Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Love, hate and cybersecurity

By Pavel Gurvich
data-enews
September 3, 2020

I was chatting with a chief information security officer (CISO) recently, and we started talking about motivation and the role of love and hate in driving ourselves towards our goals. In cybersecurity, we tend to think about external opponents, most notably white hats vs. black hats, but rarely discuss the internal factors that guide our day-to-day decisions.

Humans are dynamic beings that aren’t driven solely by love or hate (despite what the chatter on social media may have you believe). We do, however, have predilections based on our personalities and environment. How we choose to deal with those influences shapes who we become. A good strategy is a combination of love and hate where organizations work towards a grand vision of their future while eliminating things they hate one after the other.

 

The craft of cybersecurity

Leaders in general, and CISOs in particular, are sometimes in love with their vision. Typically this is an idealistic view of the world in the future. In many cases this drives long term progress, innovation and sets far ahead goals. 

Cybersecurity leaders driven by love are the craftsmen of our industry. They view their job as a calling that brings meaning and fulfillment to their lives. Generally, these dedicated workers believe they have a deep understanding of how the world works and where they fit into it. When working from a place of love, security pros relish security fundamentals, best practices, and peer feedback to create a strong security posture.

In cybersecurity, an example of a love-based initiative is the zero trust model. Zero trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.

As everyone knows, the only constant in cybersecurity is change, which can be a problem for security leaders. Too often, love drives us to hold onto what’s worked in the past for too long. Or it keeps us blind to small issues until they become full-fledged problems. Love keeps us focused on fixing the process, strategy, or tool that is currently malfunctioning and doesn’t drive us to take the time to evaluate whether a better solution is available. For instance, businesses often spend significant man hours and resources evaluating, buying, and implementing traditional firewalls to protect their organizations, but don’t actually evaluate whether the technology is delivering ROI. Good cybersecurity leaders are highly adaptable and routinely challenge their own assumptions. Security leaders that only execute on love initiatives and drive towards the future with no regard for present limitations inevitably fail.

 

Focus on cybercriminals: Sound strategy or distraction?

Cybersecurity is a pressure-packed industry where the stakes are incredibly high. Data breaches not only cost security leaders their jobs, they also make organizations vulnerable to fines, lawsuits, and other long-term negative effects. This breeds hate – for the attacker. Security pros driven by hate are externally focused, so they are busy educating themselves on new malware, social engineering, and other tactics cybercriminals use to victimize businesses.

The media and threat researchers discover new botnets, techniques, and vulnerabilities every day so playing cat-and-mouse with cybercriminals is a huge undertaking for any business. Rather than focusing on their organizations’ security needs, hate causes security pros to spend resources on issues their organization may or may not face. All security leaders have a healthy amount of paranoia but frequently adjusting an organization’s security posture can cause inefficiencies and distractions within the organization. Security leaders that only work on fixing the things they hate now won’t get very far; instead, they will only optimize the existing state.

 

The Tao of Tesla

Love and hate create a push-pull effect if used correctly by cybersecurity professionals. Someone that I’ve seen harness this dynamic effectively is, ironically, someone not necessarily known for his equilibrium.

Elon Musk is a celebrated serial entrepreneur and founder of, among others, SpaceX. Elon Musk loves the vision of humans becoming an interplanetary species and believes we need to colonize Mars. However, he hates the cost of launching rockets and satellites into Earth’s orbit. Space missions cost billions of dollars and leave significant amounts of trash in the stratosphere. Musk’s hatred of these problems led him to build his reusable ‘Falcon’ rockets that solved both of these issues. By building the cheapest and most effective method of launching vehicles into Earth’s orbit, he can now fund the development of his Star Hopper project that will get his company to Mars. Like Musk, CISOs need to fix the things they hate that are slowing them down now while aiming towards the vision they love.

Security leaders naturally lean towards love or hate. The key to balance is recognizing which category their actions are guided by and make the necessary adjustments. Don’t know which one you fall into? Take a look at where you and your team are spending their time and resources. If the bulk of the organization’s budget is allocated to maintaining the current state of security operations, that indicates a love-based approach. Corporate security strategies that consistently expand to protect against new threats may show that leadership is geared towards hate.

As stated previously, love and hate are not inherently bad by themselves. It’s when a person leans too hard into one or the other that problems can arise. Optimism and cynicism are two sides of the same coin in cybersecurity so balance is critical for security professionals looking for fulfillment and career advancement.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: Chief Information Security Officer (CISO) corporate security cyber security zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pavel gurvich 1

Pavel Gurvich co-founded Guardicore after spending twelve years as a Cyber Security expert in the Israel Defense Forces (IDF), where he started as a programmer and ended up managing 100 engineers at one of the IDF’s top R&D units. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber network

    How to Achieve Cybersecurity with Patience, Love and Bribery

    See More
  • FBI

    FBI releases 2019 hate crime statistics

    See More
  • David Baker — Top Cybersecurity Leaders 2025

    David Baker — Top Cybersecurity Leaders 2025

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing