for my entire 45 year career - for professional services firms - I have supported industry and professional associations globally, the qualifying and certification/credentialing of my team and clients. But is this something we need for the everyone? Just professional services? Again, what problem are we solving?&#8221;<br>Mike Trovato, Managing Partner at Cyber Risks Advisors, ex EY and KPMG Partner</p></div><div class="pullquote"><p>&#8220;Sounds like there's a big disconnect between the goals and the path to reach them. There's a lot of this in our industry. We do things that feel like they should work and make us feel like we are doing something but in practice don't achieve their outcomes&#8221;<br>Daniel Grzelak, Chief Innovation Officer at Plerion, ex CISO of Atlassian</p></div><h3><strong>Theme #5: The scheme&#8217;s return-on-investment (ROI) lacks evidence</strong></h3><p>There is no clear, first-hand evidence to show that a professionalization scheme for the cybersecurity sector can effectively address or alleviate the root causes of the problems it seeks to solve. This means the scheme might be set up to fail from day one.</p><div class="pullquote"><p>&#8220;How does a professionalisation scheme solve the real challenge of making Australian businesses more secure?&#8221;<br>John Ellis, Global Head of Security at QBE, ex CISO at Bupa</p></div><div class="pullquote"><p>&#8220;While attempts to uplift the profession are always welcome, they should be guided by clear evidence in terms of both efficacy, priority with a clear and achievable mandate.&#8221;<br>Jarrod Loidl, Director at Deloitte<br></p></div><h3><strong>Theme #6: Malicious actors will game the system without mastering the skills</strong></h3><p>Past cheating scandals, such as the CREST UK cheating incident, highlight risks of the malicious actors finding loopholes in the system to gain a marketplace advantage:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zfvl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zfvl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 424w, https://substackcdn.com/image/fetch/$s_!zfvl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 848w, https://substackcdn.com/image/fetch/$s_!zfvl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 1272w, https://substackcdn.com/image/fetch/$s_!zfvl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zfvl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png" width="1196" height="327" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:327,&quot;width&quot;:1196,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:83288,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zfvl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 424w, https://substackcdn.com/image/fetch/$s_!zfvl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 848w, https://substackcdn.com/image/fetch/$s_!zfvl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 1272w, https://substackcdn.com/image/fetch/$s_!zfvl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb08be5c6-53f3-4090-91b1-ec87ec28a89c_1196x327.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Gareth Corfield, The Register, Fri 18 Jun 2021</figcaption></figure></div><div class="pullquote"><p>&#8220;People who worked hard to pass their CREST exams expressed disgust to El Reg that a significant backer of the industry body appeared to be spoon-feeding its staff the answers, raising questions about the exams' integrity and the competence of people who ultimately sign off clients' crown jewels as secure. Those clients include the British government and critical national infrastructure operators.&#8221;<br>Gareth Corfield, The Register</p></div><p>If the goal is to ensure that individuals accredited under the scheme are truly competent, but the scheme is easy to cheat, then it has fundamentally failed. Even worse, a cheating scandal could tarnish the reputation of the entire cybersecurity profession and undermine decades of effort spent building credibility across business, government and society.</p><p>Here&#8217;s a screenshot from LinkedIn of a bad actor taking industry tests for a fee:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t2tg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t2tg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 424w, https://substackcdn.com/image/fetch/$s_!t2tg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 848w, https://substackcdn.com/image/fetch/$s_!t2tg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 1272w, https://substackcdn.com/image/fetch/$s_!t2tg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t2tg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png" width="811" height="661" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:661,&quot;width&quot;:811,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:168627,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t2tg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 424w, https://substackcdn.com/image/fetch/$s_!t2tg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 848w, https://substackcdn.com/image/fetch/$s_!t2tg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 1272w, https://substackcdn.com/image/fetch/$s_!t2tg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15043617-dcb9-4a9b-8747-1a62eeec85c3_811x661.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: LinkedIn</figcaption></figure></div><h3><strong>Theme #7: The scheme ignores the broader context within which professionals operate</strong></h3><p>Cybersecurity professionals lack not only the legal backing but also the enforcement mechanisms at all levels to ensure secure practices are upheld.</p><p>Voluntary frameworks such as those proposed by associations (e.g., the ACS) rely on employer goodwill and carry no penalties for noncompliance. Consequently, organizations often ignore basic security measures &#8211; like enforcing multi-factor authentication &#8211; because it&#8217;s cheaper or more convenient, leaving ethical practitioners helpless or risking their careers by &#8220;blowing the whistle.&#8221;</p><p>Moreover, current legislation is rarely enforced, enabling companies to treat breaches as tolerable risks rather than obligations. Even the Australian government resists adopting its own cybersecurity standards.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RhTj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RhTj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 424w, https://substackcdn.com/image/fetch/$s_!RhTj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 848w, https://substackcdn.com/image/fetch/$s_!RhTj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 1272w, https://substackcdn.com/image/fetch/$s_!RhTj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RhTj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png" width="1123" height="449" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:449,&quot;width&quot;:1123,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:190358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RhTj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 424w, https://substackcdn.com/image/fetch/$s_!RhTj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 848w, https://substackcdn.com/image/fetch/$s_!RhTj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 1272w, https://substackcdn.com/image/fetch/$s_!RhTj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe809fc71-c1ab-4865-839b-2a92c29e4310_1123x449.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Joseph Brookes writing for InnovationAus on the 7<sup>th</sup> of January 2025</figcaption></figure></div><p>In the absence of robust legislative enforcement and binding industry standards, efforts to &#8216;professionalize&#8217; cybersecurity might not achieve its goal of improving the protection of both ethical practitioners and the public.</p><div class="pullquote"><p>&#8220;Cyber security won't be a certifiable profession before we are charging $600 per hour, held personally liable for poor advice, hold professional indemnity insurance at a cost exceeding $20,000 per annum and CISOs/board members are held criminally liable for reckless and negligent security decisions.&#8221;<br>Dale J., Consultant and ex Chief Security Architect for the ATO</p></div><h2><strong>Conclusion</strong></h2><p>While this summary highlights what I believe to be the top 7 concerns raised by senior leaders, I have collected a total of 28 unique criticisms. This suggests to me that more consultation and research is needed.</p><p>You can read my <a href="https://www.mosse-security.com/assets/resources/articles/Reconsider-Your-Grant-For-Professionalising-The-Cybersecurity-Industry.pdf">full paper here</a>, with approximately 4 pages of recommendations.</p><p>I submitted my paper to the Department of Home Affairs on January 27, 2025. Today, they issued a formal response, and I look forward to the opportunity to discuss my recommendations with them in greater detail.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VpSn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VpSn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 424w, https://substackcdn.com/image/fetch/$s_!VpSn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 848w, https://substackcdn.com/image/fetch/$s_!VpSn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 1272w, https://substackcdn.com/image/fetch/$s_!VpSn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VpSn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png" width="875" height="1188" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1188,&quot;width&quot;:875,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:46279,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VpSn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 424w, https://substackcdn.com/image/fetch/$s_!VpSn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 848w, https://substackcdn.com/image/fetch/$s_!VpSn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 1272w, https://substackcdn.com/image/fetch/$s_!VpSn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36403d0c-2e39-4448-a387-1d6c5ae6e438_875x1188.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[MCSI #030 - The impact of AI on cybersecurity jobs]]></title><description><![CDATA[Who's going to lose their jobs because of AI?]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-030-the-impact-of-ai-on-cybersecurity</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-030-the-impact-of-ai-on-cybersecurity</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Wed, 29 May 2024 23:00:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GPMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Millions of dollars are being invested in developing AI systems designed to replace junior cybersecurity professionals. In the next 3 to 5 years, roles such as junior SOC analysts may become obsolete as AI takes over tasks like triaging alerts and conducting basic research, leading to full automation of these functions.</p><p>Don&#8217;t believe me? Check out the start-up <a href="https://www.culminatesecurity.com/">Culminate Security</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GPMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GPMB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 424w, https://substackcdn.com/image/fetch/$s_!GPMB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 848w, https://substackcdn.com/image/fetch/$s_!GPMB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 1272w, https://substackcdn.com/image/fetch/$s_!GPMB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GPMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png" width="1456" height="887" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:887,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:171952,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GPMB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 424w, https://substackcdn.com/image/fetch/$s_!GPMB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 848w, https://substackcdn.com/image/fetch/$s_!GPMB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 1272w, https://substackcdn.com/image/fetch/$s_!GPMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd6951f0-7750-4a5c-9b95-85a18d46f3d3_2036x1241.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 1 - An AI start-up that wants to replace Level 1 SOC Analysts</figcaption></figure></div><h2>Traditional Cyber Education Is Obsolete</h2><p>Most cybersecurity degrees and certifications are already outdated and fail to meet employers' needs. As AI begins to replace a significant number of junior roles, these courses will become entirely obsolete. Why invest time and money in learning skills that AI can and will perform more efficiently and cost-effectively?</p><p>Here&#8217;s a list of tasks currently done by juniors, which will soon be entirely done by AI:</p><ul><li><p>Automatically sorting and prioritizing security alerts to identify genuine threats</p></li><li><p>Conducting automated scans to identify potential vulnerabilities in systems and networks</p></li><li><p>Identifying and blocking phishing emails and malicious links</p></li><li><p>Automating the provisioning and de-provisioning of user access to systems and data</p></li><li><p>Conducting automated audits to ensure security policies and controls are in place and effective</p></li></ul><p>If you're considering pursuing cybersecurity classes or certifications, ask yourself if the skills you&#8217;ll acquire will remain relevant in a world where AI automates tasks traditionally performed by junior professionals.</p><h2>The Opportunity You Need to Capture</h2><div class="pullquote"><p>&#8220;People don't enter the cybersecurity field to perform mundane, repetitive tasks. They join to engage in meaningful work that matters&#8212;work that provides a sense of purpose and fulfillment. They seek opportunities that involve critical thinking, problem-solving, and creativity. Let AI handle the monotonous tasks, so cybersecurity professionals can focus on the exceptional work that truly makes a difference.&#8221; - Benjamin Moss&#233;</p></div><p>Personally, I believe it's fantastic that AI will soon handle all the repetitive, mundane tasks. I look forward to a time when we no longer have to spend our efforts on these activities. Instead, we should focus on honing our critical thinking, problem-solving, and interpersonal skills. Moreover, I don't think it's important to have certifications that test the memorization of concepts and terminology&#8212;AI will manage those aspects for us.</p><p>If you want to advance your cybersecurity career in 2024 and beyond, here are key areas to focus on:</p><ol><li><p><strong>Project Management:</strong> Can you successfully deliver a project on time and within budget?</p></li><li><p><strong>Problem Solving:</strong> Can you collaborate with other people to tackle critical issues effectively?</p></li><li><p><strong>Critical Thinking:</strong> Can you analyze and evaluate situations to maximize the business value of a project?</p></li><li><p><strong>Communication:</strong> Can you clearly articulate your ideas and findings to both technical and non-technical stakeholders?</p></li><li><p><strong>Interpersonal Skills:</strong> Can you build and maintain positive, productive relationships with colleagues and clients?</p></li></ol><p>By honing these skills, you'll be well-equipped to thrive in world with AI.</p><h2>How Is MCSI Adapting to New AI Capabilities?</h2><p>At MCSI, we are passionate about AI. We use GPT and other advanced tools daily and encourage our users to master these technologies as well. We believe that universities and other institutions that fail to fully embrace AI will be left behind.</p><p>We recognize the significant impact AI has had on our users. Tasks that were once challenging became manageable with the introduction of GPT, enabling users to complete exercises they previously struggled with.</p><p>A key strength of our platform is our ability to quickly and efficiently update our exercises. We are currently undertaking a comprehensive catalog update to reinvent our exercises, focusing on critical thinking, problem-solving, and creativity. Additionally, we require students to write reports, briefings, and presentations, as we believe these skills are essential for modern cybersecurity professionals.</p><p>Here&#8217;s a snippet of one of our threat intelligence exercise:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J88x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J88x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 424w, https://substackcdn.com/image/fetch/$s_!J88x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 848w, https://substackcdn.com/image/fetch/$s_!J88x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 1272w, https://substackcdn.com/image/fetch/$s_!J88x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J88x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png" width="1456" height="1274" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1274,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:234678,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J88x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 424w, https://substackcdn.com/image/fetch/$s_!J88x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 848w, https://substackcdn.com/image/fetch/$s_!J88x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 1272w, https://substackcdn.com/image/fetch/$s_!J88x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4431f4c0-eb50-40f7-b343-1fb01e4ea136_1502x1314.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 2 - Leverage Threat Intelligence To Generate A List Of Hypotheses To Be Tested By A Red Team</figcaption></figure></div><p>Notice how we have our students work with recent industry threat reports. They analyze these reports and apply critical thinking to develop testing hypotheses for designing a Red Team engagement. Finally, they must write a detailed report explaining each hypothesis and providing supporting documentation. This type of high-value work is essential for human analysts to master in 2024.</p><p>Here&#8217;s a testimonial we received this week:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bq42!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bq42!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 424w, https://substackcdn.com/image/fetch/$s_!Bq42!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 848w, https://substackcdn.com/image/fetch/$s_!Bq42!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 1272w, https://substackcdn.com/image/fetch/$s_!Bq42!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bq42!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png" width="1437" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1437,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:155523,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bq42!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 424w, https://substackcdn.com/image/fetch/$s_!Bq42!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 848w, https://substackcdn.com/image/fetch/$s_!Bq42!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 1272w, https://substackcdn.com/image/fetch/$s_!Bq42!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef2203d8-4ce7-4e8b-8cc3-bd4f3d5eb2fb_1437x704.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you haven&#8217;t already, <a href="https://www.mosse-institute.com/certifications.html">browse our list of courses</a> and pick one that interests you.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #029 - Finding purpose and meaning in cybersecurity]]></title><description><![CDATA[Is working in cybersecurity really worth it?]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-029-finding-purpose-and-meaning</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-029-finding-purpose-and-meaning</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Thu, 23 May 2024 01:20:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6rYO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cybersecurity professionals can face significant mental health challenges, including burnout, depression, and imposter syndrome. Despite the field's potential to be highly rewarding, many find it detrimental to their health and wellbeing.</p><p>While I'm not a psychologist, my 20 years of experience in cybersecurity have given me a deep understanding of its highs and lows. In this week's newsletter, I will highlight some of the industry's key issues and offer practical solutions to help foster a healthier work environment.</p><h2>Perverse Incentives</h2><p>Cybersecurity is an intensely competitive field, often driven by superficial metrics like the number of certifications, CVEs, conference talks, or unique knowledge. However, these benchmarks fail to reflect the true value of your life or your progress toward meaningful personal goals.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3dSx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3dSx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 424w, https://substackcdn.com/image/fetch/$s_!3dSx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 848w, https://substackcdn.com/image/fetch/$s_!3dSx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 1272w, https://substackcdn.com/image/fetch/$s_!3dSx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3dSx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png" width="562" height="101.4183908045977" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:157,&quot;width&quot;:870,&quot;resizeWidth&quot;:562,&quot;bytes&quot;:42431,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3dSx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 424w, https://substackcdn.com/image/fetch/$s_!3dSx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 848w, https://substackcdn.com/image/fetch/$s_!3dSx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 1272w, https://substackcdn.com/image/fetch/$s_!3dSx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5eebeaff-51d1-4862-b29c-8d5e49f75401_870x157.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Image 1 - <a href="https://x.com/yarden_shafir">Yarden Shafir</a> is a world-class researcher, yet even at her level, avoiding comparisons with others remains challenging because the metrics are unhealthy to begin with.</figcaption></figure></div><p>If you take some time to reflect on what truly matters to you, you'll likely find that your most cherished goals have little to do with the industry's ranking metrics. My advice is to live by your own standards. Although it may be challenging at first, it requires a deep conviction in your values and the courage to prioritize your own growth and wellbeing.</p><h2>Pointless Work</h2><p>The unfortunate reality is that many cybersecurity professionals spend their days on seemingly pointless tasks. They are often expected to monitor screens and triage trivial alerts, attend unproductive meetings, navigate office politics, or conduct repetitive security assessments of the same applications year after year. Even when they do accomplish something tangible, they rarely witness the positive human impact of their efforts. Few leave work feeling fulfilled. This lack of visible progress towards meaningful goals is psychologically draining, as human flourishing relies on perceivable advancement toward personal values.</p><p><a href="https://www.linkedin.com/in/ryan-ettridge/">Ryan Ettridge</a> conducted a survey and found that only 13% of cybersecurity professionals feel they are on track to reach their career potential.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6rYO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6rYO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 424w, https://substackcdn.com/image/fetch/$s_!6rYO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 848w, https://substackcdn.com/image/fetch/$s_!6rYO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 1272w, https://substackcdn.com/image/fetch/$s_!6rYO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6rYO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png" width="442" height="437.1369193154034" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:809,&quot;width&quot;:818,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:264997,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6rYO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 424w, https://substackcdn.com/image/fetch/$s_!6rYO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 848w, https://substackcdn.com/image/fetch/$s_!6rYO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 1272w, https://substackcdn.com/image/fetch/$s_!6rYO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F292654ec-d861-4b4b-ae37-471f5ae836fd_818x809.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 2 - Only 13% of cyber pros feel on track with their career potential</figcaption></figure></div><h2>Limited Career Opportunities</h2><p>There&#8217;s a high demand for cybersecurity professionals, but much of the work involves repetitive tasks. This is beneficial early in your career, as a few years of experience can make you employable by numerous organizations with similar needs. However, if your aspirations are bigger, opportunities are limited.</p><p>Most countries lack ecosystems that effectively support start-ups, and many organizations are slow to adopt new ideas. This environment stifles true innovators and inventors, making it difficult for them to succeed. Additionally, it deters potential entrepreneurs who recognize that few clients see fostering new products and companies as their responsibility to advance the industry.</p><p>Consequently, even if you reach the pinnacle of the industry in your region, you may find very few opportunities to engage in something new and innovative.</p><h2>So What Should You Do?</h2><blockquote><p>&#8220;<em>Learn to value yourself, which means: fight for your happiness.</em>&#8221; - Ayn Rand</p></blockquote><p>My first piece of advice is to fight for your freedom. This means developing skills and building business relationships that allow you to be self-reliant. When you achieve this level of independence, you are no longer bound by metrics imposed by others or compelled to work for organizations that don't align with your values. The cybersecurity market offers the potential for such freedom. You can choose the people you work with and the problems you tackle based on what you truly value.</p><p>Focusing solely on certifications without developing real skills is self-sabotaging. While certifications may seem to increase employability, they don't provide the freedom that genuine skills, abilities, and connections offer. True freedom comes from mastery and self-sufficiency, not from external validation.</p><p>Secondly, it's crucial to live by a philosophy that prioritizes your own life and flourishing, as this is essential for achieving true happiness. Many workplaces will pressure you to sacrifice your values for their needs. They might require you to perform tasks that don't align with your aspirations or conform culturally at the expense of your individuality. These compromises may seem necessary in the short term, but life is a long-term journey, and consistently sacrificing your values will not help you achieve your goals.</p><p>My advice is to live by a philosophy of self-esteem. Clearly define what you want from your work life. Don't compromise on your core values. In the short term, you may need to trade your time and skills for get your foot in the door or pay the rent, but don't settle for a path that doesn't align with your true aspirations. Focus on maintaining your integrity and working towards a career that genuinely fulfills you.</p><h2>How Can MCSI Help You?</h2><p>At first glance, MCSI might appear to be just another cyber training institute. However, our mission is much more nuanced. We aim to empower individuals like you by teaching practical, in-demand skills, helping you achieve the freedom necessary for personal and professional flourishing.</p><p>If you haven't already, give our <a href="https://platform.mosse-institute.com/">free version</a> a try. Additionally, consider purchasing one of our courses with our May 2024 discount code: <strong>MCSI-MAY-2024-PQV</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IPgB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IPgB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IPgB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IPgB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IPgB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IPgB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg" width="628" height="328.2335164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:761,&quot;width&quot;:1456,&quot;resizeWidth&quot;:628,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;No alt text provided for this image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="No alt text provided for this image" title="No alt text provided for this image" srcset="https://substackcdn.com/image/fetch/$s_!IPgB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 424w, https://substackcdn.com/image/fetch/$s_!IPgB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 848w, https://substackcdn.com/image/fetch/$s_!IPgB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!IPgB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3497002-29c8-43c0-b1a6-d2c5288c5cee_2048x1070.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;ve <a href="https://www.mosse-institute.com/company/why-mcsi.html">helped</a> thousands of individuals achieve their career goals in cybersecurity, and we&#8217;d love to help you too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hSWn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hSWn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 424w, https://substackcdn.com/image/fetch/$s_!hSWn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 848w, https://substackcdn.com/image/fetch/$s_!hSWn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!hSWn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hSWn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png" width="1456" height="1028" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1028,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hSWn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 424w, https://substackcdn.com/image/fetch/$s_!hSWn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 848w, https://substackcdn.com/image/fetch/$s_!hSWn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 1272w, https://substackcdn.com/image/fetch/$s_!hSWn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ad007fb-e007-447a-8a9d-e22b76b36eb8_2900x2048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #028 - Why do cyber attackers keep winning?]]></title><description><![CDATA[In the world of cybersecurity, attackers and defenders are always in a battle.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-028-why-do-cyber-attackers-keep</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-028-why-do-cyber-attackers-keep</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 16 Apr 2024 23:01:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gvVU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the world of cybersecurity, attackers and defenders are always in a battle. Attackers keep finding new and creative ways to break into systems, while defenders usually stick to a set list of rules and standards. This difference in approach gives attackers an advantage because they can think outside the box and find unexpected ways to get past defenses. In this newsletter, we'll look at why cyber attackers often end up winning and what that means for keeping networks safe.</p><h3>Creativity Always Wins</h3><blockquote><p>&#8220;Defenders hate criticism. Attackers live by it. It motivates them to outdo their previous achievements&#8221; - Benjamin Moss&#233;</p></blockquote><p>Creativity is a powerful force that fuels innovation and problem-solving. In the realm of cybersecurity, creativity allows for the development of unique and unexpected methods to challenge existing systems. It enables individuals to think outside traditional frameworks and invent solutions that have never been considered before. This capacity for original thinking is crucial when facing complex and dynamic challenges, as it allows for adaptive and flexible responses rather than fixed, predictable ones.</p><p>This inherent power of creativity is precisely why cyber attackers often have the upper hand. They leverage their ability to devise novel tactics and exploit unforeseen vulnerabilities, making it difficult for defenders, who are bound by standard protocols and reactive strategies, to keep up. As attackers continue to employ imaginative and inventive methods, they outmaneuver static defense systems, demonstrating time and again that in the cyber world, creativity not only leads&#8212;it wins.</p><h3><strong>The Pitfalls of Rigid Standards in Cybersecurity</strong></h3><blockquote><p>&#8220;ISO 27000 told me to do it&#8221; - Unnamed CIO </p></blockquote><p>By rigidly adhering to established standards such as ISO 27000, PCI DSS, and the Essential Eight, defenders often confine themselves to predefined frameworks and checklists. These standards dictate their actions and justify their security measures at the expense of engaging in a more dynamic, creative problem-solving process. This reliance on fixed guidelines can inhibit their ability to adapt and respond to the unconventional strategies employed by attackers, who are not constrained by such norms and continuously creatively explore new avenues for breach.</p><h3><strong>Empowering Defenders with Creative Freedom in Training</strong></h3><div class="pullquote"><p>Every defender must have as much creative freedom as the attackers they face.</p></div><p>At MCSI, we are pioneering training courses that instill a critical principle: <em>every defender must have as much creative freedom as the attackers they face.</em> This begins with their training. By embedding creativity at the heart of our cybersecurity education, we empower defenders to think and maneuver with the same ingenuity and adaptability as their adversaries. Our goal is to transform the landscape of cyber defense from rigid adherence to standards to a dynamic, innovative battleground where defenders are equipped to outsmart the adversaries.</p><p>If this sounds like something that interests you, then browse our list of courses <a href="https://www.mosse-institute.com/certifications.html">here</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gvVU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gvVU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 424w, https://substackcdn.com/image/fetch/$s_!gvVU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 848w, https://substackcdn.com/image/fetch/$s_!gvVU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 1272w, https://substackcdn.com/image/fetch/$s_!gvVU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gvVU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png" width="1435" height="339" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:339,&quot;width&quot;:1435,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:52706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gvVU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 424w, https://substackcdn.com/image/fetch/$s_!gvVU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 848w, https://substackcdn.com/image/fetch/$s_!gvVU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 1272w, https://substackcdn.com/image/fetch/$s_!gvVU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe748ea3-4bc9-4906-a8c4-da44e2246161_1435x339.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #027 - Three Powerful Ideas to Become a Cybersecurity Powerhouse]]></title><description><![CDATA[The top 3 ideas that will make you a cybersecurity genius]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-027-three-powerful-ideas-to</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-027-three-powerful-ideas-to</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 09 Apr 2024 23:00:43 GMT</pubDate><content:encoded><![CDATA[<p>Dive into this newsletter to unlock powerful ideas that will transform your approach, giving you a deeper, more nuanced understanding of cybersecurity. These insights are designed to challenge and refine your thinking, equipping you to excel in your field.</p><h2>Idea #1 - Turn Errors into Opportunities</h2><blockquote><p>&#8220;Learn all the ways software developers and system administrators get confused about cybersecurity.&#8220; - Benjamin Moss&#233;</p></blockquote><p>In offensive security, it's key to know where software developers and system admins often slip up with cybersecurity. Many think that just having strong passwords or the latest updates keeps systems safe. But, these ideas can miss bigger threats and leave gaps for hackers. Offensive security pros need to dig into these common mistakes to find and fix security holes better.</p><p>Looking at real incidents helps a lot. For example, studying a case where too much trust in encryption led to a data leak shows the danger of such mistakes. These stories teach important lessons, showing how overlooking simple security aspects can lead to big problems.</p><ol><li><p>Make an inventory of all the vulnerability classes</p></li><li><p>Identify software historically affected by these vulnerabilities</p></li><li><p>Read the code that developers wrote to patch the bugs</p></li><li><p>Track on some of the best bug bounty hunters are discovering their best bugs</p></li><li><p>Setup your own test lab and build an inventory of configuration errors that could lead to security vulnerabilities</p></li></ol><h3>Idea #2 - Systematic Approaches Win</h3><blockquote><p>&#8220;Use a systematic approach to solving problems and making decisions.&#8221; - Benjamin Moss&#233;</p></blockquote><p>A systematic approach in incident response and malware analysis is key because it ensures every part of the cybersecurity puzzle is addressed. It&#8217;s not just about following steps in order; it's about looking at the whole picture and connecting all the dots. This means analyzing every aspect of the incident or malware to understand the full scope of the threat. By doing this, you ensure that you're not just putting a temporary fix on a problem but are thoroughly eliminating the root cause and preventing future issues.</p><p>In simpler terms, think of it as putting together a complete map of an attack or malware behavior. Instead of just patching holes, you're understanding how and why they appeared and how everything is interconnected. This comprehensive view allows for smarter, more effective decisions.</p><ol><li><p>Learn <a href="https://library.mosse-institute.com/ways-of-working/rca.html">Root Cause Analysis</a></p></li><li><p>Learn <a href="https://library.mosse-institute.com/ways-of-working/problem-solving.html">Problem Solving Techniques</a></p></li><li><p>Learn <a href="https://library.mosse-institute.com/ways-of-working/analytics-techniques.html">Structured Analytics Techniques</a></p></li></ol><h2>Idea #3 - How Refutations Drive Progress in Cybersecurity</h2><blockquote><p>&#8220;Never act on a refuted idea.&#8221; - Elliot Temple</p></blockquote><p>Karl Popper, a philosopher of science, argued that knowledge progresses through a cycle of conjectures and refutations. According to Popper, we gain knowledge by proposing theories (conjectures) and then testing these theories against evidence, trying to refute them. This process of critical testing and attempting to falsify ideas helps us eliminate those that don&#8217;t hold up to scrutiny, thereby moving closer to the truth.</p><p>Applying Popper&#8217;s philosophy to cybersecurity management, the idea is that leaders should approach problems by forming hypotheses or strategies (conjectures) and then critically evaluating and testing them (refutations). The value of criticism here is immense: it&#8217;s a tool that helps to clarify what works and what doesn&#8217;t. By rigorously testing ideas and being open to finding flaws, leaders can discard ineffective strategies (refuted ideas) and refine their approach.</p><p>So, in practice, a cybersecurity leader should foster an environment where strategies and decisions are constantly scrutinized.</p><ol><li><p>Pick an idea of your choice (could be anything)</p></li><li><p>Identify what problem the idea is trying to solve (it&#8217;s goal)</p></li><li><p>Produce a refutation for the idea by explaining <em>why the idea doesn&#8217;t achieve the goal </em>(source: Elliot Temple)</p></li></ol><p>If you're interested in learning more about this idea, we recommend "Yes or No Philosophy" by Elliot Temple.</p><h2>Final Word</h2><p>By embracing the powerful ideas highlighted in this newsletter, you're taking a significant step towards deepening your cybersecurity knowledge. At the Moss&#233; Cyber Security Institute, our platform is meticulously crafted to embody these principles, offering courses and resources that go beyond traditional learning. We're committed to fostering a space where you can explore, challenge, and refine your understanding of cybersecurity, ensuring you're not just prepared for the challenges of today but are also ahead of the curve for tomorrow.</p><p>Check out <a href="https://www.mosse-institute.com/certifications.html">our courses</a> if you haven&#8217;t already.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VaCy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VaCy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 424w, https://substackcdn.com/image/fetch/$s_!VaCy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 848w, https://substackcdn.com/image/fetch/$s_!VaCy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 1272w, https://substackcdn.com/image/fetch/$s_!VaCy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VaCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png" width="1427" height="286" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:286,&quot;width&quot;:1427,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:49233,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VaCy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 424w, https://substackcdn.com/image/fetch/$s_!VaCy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 848w, https://substackcdn.com/image/fetch/$s_!VaCy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 1272w, https://substackcdn.com/image/fetch/$s_!VaCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc140a2a4-4602-44eb-8eed-ccd4d1c1e83f_1427x286.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #026 - The science of career development and job task analysis]]></title><description><![CDATA[From kite flyers to space pilots: Navigating the cosmic gap of job interviews!]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-026-the-science-of-career-development</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-026-the-science-of-career-development</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 02 Apr 2024 22:01:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jKSz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p>Every candidate claims they're the perfect fit for the job, yet some walk into the interview knowing less about the company than a cat knows about astrophysics. It's like saying you're ready to pilot a spaceship because you once flew a kite. Knowing your skills is half the battle; demonstrating how they align with what the company actually does is how you launch into orbit.</p></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jKSz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jKSz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!jKSz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!jKSz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!jKSz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jKSz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp" width="374" height="374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:374,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A humorous scene depicting a cat looking at a complex astrophysics equation on a chalkboard, looking confused and overwhelmed, in a classroom setting. The cat is wearing glasses and a tie, symbolizing a job candidate. The background shows a spaceship, indicating the leap from understanding simple concepts to complex ones, with a chalkboard filled with mathematical formulas and space illustrations.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A humorous scene depicting a cat looking at a complex astrophysics equation on a chalkboard, looking confused and overwhelmed, in a classroom setting. The cat is wearing glasses and a tie, symbolizing a job candidate. The background shows a spaceship, indicating the leap from understanding simple concepts to complex ones, with a chalkboard filled with mathematical formulas and space illustrations." title="A humorous scene depicting a cat looking at a complex astrophysics equation on a chalkboard, looking confused and overwhelmed, in a classroom setting. The cat is wearing glasses and a tie, symbolizing a job candidate. The background shows a spaceship, indicating the leap from understanding simple concepts to complex ones, with a chalkboard filled with mathematical formulas and space illustrations." srcset="https://substackcdn.com/image/fetch/$s_!jKSz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!jKSz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!jKSz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!jKSz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5657bc2c-a5cf-4c0c-aca3-f335531df373_1024x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A university graduate telling us they can do red teaming</figcaption></figure></div><p>Welcome to our guide on mastering career development through job task analysis. We'll show you how to extract and analyze key knowledge, skills, abilities and tasks (KSATs) from job postings, identify your gaps, and create a training plan to address them.</p><p>Whether you're aiming to advance in your current field or switch to a new one, this guide will provide the practical tools and insights needed to improve your employability and achieve your career goals.</p><h3>Step 1 - Extract KSATs from Job Postings</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aA6r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aA6r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 424w, https://substackcdn.com/image/fetch/$s_!aA6r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 848w, https://substackcdn.com/image/fetch/$s_!aA6r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 1272w, https://substackcdn.com/image/fetch/$s_!aA6r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aA6r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png" width="1322" height="443" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:443,&quot;width&quot;:1322,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:142810,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aA6r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 424w, https://substackcdn.com/image/fetch/$s_!aA6r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 848w, https://substackcdn.com/image/fetch/$s_!aA6r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 1272w, https://substackcdn.com/image/fetch/$s_!aA6r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36f98eeb-fb06-429f-b58d-a97d3496f414_1322x443.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 1 - Example of KSATs from a random job posting</figcaption></figure></div><p>Understanding the requirements of your desired job role is the first step in career development. Job postings are a goldmine of information, detailing the KSATs that employers seek in candidates. To start, focus on thoroughly reading job descriptions relevant to your career aspirations. Here's how to effectively extract KSATs:</p><ol><li><p><strong>Identify Core Requirements</strong>: Look for sections in the job postings that list specific qualifications, skills, and experiences. These are typically highlighted under headings like "Requirements," "Qualifications," or "Responsibilities."</p></li><li><p><strong>Highlight Keywords and Phrases</strong>: Use highlighters or a digital tool to mark important keywords and phrases that recur across multiple postings. These often represent the core KSATs needed for the role.</p></li><li><p><strong>Organize and Categorize</strong>: Create a spreadsheet or a database where you can categorize the extracted information into Knowledge, Skills, Abilities and Tasks. This organization will aid in analyzing how these elements interrelate and prioritize them based on the needs of the industry or specific job.</p></li></ol><h3>Step 2 - Analyze the Data in a Spreadsheet</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GsUw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GsUw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 424w, https://substackcdn.com/image/fetch/$s_!GsUw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 848w, https://substackcdn.com/image/fetch/$s_!GsUw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 1272w, https://substackcdn.com/image/fetch/$s_!GsUw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GsUw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png" width="1456" height="357" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:357,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:67578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GsUw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 424w, https://substackcdn.com/image/fetch/$s_!GsUw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 848w, https://substackcdn.com/image/fetch/$s_!GsUw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 1272w, https://substackcdn.com/image/fetch/$s_!GsUw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F689a3ed6-7143-4039-884c-85b332cfd3fb_1560x383.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Image 2 - Analyze the data</figcaption></figure></div><p>Once you have collected KSATs from job postings, the next step is to analyze this data to understand the job market demands and how you fit into them. A spreadsheet is an excellent tool for this analysis, allowing you to sort, filter, and organize data effectively. Here&#8217;s how to proceed:</p><ol><li><p><strong>Input Data Methodically:</strong> Enter the extracted KSATs into a spreadsheet. Ensure each entry is consistent.</p></li><li><p><strong>Prioritize and Rank:</strong> Assess the frequency and importance of each KSAT across different job postings. Rank them based on how often they appear and their relevance to the roles you are targeting. This will help you identify the most in-demand KSATs in your chosen field.</p></li><li><p><strong>Gap Analysis:</strong> Create a column next to your KSATs for self-assessment. Mark your current proficiency or experience level against each KSAT. This will visually highlight where you meet the requirements and where there are gaps needing attention.</p></li><li><p><strong>Identify Trends and Patterns:</strong> Look for trends in the data that indicate specific industry directions or focus areas. For instance, if certain skills are increasingly in demand, it may signal a shift in industry standards or emerging technologies.</p></li></ol><h3>Step 3 - Identify Gaps in Personal KSATs</h3><p>With a detailed analysis of job market KSATs in hand, the next step is to assess how your current skills and experiences align with these requirements. This gap analysis will help you pinpoint the areas you need to focus on to enhance your employability. Here&#8217;s how to conduct this assessment effectively:</p><ol><li><p><strong>Self-Evaluation:</strong> Compare your current set of skills, abilities, knowledge, and experiences with the KSATs listed in your spreadsheet. Be honest and objective about your level of proficiency and experience in each area.</p></li><li><p><strong>Highlight the Gaps:</strong> Identify where your KSATs fall short of the job market demands. These gaps are your key areas for development. Highlighting these will provide a clear focus for your training and development efforts.</p></li><li><p><strong>Consider the Context:</strong> Contextualize each gap in terms of your career goals and the industry you are targeting. A gap in a highly demanded skill within your desired industry should take priority over less critical areas.</p></li><li><p><strong>Set Improvement Goals:</strong> For each identified gap, set specific, measurable, achievable, relevant, and time-bound (SMART) goals. This will make your development plan actionable and allow you to track progress over time.</p></li></ol><h3><strong>Step 4 - Build a Training Plan</strong></h3><blockquote><p>&#8220;If you fail to plan, you are planning to fail!&#8221; - Benjamin Franklin</p></blockquote><p>After identifying the gaps in your KSATs, the next step is to develop a training plan tailored to your needs. This plan will guide your efforts to acquire the necessary skills and knowledge to advance your career. Here&#8217;s how to create an effective training plan:</p><ol><li><p><strong>Set Clear Objectives</strong>: Define what you aim to achieve through your training. Each objective should address a specific gap in your KSATs, contributing to your overall career goals.</p></li><li><p><strong>Research Training Options</strong>: Explore various training and educational resources that align with your objectives. These could include online courses, workshops, seminars, certification programs, or self-study materials. Prioritize those that are most relevant and offer practical, applicable knowledge or skills.</p></li><li><p><strong>Create a Timeline</strong>: Establish a realistic timeline for achieving your training objectives. Consider your current commitments and set achievable deadlines for completing each training module or course. This will help you maintain progress and stay motivated.</p></li><li><p><strong>Allocate Resources</strong>: Determine the resources you need to execute your training plan, including time, money, and materials. Plan how you will allocate these resources effectively to avoid overcommitting or underfunding your development efforts.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZjQo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZjQo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 424w, https://substackcdn.com/image/fetch/$s_!ZjQo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 848w, https://substackcdn.com/image/fetch/$s_!ZjQo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 1272w, https://substackcdn.com/image/fetch/$s_!ZjQo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZjQo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png" width="1145" height="179" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:179,&quot;width&quot;:1145,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Setting Goals&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Setting Goals" title="Setting Goals" srcset="https://substackcdn.com/image/fetch/$s_!ZjQo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 424w, https://substackcdn.com/image/fetch/$s_!ZjQo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 848w, https://substackcdn.com/image/fetch/$s_!ZjQo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 1272w, https://substackcdn.com/image/fetch/$s_!ZjQo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F088e1946-c681-426d-9aa8-1a1dbf3f99da_1145x179.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Image 3 - A simple training plan</figcaption></figure></div><h3><strong>Step 5 - Prepare a Portfolio with MCSI Exercises</strong></h3><blockquote><p>&#8220;The portfolio is the critical step that almost everyone overlooks, leading to the common mistake of sending template CVs that fail to resonate with specific job postings. A tailored portfolio, in contrast, vividly demonstrates your skills and experiences in relation to the job's requirements, setting you apart in the competitive job market.&#8221; Benjamin Moss&#233;</p></blockquote><p>Building a portfolio through Moss&#233; Cyber Security Institute (MCSI) exercises is a strategic approach to showcasing your cybersecurity competencies. MCSI's training emphasizes hands-on, real-world tasks, challenging you to apply critical thinking and troubleshooting skills without predefined solutions. Here&#8217;s how you can leverage MCSI's offerings to build a compelling portfolio:</p><ol><li><p><strong>Complete Practical Exercises</strong>: Engage in MCSI&#8217;s practical exercises that mirror real-world scenarios - select the most relevant exercises.</p></li><li><p><strong>Demonstrate Competencies</strong>: Successfully completing MCSI exercises allows you to accumulate certificates and build a portfolio of demonstrated skills by producing videos, reports, briefings, source code etc. This portfolio serves as tangible evidence of your capabilities and readiness to tackle the jobs you want to apply for.</p></li></ol><h3><strong>Step 6 - Show Up Prepared</strong></h3><p>In the final step, arrive at interviews ready to demonstrate that you can meet the job's demands. Bring a well-crafted portfolio that showcases your direct experience with the work KSATs outlined in the job description. This portfolio is your evidence, making abstract skills concrete and demonstrating your proactive approach to learning and problem-solving.</p><p>Moreover, prepare to discuss any gaps in your experience with a clear training plan that shows your initiative to develop those areas. This step is crucial; many overlook the power of a personalized portfolio and a strategic training plan, relying instead on generic CVs that fail to capture their unique fit for the role. Being prepared in this way will set you apart and make a strong case for your candidacy.</p><p>If you haven&#8217;t started learning with MCSI yet, pick up a <a href="https://www.mosse-institute.com/certifications.html">course</a> and get going.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!43xn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!43xn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 424w, https://substackcdn.com/image/fetch/$s_!43xn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 848w, https://substackcdn.com/image/fetch/$s_!43xn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 1272w, https://substackcdn.com/image/fetch/$s_!43xn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!43xn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png" width="508" height="641.35" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/583b27e0-8762-47b9-a59b-7804821361a4_720x909.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:909,&quot;width&quot;:720,&quot;resizeWidth&quot;:508,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!43xn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 424w, https://substackcdn.com/image/fetch/$s_!43xn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 848w, https://substackcdn.com/image/fetch/$s_!43xn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 1272w, https://substackcdn.com/image/fetch/$s_!43xn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F583b27e0-8762-47b9-a59b-7804821361a4_720x909.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #025 - So you want to become a CISO?]]></title><description><![CDATA[50% of cyber professionals want to become CISOs. What?!]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-025-so-you-want-to-become-a</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-025-so-you-want-to-become-a</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 26 Mar 2024 22:00:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-JPh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The role of a Chief Information Security Officer (CISO) is multifaceted and challenging. Understanding the nuances of this position is crucial for anyone aspiring to step into this critical role. Here's what you need to know about becoming a CISO.</p><h3><strong>The Many Faces of a CISO</strong></h3><blockquote><p>&#8220;Incompatibility between CISOs and their companies can lead to stress, frustration, burnout and rapid turnover. Identify your CISO style to target the ideal role and environment for you.&#8221; - Alissa Irei, TechRadar (<a href="https://www.techtarget.com/searchsecurity/feature/Which-type-of-CISO-are-you-Company-fit-matters">source</a>)</p></blockquote><p>Did you know there could be as many as 6 different types of CISOs? From technical experts to strategic visionaries, the range is vast. Identifying which type aligns with your skills and aspirations is paramount. Make sure to understand the specific demands of each type to avoid landing in a role that doesn't suit you.</p><ol><li><p>Transformational CISO</p></li><li><p>Post-breach CISO</p></li><li><p>Tactical and operational expert CISO</p></li><li><p>Compliance and risk guru CISO</p></li><li><p>Steady-state CISO</p></li><li><p>Customer-facing evangelist CISO</p></li></ol><h3><strong>The Vast Scope of Responsibilities</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-JPh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-JPh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-JPh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-JPh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-JPh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-JPh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg" width="1344" height="1008" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1008,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-JPh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-JPh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-JPh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-JPh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f924f5-2f9b-4985-86c5-b21f0f14c4ca_1344x1008.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 1 - CISO Responsibilities (<a href="https://www.linkedin.com/feed/update/urn:li:ugcPost:6524239295631499264/">Source</a>)</figcaption></figure></div><p>The CISO bears a vast range of responsibilities, from developing and executing a comprehensive cybersecurity strategy to ensuring regulatory compliance and leading incident response. This role also involves securing organizational assets, managing a dedicated security team, and integrating cybersecurity into all business operations. With a duty to bridge technical and business realms, the CISO's role is critical and wide-ranging, affecting every aspect of an organization's security posture.</p><h3><strong>The Budget War</strong></h3><blockquote><p>&#8220;They reallocated my budget to buy iPads&#8221; - A friend that once was a CISO</p></blockquote><p>Many CISOs find themselves in a constant struggle for resources. Despite the title, they often don't have the authority to secure the budgets necessary for implementing critical security controls or expanding their teams. This limitation can significantly impact the effectiveness of the organization's security posture.</p><h3><strong>The Scapegoat Scenario</strong></h3><div class="pullquote"><p>&#8220;I have one piece of advice for you. Whenever you face a breach, open each envelope in turn.&#8221;<br>Envelop 1. Blame your predecessor<br>Envelop 2. Blame your team<br>Envelop 3. Prepare three envelopes</p></div><p>Being a CISO can sometimes feel thankless. Without major security incidents, their work goes unnoticed, but when a breach occurs, they are often the first to be blamed. This aspect of the role can be particularly challenging, as it requires maintaining robust security measures while being prepared to take responsibility for any lapses.</p><h3><strong>Navigating the Political Landscape</strong></h3><blockquote><p>&#8220;Bureaucracy is a construction by which a person is conveniently separated from the consequences of his or her actions.&#8221; Nassim Taleb</p></blockquote><p>A CISO&#8217;s role is deeply entwined with organizational politics. Reporting structures can vary, with some CISOs answering to the CIO and others directly to the board. Their success depends heavily on their ability to influence other departments and navigate conflicting agendas, making it a highly political role.</p><p>Here are three questions you can ask yourself to assess whether you&#8217;re ready to be a CISO:</p><ol><li><p>Am I capable of navigating corporate politics to advance security priorities?</p></li><li><p>Can I manage relationships with stakeholders who have competing interests?</p></li><li><p>How prepared am I to tackle the ethical and political challenges of being a CISO?</p></li></ol><h3><strong>Ethical Dilemmas</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zAfS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zAfS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 424w, https://substackcdn.com/image/fetch/$s_!zAfS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 848w, https://substackcdn.com/image/fetch/$s_!zAfS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 1272w, https://substackcdn.com/image/fetch/$s_!zAfS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zAfS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png" width="946" height="195" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:195,&quot;width&quot;:946,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cyber risk management strategies for dark risk management.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cyber risk management strategies for dark risk management." title="Cyber risk management strategies for dark risk management." srcset="https://substackcdn.com/image/fetch/$s_!zAfS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 424w, https://substackcdn.com/image/fetch/$s_!zAfS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 848w, https://substackcdn.com/image/fetch/$s_!zAfS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 1272w, https://substackcdn.com/image/fetch/$s_!zAfS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F452504f8-8766-4f9b-88a7-8d26b6fe5c96_946x195.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><blockquote><p>&#8220;How do some organizations meet their cyber obligations and expectations whilst avoiding the high cost of cyber security? They use two business instruments that we call Dark Compliance and Dark Risk Management.&#8221; Benjamin Moss&#233;, <a href="https://www.mosse-security.com/2019/08/13/legal-weapons-of-mass-cyber-destruction.html">Legal Weapons of Mass Destruction</a></p></blockquote><p>Alarmingly, some CISOs are pressured into unethical practices, such as downplaying security incidents or vulnerabilities to save costs or effort. This situation places CISOs in a precarious position, balancing between corporate expectations and ethical standards in cybersecurity management.</p><h3>Benjamin&#8217;s Advice</h3><p>Achieving the pinnacle title in cybersecurity is an admirable goal, yet many overlook the immense responsibilities and challenging work environment that come with it. It's essential to stay true to your passion for technology, valuing personal fulfilment over social status. For those aspiring to be CISOs, beginning with "CISO as a Service" can provide practical experience, focusing on real security enhancements. Choose an organization and team that resonate with you.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Active Directory Penetration Testing Bootcamp]]></title><description><![CDATA[Learn how to identify and exploit active directory vulnerabilities.]]></description><link>https://newsletter.mosse-institute.com/p/active-directory-penetration-testing</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/active-directory-penetration-testing</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 25 Mar 2024 22:01:11 GMT</pubDate><content:encoded><![CDATA[<p>Embark on a journey into the dark corners of Active Directory (AD) exploitation with our new and intensive bootcamp, tailored for those looking to master the art of breaching AD environments. This course strips away the defensive layers, focusing purely on exploitation tactics that can be used against Active Directory systems.</p><p>Dive into the architectural nuances of AD, understanding how its components and services interconnect, forming the backbone of enterprise networks. This foundational knowledge sets the stage for exploring vulnerabilities inherent in the AD design.</p><p>You will learn about reconnaissance techniques used to gather intelligence on AD environments, such as enumerating domain controllers, user accounts, and AD schema details. Understanding these elements is crucial for planning targeted attacks.</p><p>The course then advances to sophisticated exploitation methods, including DCSync attacks, where you mimic a domain controller to extract credential secrets from AD, bypassing standard authentication processes. You'll explore how to leverage pass-the-hash attacks to authenticate to network resources using hashed credentials, circumventing the need for plain text passwords.</p><p>Delve into Kerberoasting, exploiting the Kerberos ticket-granting service. The intricate details of Golden Ticket and Silver Ticket attacks will be unpacked, showcasing how to create authentication tickets granting unlimited access to AD resources.</p><p>DCShadow attacks will be a key focus, teaching you how to manipulate AD data and objects stealthily, enabling persistent access and control over AD environments without triggering alerts.</p><p>Throughout the bootcamp, you'll engage in hands-on exercises, applying these exploitation tactics in a controlled setting. You'll use tools like Mimikatz and BloodHound to perform real-world attack simulations, honing your skills in AD exploitation.</p><p>By the end of this bootcamp, you'll have a deep understanding of Active Directory's vulnerabilities and be skilled in exploiting them, equipping you with the knowledge to test and enhance AD security through offensive tactics. This course offers a unique perspective into the attacker's mindset, providing you with the tools and techniques to exploit Active Directory systems effectively.</p><h3><strong>Training Modules</strong></h3><ul><li><p><strong>AD-01: Fundamentals</strong> - 3 exercises</p></li><li><p><strong>AD-02: Network Footprinting</strong> - 3 exercises</p></li><li><p><strong>AD-03: File Based Attacks</strong> - 4 exercises</p></li><li><p><strong>AD-04: Privilege Escalation</strong> - 5 exercises</p></li><li><p><strong>AD-05: Lateral Movement</strong> - 5 exercises</p></li><li><p><strong>AD-06: Post-Compromise and Persistence</strong> - 2 exercises</p></li><li><p><strong>AD-07: Documentation</strong> - 1 exercises</p></li></ul><h3>Solution Videos Included</h3><p>The course includes concise solution videos for each Active Directory exploitation tactic, showcasing step-by-step execution to enhance your learning experience and mastery of AD attacks.</p><h3>Certificate of Completion</h3><p>You will receive a Certificate of Completion when you complete this course.</p><h3>Career Outcomes</h3><p>By completing this bootcamp, you'll be proficient in advanced Active Directory penetration testing techniques. You'll have the knowledge and skills to effectively attack and test AD environments.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.mosse-institute.com/bootcamps/active-directory-penetration-testing.html&quot;,&quot;text&quot;:&quot;Buy Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.mosse-institute.com/bootcamps/active-directory-penetration-testing.html"><span>Buy Now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #024 - Turn cybersecurity skills into big money]]></title><description><![CDATA[How do you make a ton of money in cybersecurity? That's what we'll talk about today.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-024-turn-cybersecurity-skills</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-024-turn-cybersecurity-skills</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 19 Mar 2024 22:00:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oeN7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to our latest issue, where we delve into the potent formula that ties accountability, skills, and leverage to financial success in the cybersecurity realm. In this edition, we'll explore how enhancing accountability can directly boost your revenue, why advancing your skills reduces risks and increases earnings, and how leveraging your assets and expertise maximizes your financial potential. Join us as we unravel these interconnected pathways to prosperity, demonstrating that in the world of cybersecurity, strategic investments in these areas can lead to substantial monetary rewards.</p><h2>More Responsibility = More Money</h2><p>Accountability leads to higher income because it establishes you as a reliable and essential professional. When you consistently demonstrate accountability, you're showing that you can be trusted to meet commitments and deliver results. This reliability makes you invaluable to your team or organization, leading to better job security, opportunities for advancement, and higher salary offers. In essence, being accountable makes you stand out as a professional who adds significant value, and this is often rewarded with greater financial compensation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oeN7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oeN7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 424w, https://substackcdn.com/image/fetch/$s_!oeN7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 848w, https://substackcdn.com/image/fetch/$s_!oeN7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 1272w, https://substackcdn.com/image/fetch/$s_!oeN7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oeN7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png" width="918" height="995" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:995,&quot;width&quot;:918,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:101573,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oeN7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 424w, https://substackcdn.com/image/fetch/$s_!oeN7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 848w, https://substackcdn.com/image/fetch/$s_!oeN7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 1272w, https://substackcdn.com/image/fetch/$s_!oeN7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F340cd3d9-63cd-4650-8b06-2620d177221b_918x995.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 1 - A simplified model for understanding accountability in relation to earnings</figcaption></figure></div><h2>More Skills = More Money</h2><p>Enhancing your skills in cybersecurity means you bring more value to your role, leading directly to higher income. As you develop a broader range of skills, you become more versatile and capable of handling diverse responsibilities, making you an indispensable part of the team. This increased capability and versatility mean you can take on more significant projects and roles, which naturally come with better pay. Essentially, the more skilled you are, the more you can contribute to your organization's success, and this contribution is often rewarded with increased financial compensation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qvKy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qvKy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 424w, https://substackcdn.com/image/fetch/$s_!qvKy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 848w, https://substackcdn.com/image/fetch/$s_!qvKy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 1272w, https://substackcdn.com/image/fetch/$s_!qvKy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qvKy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png" width="915" height="369" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:369,&quot;width&quot;:915,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50824,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qvKy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 424w, https://substackcdn.com/image/fetch/$s_!qvKy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 848w, https://substackcdn.com/image/fetch/$s_!qvKy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 1272w, https://substackcdn.com/image/fetch/$s_!qvKy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fbbdfb8-99d6-4625-a706-1af2553bc515_915x369.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image 2 - A simplified model for understanding how skills relate to earnings</figcaption></figure></div><h2>More Leverage = More Money</h2><blockquote><p>&#8220;<em>We live in an age of infinite leverage, and the economic rewards for genuine intellectual curiosity have never been higher.</em>&#8221; - Naval Ravikant</p></blockquote><p>Gaining more leverage in cybersecurity equates to having greater influence and control over your career and income. Leverage can come from various sources, such as your reputation, expertise, network, or the critical role you play in your organization. When you have leverage, you have the power to negotiate better terms for your job, whether it&#8217;s a higher salary, better benefits, or more favorable working conditions. Essentially, the more leverage you have, the more you can dictate your financial terms, leading to increased earnings. This is because you're in a position to offer something valuable that your employer or clients want to retain, giving you an advantage in financial negotiations.</p><p>Here are some examples of leverage:</p><ul><li><p>&#8220;I have a good reputation&#8221;</p></li><li><p>&#8220;I have a network of high-value employers&#8221;</p></li><li><p>&#8220;I&#8217;m capable of building products&#8221;</p></li><li><p>&#8220;I own a database of people with cyber skills&#8221;</p></li><li><p>&#8220;I have an online product that makes money whilst I sleep&#8221;</p></li><li><p>&#8220;I have money invested that makes money whilst I sleep&#8221;</p></li><li><p>&#8220;I own a podcast that brings me opportunities&#8221;</p></li><li><p>&#8220;I have a rolodex of customers that I can call and do deals with&#8221;</p></li></ul><h2>The MCSI Vision</h2><p>MCSI is committed to becoming a platform that not only teaches the technical aspects of cybersecurity but also focuses on developing accountability, enhancing skills, and building leverage for its learners. By emphasizing these three critical areas, MCSI aims to empower individuals to advance their careers and achieve greater financial success in the cybersecurity field. Through comprehensive training and practical experience, MCSI provides the tools and knowledge necessary to navigate the complexities of cybersecurity, ensuring that learners are not just prepared to meet the demands of the industry but also to excel in it and reap the financial rewards that come with increased accountability, improved skills, and greater leverage.</p><p>Try out one of our <a href="https://www.mosse-institute.com/certifications.html">courses</a> if you haven&#8217;t already!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[MCSI #023 - The State of Cyber Skills in 2024]]></title><description><![CDATA[The shift towards task-based competencies over theoretical knowledge has reshaped the cybersecurity landscape.]]