Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Jay Leaf-Clark - Getting started in cybersecurity

By Maria Henriquez
5 mins with Leaf-Clark
March 24, 2021

Have you considered a career as a cybersecurity professional, but weren't really sure if you had the right degree or skillset needed for success? Here, Jay Leaf-Clark, Head of IT at Dashlane, walks you through how to get started in cybersecurity. 

 

Security: What is your background and current responsibilities at Dashlane?

Leaf-Clark: I’ve been a solutions-orientated IT leader for over 16 years, developing and implementing technical solutions to tackle aging and underutilized processes, internal platforms, and technical personnel. My goal is to take an IT department and make it resilient, cutting-edge, user-friendly, and efficient.

Outside of the typical day to day, as an IT department at Dashlane, we have a defined roadmap for the calendar year which we carry out in sections each quarter in the hopes of replacing, rebuilding, and bolstering our current operations so we are always ahead of the game. The biggest part of my job is staying up to date on the latest threats, trends, and solutions the industry has identified for leaders such as myself, and making sure we don’t find ourselves behind the curve when it counts. 

 

Security: Let’s discuss getting started in a career in cybersecurity. Are there degree programs that can prepare individuals for cybersecurity jobs right off the bat?

Leaf-Clark: A good degree in IT or Cybersecurity is a great place to start to build a solid foundation of knowledge, but nowadays there are even more avenues to get experience that are much quicker and more affordable. I got my first two  IT security certifications at 16 years old and it was those certificates which landed me my first job at a company while I completed my  Bachelor of Science in Information Technology. 

Though a degree in Computer Science is obviously a good degree to have, these days, to get a job right off the bat companies are looking for applicants who have practical skills they can implement. So, it's not just what you know, but what you can do!

If you’re looking to get into security, make sure you have a basic understanding of the common types of infrastructure you will support, and try to become as well versed in them as you can (many tools offer free training). A free coding bootcamp also never hurts!

 

Security: Does an individual need a cybersecurity or computer science degree to get started?

Leaf-Clark: Though I am not entirely convinced certifications are direct indicators that a prospective candidate is qualified to perform a job, typically when looking for a security candidate, I like to at least see a foundational level certification mixed with years of experience on their resume. 

Security+, CISSP, and the CISA are all certifications I think are great to illustrate that—at some point in a candidate’s career—they have taken the time to traditionally study and understand the fundamentals of IT security, which hopefully they’ve also built upon with practical experience. 

Depending on the specific needs of the professional I'm hiring, looking at more targeted security certifications that focus on areas like architecture, engineering, management, audit & risk, etc. are also worth looking into. Again, though not entirely required, this would illustrate to me a candidate has both the foundational and industry-specific, comprehensive knowledge of security. 

Outside of security certifications, it is always promising to know a candidate has a fundamental understanding of the other areas within an organization that most certainly must abide by strong security practices. Certifications in networking, project management, and computer management all demonstrate to a hiring manager that you are not only well versed in security, but in the many adjacent areas that still are impacted by security. 

As much as security certifications are welcome, and in some cases, needed to provide the assurance to a hiring manager/leader that you can do the job, nothing beats real life experience. The answers to the problems we as technical professionals face aren’t always as simple as a multiple choice answer or essay question. The right candidate for a role in security is both well versed in security fundamentals and the business operations impacted, but also has the practical experience and interpersonal skills to be a strategic partner and proactive value add to the business. 

 

Security: How can an individual get started in cybersecurity?

Leaf-Clark: While you don’t need that certification, go ahead and get it anyway.

  • If you're just getting your start in security, any organization is going to want to see that you’ve taken some steps to illustrate that you have a solid grasp of the core concepts of cybersecurity.

Have a firm understanding of the various departments within an organization.

  • To be able to effectively evaluate, understand, and address a company’s security needs, you need to have a solid grasp of how it operates, and not just in security.

Interpersonal skills are a NECESSITY. 

  • Being an almighty and powerful security guru isn’t worth much if no one wants to work with you. Polish your skills working alongside non-technical stakeholders, because there will be many. All those acronyms you learned don’t mean much of anything to your CEO, so being able to explain things easily and quickly is important.

Never stop learning.

  • It’s corny, but it’s true, when it comes to security, there is always something new to learn, so it’s best you find an outlet to receive timely security related information on so you don’t fall behind.”

Do it because you love it.

  • Security is a field that continues to grow rapidly and creates space for more cybersecurity professionals to come in and make a career of it (at a pretty decent pay), however, without a passion for it, it can seem pretty dull to most, so make sure you love it.

 

Security: Are there common misconceptions about cybersecurity careers that need to be dispelled?

Leaf-Clark: One misconception is that you will work alone. Interpersonal skills in security are a must. It’s important to have that understanding even though you’re in the “tech department,” you will support all members of a team, no matter their specialty and talk with everyone who needs IT and security support… which is everyone. 

It is also a misconception that larger companies have better cybersecurity protocols and that it’s easier to get large companies to comply. 

For example, Twitter employees and Zoom users actually took the top spots on our annual Worst Password Offenders list in 2020 due to breaches caused by weak and re-used passwords. Large companies don’t always have the best cybersecurity protocols, but it’s imperative for all businesses to immediately put into place a robust process to audit, standardize, and continuously monitor the safety and security of the credentials within their organizations.

KEYWORDS: cyber security information security risk management security degrees

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Dr. Brumley

    5 minutes with Dr. David Brumley - Capture the Flag cybersecurity competitions and how to get started

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More
  • cybersecurity-freepik

    Getting started in cybersecurity – 6 essential skills to consider

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing