CyberWire Daily - Christian Lees: it's not always textbook. [CTO] [Career Notes]
Episode Date: August 14, 2022Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’...t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyber Wire Network, powered by N2K. and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks
and a $75 million record payout in 2024. These traditional security tools expand your attack
surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools.
It's time to rethink your security. Thank you. Learn more at zscaler.com slash security. it to be is I actually wanted to be a farmer, believe it or not. I'm assuming not many people
on this show say they want to be a farmer, but I guess I was fascinated by kind of like the heavy
equipment and like they all had this very unique use case, but that did not take place. I'm not a You know, as a young person, I actually consider myself to be a bit of a late bloomer.
For example, I did not go to college immediately after graduating from high school.
I actually waited until I was roughly 23 and worked a lot of jobs.
And I quickly realized, I'm like, man, if I'm going to get ahead, I need to go to college.
Of course, like any other freshman, I was like, man, if I'm going to get ahead, I need to go to college.
Of course, like any other freshman, I was not sure what I wanted to do.
I thought I wanted to be in medicine of some sort.
A family friend gave me my first computer in college.
And I was stoked, man.
I'm like, oh, my gosh.
Believe you me, this computer that was given to me is completely outdated.
I believe it's like a 486, you know, DX.
I did not know how to work on it and I could not get it to print.
And so I was forced to ask the person that gave it to me, like, why is it not printing?
You know, and I marveled within like 10 seconds.
He's like, oh, dude, you just got to hit F10.
And I'm like, really?
But it was at that moment where I'm like, oh, this is something good.
I immediately went to computer science and I've never looked back.
I was actually offered a job from IBM Global Services.
And I was like, wow, this is like three times more than I make as a student or four times more living on nothing.
So I was really lucky to go directly into the workforce. and it was, you know, the entry level position. In fact, it was desktop support,
but I loved it. I was so proud from that point. I fully knew that I'm at the bottom, right? I got
to climb and it took me a while to find my way, but I was stoked. Just by pure luck in college, I was introduced to media
outlets and I knew that I wanted to work towards information security. So I put in my time. I
worked and I got exposure to a lot of different things. And when I left IBM Global Services,
I knew that I really had a passion for telephony or network engineering.
I got offered a position at a new company called Level 3 Communications.
I was on like cloud nine.
At that point, I mean, of course we have to earn a salary, but I'm like, it doesn't even matter.
I would pay them to be here and learn this and have exposure to this enterprise networking
gear.
So I took a position and I primarily helped companies or individuals turn up their co-location services or their dedicated private lines.
So that's really where I cut my teeth on network engineering.
I owe everything to that opportunity.
from that role i always kind of followed my north star ironically right about that time we hit the dot-com bust all of a sudden it happened 50 of the company was cut and i was
just thankful to have a job you know but I was forced to take a role in change management
and I was just beside myself, you know, I'm like, oh, I'm so overqualified for this. But
in retrospect, oh my gosh, by pure luck, again, I was introduced to something that is so crucial
in security. That's change management, right? Understanding the impact, making sure that it's
been burned in. To this day, I think
change management is a very difficult thing for organizations to comply with or do successfully.
Listen, at that time, I was just kind of like really bummed out. I'm like, wow, I took a wrong
turn. What happened? But like everything else, this too passes, right? Stay neutral, stay calm,
keep working upwards and onwards and sure enough
everything's stabilized and and i i was just by pure luck again recruited in level three to um
security engineering took a role as security engineering you know i just kept hungry and uh
eventually uh i took another role at trustwave, leaving my favorite place on earth, Level 3 Communications.
And even Trustwave, you know, I found myself all of a sudden, I'm like, did I make another wrong turn?
Because I was really just focusing on PCI compliance for Fortune 100 brands and kind of a hybrid of pen testing, right? So my job was to grind on the infrastructure
and convey to the brand why are they not TCI compliant?
And it was just grinding on infrastructure over and over.
I mean, I could spend three or four days
just finessing some sort of cross-site scripting, knowing it's there.
Sometimes you don't find it, and sometimes you do.
From Trustwave, it was the banking collapse in 2010, and I took a position at InfoArmor, and was like delighted I was going to be the CISO.
Shortly after taking the job we lost our largest client essentially under a seed fund from
Wamuu and I was like wow oh did I make another mistake but it turned out like it was amazing
like what a great opportunity. I went to InfoArer it was like green fields i became the cso and help diversify the products and offer largely dark web alerts
i for some reason when i came on at informer as a cso i just felt not afraid of anything and i would
pick up the phone and just explore opportunities with
companies, you know, and learn like, you know, what's going on and fortunate enough to be able
to apply that to our products. And, you know, hopefully it made a difference.
If I get 50% of what I want, I'm lucky.
You don't always get what you want.
And when you don't get what you want, it doesn't mean it's over.
For those of us that are pursuing a career in information security,
I always found it kind of interesting that, gosh, when you get there, there's so many flavors of security.
Are you focused on web application security?
Are you focused on network security?
There's just so many different layers of security.
And just so find what it is that you love and go after it.
And don't let anyone be a naysayer.
And use every moment you have and every opportunity to the best of your ability.
It's not always textbook.
Define friction points in it.
You may join security field not knowing what you're going to do.
But by being that curious person and breaking things and putting it back together, you'll find you're the right way.
And just never stop being curious.
There's just not enough of us.
Understand that you have to cut your teeth on things and sometimes you get stuff that you don't really want to do.
You might think you're better, but just do it really well and the world will be your oyster.
And now, a message from Black Cloak's award-winning digital executive protection platform secures their personal devices, home networks, and connected lives.
Because when executives are compromised at home, your company is at risk.
In fact, over one-third of new members discover
they've already been breached. Protect your executives and their families 24-7, 365,
with Black Cloak. Learn more at blackcloak.io.