></description><link>https://newsletter.mosse-institute.com/p/mcsi-023-the-state-of-cyber-skills</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/mcsi-023-the-state-of-cyber-skills</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Tue, 12 Mar 2024 22:00:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5ATY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5ATY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5ATY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 424w, https://substackcdn.com/image/fetch/$s_!5ATY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 848w, https://substackcdn.com/image/fetch/$s_!5ATY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 1272w, https://substackcdn.com/image/fetch/$s_!5ATY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5ATY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png" width="1240" height="760" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:760,&quot;width&quot;:1240,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5ATY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 424w, https://substackcdn.com/image/fetch/$s_!5ATY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 848w, https://substackcdn.com/image/fetch/$s_!5ATY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 1272w, https://substackcdn.com/image/fetch/$s_!5ATY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3406b60-0fb4-4dd0-9cfa-1a8bd7e77bd2_1240x760.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A summary of the NIST NICE framework approach</figcaption></figure></div><p>The shift towards task-based competencies over theoretical knowledge has reshaped the cybersecurity landscape. Initiatives like the DCWF and NIST NICE underscore this transition, emphasizing the importance of practical skills. MCSI's platform aligns with this trend, offering exercises designed to build real-world capabilities, urging users to prioritize skills development through hands-on experience.</p><h2><strong>Critical Thinking: A Core Competency</strong></h2><p>Critical thinking stands out as a fundamental requirement in cybersecurity. Enterprises and government organizations demand professionals capable of solving complex issues independently and connecting solutions to strategic objectives.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gAKo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gAKo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 424w, https://substackcdn.com/image/fetch/$s_!gAKo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 848w, https://substackcdn.com/image/fetch/$s_!gAKo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 1272w, https://substackcdn.com/image/fetch/$s_!gAKo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gAKo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png" width="1456" height="1541" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1541,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:400382,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gAKo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 424w, https://substackcdn.com/image/fetch/$s_!gAKo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 848w, https://substackcdn.com/image/fetch/$s_!gAKo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 1272w, https://substackcdn.com/image/fetch/$s_!gAKo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c6c5263-73e8-4f79-98e6-19e6320750ce_2084x2205.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Example of a MCSI exercise that develops critical thinking skills</figcaption></figure></div><p>MCSI&#8217;s training modules are crafted to foster deep analytical skills and independent problem-solving, providing exercises that challenge and enhance critical thinking in cyber-related contexts.</p><h2><strong>The Imperative of Professional Writing</strong></h2><p>Despite AI's rise, professional writing retains its significance. Cyber professionals must master the art of creating various documents, integrating analytical thought with clear communication.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B1cp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B1cp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 424w, https://substackcdn.com/image/fetch/$s_!B1cp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 848w, https://substackcdn.com/image/fetch/$s_!B1cp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 1272w, https://substackcdn.com/image/fetch/$s_!B1cp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B1cp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png" width="1456" height="4434" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4434,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1451689,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B1cp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 424w, https://substackcdn.com/image/fetch/$s_!B1cp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 848w, https://substackcdn.com/image/fetch/$s_!B1cp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 1272w, https://substackcdn.com/image/fetch/$s_!B1cp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca788c64-74d0-486b-a905-54024cdf014f_2101x6398.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Example of a MCSI report writing exercise</figcaption></figure></div><p>MCSI&#8217;s platform offers scenarios that improve writing proficiency, emphasizing the creation of professional documentation that reflects deep technical understanding and critical analysis.</p><h2><strong>Deep Technical Expertise Required</strong></h2><p>Technical experience continues to be a cornerstone of cybersecurity effectiveness. Organizations seek individuals who can tackle challenging issues across various domains, including operating systems, networking, cloud computing, and malware analysis. Even roles traditionally viewed as less technical, such as leadership and governance, risk, and compliance (GRC), now often require a solid understanding of technical operations.</p><h2><strong>MCSI: A Visionary Approach</strong></h2><p>Anticipating the industry&#8217;s evolution, MCSI crafted a training platform six years ago focused on critical thinking, practical tasks, and independent learning. This foresight has established MCSI as a pioneer in cybersecurity training, offering a comprehensive suite of exercises that simulate real-world scenarios. Our platform encourages extensive practice, adhering to industry standards and specifications, to prepare users for the demands of the modern cybersecurity landscape.</p><p>In summary, the state of cyber skills in 2024 demands a practical, skill-based approach, with a strong emphasis on critical thinking, professional writing, and deep technical experience. MCSI&#8217;s training platform remains at the forefront of this evolution, providing the tools and experiences necessary to thrive in the ever-changing cybersecurity domain.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[We're hiring Cyber Instructors!]]></title><description><![CDATA[Role Overview]]></description><link>https://newsletter.mosse-institute.com/p/were-hiring-cyber-instructors</link><guid isPermaLink="false">https://newsletter.mosse-institute.com/p/were-hiring-cyber-instructors</guid><dc:creator><![CDATA[Benjamin Mossé]]></dc:creator><pubDate>Mon, 08 Jan 2024 22:00:42 GMT</pubDate><content:encoded><![CDATA[<h2><strong>Role Overview</strong></h2><p>The Cyber Instructor at our institution is responsible for developing and conducting training and education programs within the cyber domain. This role is pivotal in preparing personnel to tackle complex cyber challenges effectively.</p><h2><strong>Non-Negotiable Requirements</strong></h2><ul><li><p>Must be a US Citizen</p></li><li><p>Must have an active SECRET or TOP SECRET security clearance</p></li><li><p>Information Assurance Technical (IAM) Level III</p></li><li><p>Must be compliant with DDoD 8140 Cyber Instructor Work Role (Core KSATs)</p></li><li><p>Associate's degree in Computer Science, Information Systems or related field</p></li><li><p>10+ years of IT experience</p></li></ul><h2><strong>Core Responsibilities</strong></h2><ul><li><p>Develop and execute technical cybersecurity training programs and curricula</p></li><li><p>Conduct interactive training exercises and deliver training courses in both physical and virtual environments</p></li><li><p>Contribute to refining training curriculum to align with cybersecurity education goals</p></li><li><p>Evaluate student exercises on the platform for learning effectiveness</p></li><li><p>Assist customers adopt our cyber workforce development solution</p></li><li><p>Create and deliver reports, briefings, and presentations to stakeholders</p></li></ul><h2><strong>Core KSATs</strong></h2><ul><li><p>Knowledge of computer networking concepts and protocols, and network security methodologies</p></li><li><p>Knowledge of risk management processes</p></li><li><p>Skill in developing and executing technical training programs and curricula</p></li><li><p>Ensure training meets the goals and objectives for cybersecurity training, education, or awareness</p></li><li><p>Knowledge of emerging security issues, risks, and vulnerabilities</p></li><li><p>Knowledge of cybersecurity principles</p></li><li><p>Knowledge of cyber threats and vulnerabilities</p></li><li><p>Knowledge of specific operational impacts of cybersecurity lapses</p></li></ul><h2><strong>Attributes</strong></h2><ul><li><p>Excellent verbal and written English communication</p></li><li><p>Professional demeanour and appearance</p></li><li><p>Prioritize tasks as directed</p></li><li><p>Punctuality - at work, calls and any other meetings</p></li></ul><h2><strong>Qualities</strong></h2><p>Beyond his or her technical skills, the successful applicant should first and foremost be someone who is personable and good-natured, neatly presentable, and efficient. Strong communication skills, both verbal and written, as well as interpersonal skills be considered as best matches with the culture and environment of the Company. The candidate's work ethics should include dedication and conscientious awareness and focus to deliver the best outcomes.</p><h2><strong>Inquiries</strong></h2><p>To apply to work with MCSI, please email your curriculum vitae and contact details to <a href="mailto:jobs@mosse-institute.com">jobs@mosse-institute.com</a>.</p><h2>Other Open Roles</h2><p><strong>Sales and Marketing</strong></p><ul><li><p><a href="https://www.mosse-institute.com/company/careers/digital-marketing-manager.html">Digital Marketing Manager</a></p></li></ul><p><strong>Cybersecurity Instructors</strong></p><ul><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-ai-ml-specialist.html">Content Developer - AI/ML Specialist</a></p></li><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-application-security.html">Content Developer - Application Security</a></p></li><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-cloud-security.html">Content Developer - Cloud Security</a></p></li><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-devsecops.html">Content Developer - DevSecOps</a></p></li><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-cyber-threat-intelligence.html">Content Developer - Threat Intelligence</a></p></li><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-threat-hunting.html">Content Developer - Threat Hunting</a></p></li><li><p><a href="https://www.mosse-institute.com/company/careers/content-developer-vulnerability-research-and-exploitation.html">Content Developer - Vulnerability Research and Exploitation</a></p></li></ul><p><strong>Think Tank</strong></p><ul><li><p><a href="https://www.mosse-institute.com/company/careers/cybersecurity-policy-analyst.html">Cybersecurity Policy Analyst</a></p></li></ul><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.mosse-institute.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Moss&#233; Cyber Security Institute Newsletter! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>