Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Jay Leaf-Clark - Getting started in cybersecurity

By Maria Henriquez
5 mins with Leaf-Clark
March 24, 2021

Have you considered a career as a cybersecurity professional, but weren't really sure if you had the right degree or skillset needed for success? Here, Jay Leaf-Clark, Head of IT at Dashlane, walks you through how to get started in cybersecurity. 

 

Security: What is your background and current responsibilities at Dashlane?

Leaf-Clark: I’ve been a solutions-orientated IT leader for over 16 years, developing and implementing technical solutions to tackle aging and underutilized processes, internal platforms, and technical personnel. My goal is to take an IT department and make it resilient, cutting-edge, user-friendly, and efficient.

Outside of the typical day to day, as an IT department at Dashlane, we have a defined roadmap for the calendar year which we carry out in sections each quarter in the hopes of replacing, rebuilding, and bolstering our current operations so we are always ahead of the game. The biggest part of my job is staying up to date on the latest threats, trends, and solutions the industry has identified for leaders such as myself, and making sure we don’t find ourselves behind the curve when it counts. 

 

Security: Let’s discuss getting started in a career in cybersecurity. Are there degree programs that can prepare individuals for cybersecurity jobs right off the bat?

Leaf-Clark: A good degree in IT or Cybersecurity is a great place to start to build a solid foundation of knowledge, but nowadays there are even more avenues to get experience that are much quicker and more affordable. I got my first two  IT security certifications at 16 years old and it was those certificates which landed me my first job at a company while I completed my  Bachelor of Science in Information Technology. 

Though a degree in Computer Science is obviously a good degree to have, these days, to get a job right off the bat companies are looking for applicants who have practical skills they can implement. So, it's not just what you know, but what you can do!

If you’re looking to get into security, make sure you have a basic understanding of the common types of infrastructure you will support, and try to become as well versed in them as you can (many tools offer free training). A free coding bootcamp also never hurts!

 

Security: Does an individual need a cybersecurity or computer science degree to get started?

Leaf-Clark: Though I am not entirely convinced certifications are direct indicators that a prospective candidate is qualified to perform a job, typically when looking for a security candidate, I like to at least see a foundational level certification mixed with years of experience on their resume. 

Security+, CISSP, and the CISA are all certifications I think are great to illustrate that—at some point in a candidate’s career—they have taken the time to traditionally study and understand the fundamentals of IT security, which hopefully they’ve also built upon with practical experience. 

Depending on the specific needs of the professional I'm hiring, looking at more targeted security certifications that focus on areas like architecture, engineering, management, audit & risk, etc. are also worth looking into. Again, though not entirely required, this would illustrate to me a candidate has both the foundational and industry-specific, comprehensive knowledge of security. 

Outside of security certifications, it is always promising to know a candidate has a fundamental understanding of the other areas within an organization that most certainly must abide by strong security practices. Certifications in networking, project management, and computer management all demonstrate to a hiring manager that you are not only well versed in security, but in the many adjacent areas that still are impacted by security. 

As much as security certifications are welcome, and in some cases, needed to provide the assurance to a hiring manager/leader that you can do the job, nothing beats real life experience. The answers to the problems we as technical professionals face aren’t always as simple as a multiple choice answer or essay question. The right candidate for a role in security is both well versed in security fundamentals and the business operations impacted, but also has the practical experience and interpersonal skills to be a strategic partner and proactive value add to the business. 

 

Security: How can an individual get started in cybersecurity?

Leaf-Clark: While you don’t need that certification, go ahead and get it anyway.

  • If you're just getting your start in security, any organization is going to want to see that you’ve taken some steps to illustrate that you have a solid grasp of the core concepts of cybersecurity.

Have a firm understanding of the various departments within an organization.

  • To be able to effectively evaluate, understand, and address a company’s security needs, you need to have a solid grasp of how it operates, and not just in security.

Interpersonal skills are a NECESSITY. 

  • Being an almighty and powerful security guru isn’t worth much if no one wants to work with you. Polish your skills working alongside non-technical stakeholders, because there will be many. All those acronyms you learned don’t mean much of anything to your CEO, so being able to explain things easily and quickly is important.

Never stop learning.

  • It’s corny, but it’s true, when it comes to security, there is always something new to learn, so it’s best you find an outlet to receive timely security related information on so you don’t fall behind.”

Do it because you love it.

  • Security is a field that continues to grow rapidly and creates space for more cybersecurity professionals to come in and make a career of it (at a pretty decent pay), however, without a passion for it, it can seem pretty dull to most, so make sure you love it.

 

Security: Are there common misconceptions about cybersecurity careers that need to be dispelled?

Leaf-Clark: One misconception is that you will work alone. Interpersonal skills in security are a must. It’s important to have that understanding even though you’re in the “tech department,” you will support all members of a team, no matter their specialty and talk with everyone who needs IT and security support… which is everyone. 

It is also a misconception that larger companies have better cybersecurity protocols and that it’s easier to get large companies to comply. 

For example, Twitter employees and Zoom users actually took the top spots on our annual Worst Password Offenders list in 2020 due to breaches caused by weak and re-used passwords. Large companies don’t always have the best cybersecurity protocols, but it’s imperative for all businesses to immediately put into place a robust process to audit, standardize, and continuously monitor the safety and security of the credentials within their organizations.

KEYWORDS: cyber security information security risk management security degrees

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Dr. Brumley

    5 minutes with Dr. David Brumley - Capture the Flag cybersecurity competitions and how to get started

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More
  • cybersecurity-freepik

    Getting started in cybersecurity – 6 essential skills to consider

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!