Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

5 minutes with David Bradbury - Hiring globally to prevent security burnout

By Maria Henriquez
5_minutes_with_Bradbury_1021_900px.jpg
September 24, 2021

Seventy-seven percent of U.S. corporate employees have experienced burnout at their current job, according to Deloitte's Workplace Burnout Survey. In the same survey, almost 70% of professionals said their employers were not doing enough to prevent or alleviate burnout.


It's no surprise that information security professionals — tasked with preventing hundreds of attacks — also suffer from burnout. In fact, a study found that most burnout-prone technology firms had numbers higher than 70%, and a high percentage of these professionals have considered quitting their jobs due to stress. 


Here, David Bradbury, Chief Security Officer at Okta, who has built an international reputation for leading both cyber and physical security programs, explains how hiring globally can help reduce the burden on security employees that are already overworked.



Security: What is your background? What are your current responsibilities as chief security officer (CSO) at Okta?

Bradbury: I have spent my career leading security teams in my native Australia, the United Kingdom, and the United States at some of the world’s largest banks and software companies, including Barclays and Symantec. Currently, I am the CSO at Okta, where I lead the overall security execution for the organization. My team is responsible for navigating the evolving threat landscape to best protect employees and customers. In addition, I play a role in helping Okta’s users continue to adopt and accelerate Zero Trust security strategies. I was excited to join the Okta team last year. Identity has always been an integral consideration in my previous roles, and I see it as a critical factor in accelerating the growth of all companies. 


Security: Are security teams suffering extreme burnout?

Bradbury: Burnout is a pressing issue — especially for cybersecurity teams. Recorded Future estimate that 65,000 ransomware attacks occurred last year just as a huge portion of our workforce transitioned to remote work. Other studies suggest that 51% of cybersecurity professionals have experienced extreme stress burnout over the last 12 months, and 65% said they have even considered leaving their jobs. Data from the use of the Okta platform shows that among users, there has been a 5-7% increase in logins between 10 p.m. and 6 a.m. The data paints a clear picture of a profession needing clear solutions and protocols to reduce some of the intense stress practitioners face. On a more macro level, the race for talent and the volume of unfilled cybersecurity jobs exacerbates that burnout and leaves businesses and organizations more vulnerable to attacks. President Biden recently cited cybersecurity as a ‘core national security challenge,’ so sourcing, training and retaining cybersecurity professionals is poised to continue as a top priority for the tech industry. 


Security: How can hiring globally help alleviate some burnout?

Bradbury: Considering both the risks of burnout and the hiring challenges we face in cybersecurity, it’s important to look beyond traditional approaches to recruitment and seek out pockets of talent that have been underutilized. One of the handfuls of approaches that have worked well for Okta is hiring globally, as that expands the available talent pool and brings in diverse perspectives and skillsets that can tackle the increasingly nuanced and complex attacks we’re seeing emerge. Attackers don’t honor U.S. working hours, so it’s wise to employ detection and response teams that span every time zone. Timely handoffs ensure that these operational teams are fully functioning around the clock. It also ensures that people don’t feel like they are working alone on complex issues. 


So, for example, a complex event that requires an immediate response halfway through the working day in APAC might be handed off to colleagues in Europe that evening and onto teams on either side of the U.S. This fosters some operational discipline around documenting and presenting findings to others, and the whole process benefits from the unique skills and experience of everyone involved. Problems are addressed collectively rather than in isolation.


Security: How can hiring globally, in general, give security teams a leg up?

Bradbury: By shifting away from hiring in one or two core locations, we’ve been able to tap into a broader set of backgrounds and perspectives on what good security looks like. Taking a remote-first approach to workforce planning allows us to hire the best people, no matter where they live, which has boosted our ranks with a wealth of talent and enthusiasm. It’s helped us connect with communities of talented security professionals from Australia, Canada, Argentina, Germany and Sweden, to name a few. Strong security talent can choose where they want to work: very often, the deciding factor is knowing that other capable practitioners are already employed there. This leads to a “clustering effect” in multiple regions.  


Security: From your own experience in leading global teams, what tips do you have on avoiding job burnout?

Bradbury: There are a few things I try to keep in mind to avoid burnout and keep the team functioning at their highest level: 

■            Strategic Alignment: Be transparent with staff about overarching strategy, so your team feels a shared sense of purpose and can link their individual work to larger organizational priorities.

■            Recognition: Schedule a time and make a concerted effort to recognize the efforts of team members, whether they be great outcomes or even just demonstrations of positive behaviors. Everyone needs and wants to know that their contributions are valued. In security, it’s often difficult to fully appreciate the impacts you are making: we don’t tend to celebrate the absence of an incident or a vulnerability or how much faster or effectively we’re handling them. We need to be proactive about it.

■            Listen and Learn:

  1. Take an anonymous pulse on how staff feel about their work and address what’s in your power to change as earnestly as possible.
  2. Remember that burnout can be attributed to things as varied as the stress associated with lockdowns, the frequency of high-impact security events and competing interests between businesses and stakeholders.
  3. Make sure you have a good understanding of what’s causing stress before you take steps to address it. 


KEYWORDS: burnout cyber security risk management security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC_Web_5Minutes-Mahdi-0922_1170x658.jpg

    5 minutes with David Mahdi — Establishing digital trust with identity-first security

    See More
  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • 5 mins with Dr. Brumley

    5 minutes with Dr. David Brumley - Capture the Flag cybersecurity competitions and how to get started

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!