Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

Enterprise Services

Security’s New Year’s Resolution: Building Up the Next Generation

The security industry can kick off 2026 the right way by investing in new talent.

By Jordyn Alger, Managing Editor
Change concepts with yellow paper airplane leading among white
phototechno / DigitalVision Vectors via Getty Images
January 15, 2026

New years are for new beginnings. While it may seem cliché, the sentiment rings true for many, especially those seeking to shift their career direction or join the workforce for the first time.

When new talent joins any field, the learning curve can be a challenge — and in the case of the security industry — intense. Working in security can be a demanding experience, and when someone is new to the profession, it can be overwhelming. This is where seasoned professionals can help.

“So much of the industry is based on experience and not education. You can learn all the lessons yourself, but it will take a lot longer,” explains Renée Burton, Vice President of Threat Intelligence at Infoblox. Learning from people who have seen enough things to have a strong intuition can help you be better and faster. In part, this is because the field is always changing. As bad actors constantly improve their techniques, the defenders must respond. Having mentors of all types who can support you in building those base skills helps a lot.”

Building the Next Generation

Robb Reck, Chief Information, Trust and Security Officer at Pax8, began his career at Electronic Arts, where he helped people “bring their video games to life.” The role eventually led him into corporate IT positions, then positions with systems engineering, networking and cybersecurity focuses.

Reck reflects on the role that mentorship played in his career, stating, “I’ve been fortunate to have had a series of role models throughout my career. In my first internal IT role, I had an incredible director who took the time to explain to me what kinds of skills were valuable both for my company and for the larger industry. His mentorship gave me confidence that I could pick my head up from the constant focus on break-fix work and take my career into my own hands, through training and focused development.

About five years later, when Reck was running his first security program, he says the IT VP helped him see the bigger picture and how his program could directly impact the company’s future.

“At the same time my wife and I were having our first children, and this boss was intentional about showing me how to balance work and personal life and be successful at both,” Reck recalls. “His lessons helped me become a better employee, husband and father.”

A decade later, Reck stepped in as the first CISO for Ping Identity.

“Our CEO and founder was one of the most thoughtful and caring people I have had the chance to work with,” he says. “Seeing how he balances tough trade-offs between organizational success and caring for individuals has built a huge part of my own leadership philosophy. Not only did I get to learn from him by watching, but he was also intentional in providing me with timely, thoughtful, and kind feedback while we worked together. I vividly remember blowing it at an executive meeting and not showing up as my best. After that, he set aside time with me to understand what had happened and provide guidance on how to be successful in the future.”

In this industry, support goes a long way. Whether guiding someone through technical expertise, boardroom meetings, or the complexities of work-life balance, more seasoned professionals can offer a helping hand to new talent, helping them to bridge gaps that may seem insurmountable to them.


Rene Burton
Renée Burton is Vice President of Threat Intelligence at Infoblox. Image courtesy of Burton
Anmol Agarwal
Dr. Anmol Agarwal is Senior Security Researcher at Nokia. Image courtesy of Agarwal
Scott McHugh
Scott McHugh is Program Executive at the Institute for Homeland Security at Sam Houston State University. Image courtesy of McHugh
Robb Reck
Robb Reck is Chief Information, Trust and Security Officer at Pax8. Image courtesy of Reck

As leaders, we have to offer opportunities to the next generation. For people coming up in the field, you have to take advantage of those opportunities.

Scott McHugh, Program Executive at the Institute for Homeland Security at Sam Houston State University, shares what he has seen from a mentor who had gone “beyond just the mentorship of having a cup of coffee and talking about how things are going.”

“This mentor took steps with his mentees that were very practical, very positive, and put the spotlight on that mentee and encourage them to go beyond their comfort zone,” McHugh describes. “He pushed them to go beyond their normal in a way that enabled them to gain confidence, experience, and knowledge as to how to be a strategic business executive who uses security to solve business problems. That type of commitment will create the next generation that is so crucial for our profession going forward.”

As powerful of a tool as mentorship is, security leaders can’t build up every single individual that comes across their path. There simply isn’t enough time, and stretching yourself thin to try and guide as many people as possible won’t help anyone in the long run. Ultimately, it is about allowing those mentorship relationships to develop organically — and to provide guidance to those who are willing to accept it.

“I look for people who are excited to ‘hunt’ criminals in data, and then try to nourish that excitement,” Burton shares. “As leaders, we have to offer opportunities to the next generation. For people coming up in the field, you have to take advantage of those opportunities.”

Retaining the Next Generation

Building up new talent in the industry is crucial, but it means nothing if that talent can’t be retained. Retention in the security industry can be a challenge, with burnout often cited as a main concern.

“We’ve seen this happen in the security industry,” says Dr. Anmol Agarwal, Senior Security Researcher at Nokia. “It has been studied that women, for example, leave the industry after some time. In particular, women that want to move into leadership roles face an uphill battle.”  

New talent may struggle to adjust to the security industry, especially if they struggle with an “uphill battle.” While these challenges may never fully disappear, they can be better managed with help from professionals who have already walked the path — and succeeded.

“The industry should ensure that management has strategies in place for talent retention,” Dr. Agarwal asserts. “Professionals should have access to communities where they can obtain support and share their challenges. For example, when women want to move into leadership, there should be a pathway for them to get into the C-Suite. Leadership should set advancement metrics and ensure that these metrics are inclusive and provide opportunities to those who want to be in leadership.”

As we welcome in another year, now is the perfect time to reflect on how security is changing and what direction it is headed. Leaders of the industry can choose the direction by spearheading innovative initiatives and tackling emerging threats — but to leave a truly lasting impact, cultivating the next generation of leaders is a must.

KEYWORDS: mentor security career security career training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Rendered heart monitors

Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs

Smiling officer

What Can Security Leaders Learn From Prevented University Attack?

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Overcoming Silos

    Building Bridges: Overcoming Silos to Bring Organizations to the Next Level

    See More
  • Broken glass

    Security leaders discuss the new vulnerability added to CISA’s catalog

    See More
  • New Technology, New Training: The Next Generation of Security Officers Has an Important Role to Play

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing