Mentor At Scale | A Conversation With Helen Patton

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=uO0FBgr98rY



Duration: 35:29
24 views
1


Helen Patton joins Tech Done Different to provide insights from her new book and explain the Cybersecurity Canon, a collection of books to help security professionals.

As an advisory CISO and published author, Helen Patton advocates for how to get people into the security industry, and how to navigate a career in the field. She joins Tech Done Different to provide insights from her new book and explain the Cybersecurity Canon, a collection of books to help security professionals.

You'll learn:

-why writing a book enables you to "mentor at scale"
-why we should hire based on potential, not demonstrated experience
-why recruiting for security should include going to middle and high schools
-why self care is so important in a security career
-why you need to understand your "why"
-why security is a business enabler

________________________________

Guest
Helen Patton
On Linkedin | https://www.linkedin.com/in/helenpatton/
On Twitter | https://twitter.com/CisoHelen
________________________________


Host
Ted Harrington
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington

________________________________

This Episode’s Sponsors

CrowdSec 👉 https://itspm.ag/crowdsec-b1vp

________________________________

Resources

Learn more about Helen at https://www.cisohelen.com/

Book: Navigating the Cybersecurity Career Path: https://www.amazon.com/Navigating-Cybersecurity-Career-Path-Insider/dp/1119833426/

________________________________

For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcast

Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships




Other Videos By ITSPmagazine


2022-06-02Make Others Great | A Conversation With Chief Information Security Office (CISO) David Cross
2022-06-02Lessons From Secret Service | A Conversation With Former Special Agent, John Toney
2022-06-02Building An Iconic Business | A Conversation With Entrepreneur And Author, Richard Thalheimer
2022-06-02Starting With Security | A Conversation With Author Of Designing Secure Software, Loren Kohnfelder
2022-06-02Researchers Are Your Friends | A Conversation With Jay Balan
2022-06-02Building Better Workplaces | A Conversation With Chloé Messdaghi
2022-06-02The Machines Won't Kill Us | A Conversation With Ria Cheruvu
2022-06-02Lead With Positive Effects | A Conversation With April Sabral
2022-06-02Build Allies | A Conversation With Shamane Tan
2022-06-02What Is A Hacker | A Conversation With John Hammond
2022-06-02Mentor At Scale | A Conversation With Helen Patton
2022-06-02Coming From Immigrant Families | A Conversation With Sabreet Kang Rajeev
2022-06-02Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Theresa M Payton | Episode 12
2022-06-01Security Success Story | A Conversation With Rashid Ahmed
2022-06-01Throw Out The Manual | A Conversation With Ken Pyle
2022-06-01Selling A Security Company | A Conversation With Terry Dunlap
2022-06-01Tie Habits To Goals | A Conversation With Deshawn Jackson, CISSP
2022-06-01Privacy, Security & The Business | A Conversation With Sarah Robinson
2022-06-01Bridging Digital To Physical | A Conversation With Luther Miller
2022-05-31"The People Hacker," renowned Jenny Radcliffe gives the insider's perspective on social engineering
2022-05-31Success is Just the Beginning | A Conversation With Joy Mangano