Insights from a CISO- What I look for when hiring new talent

0 20
Hiring cybersecurity talent is one of the major challenges faced by CISOs across...

Hiring cybersecurity talent is one of the major challenges faced by CISOs across the industry. Reaching the right people, developing an attractive job proposition, and then retaining those people long-term is essential for the effective running of any cybersecurity team – and when the demand for cybersecurity professionals outstrips the supply, it’s not easy to make sure your team is equipped with the right skills at all times. 

We asked Max Imbiel (CISO at Bitpanda) what he looks for when hiring in the crypto security space – and what he thinks any cybersecurity professional with an interest in fintech or cryptocurrency should learn. 

Insights from a CISO- What I look for when hiring new talent

Here’s what he told us. 

As a CISO, what are the key criteria you focus on when you're looking for new cybersecurity talent to add to your team?

“There are of course multiple dimensions to this task of hiring talent:

  • Do I have the right inclusive wording and definitions on the application form?
  • Do I need someone with experience in a certain area or can they be trained on the job?
  • Do they fit our team and company culture?
  • What are their ambitions? 

“So for me the person behind a profile is always more important than just the skills and certifications.”

And speaking more specifically on security for a crypto platform – do you prefer hiring professionals with cryptocurrency experience, or is that not important?

“It is of course a plus if you can speak the language of our business. But I also believe that if you are willing to learn the ins and outs of it, you can do so best on-the-job.”

If you were giving advice to someone at the early stages of their cybersecurity career who wanted to work on security in the cryptocurrency space, or in fintech more broadly, what would you tell them to do/learn/experience?

“So if you want to work in crypto or fintech, rest assured, at some point in time it will be necessary to be audited and under very strict regulatory requirements. 

“This will result in a lot of documentation, establishments of defined processes, risk assessments on new developments, strict rules etc. 

“This will be of course beneficial and needed for these companies to grow into the mature financial institute they want to become. But it will be different from a tech startup where enterprise decisions can be made quick and dirty.”

What are the key pressures that security professionals face in fintech right now?

“Most certainly right now it is DORA, the Digital Operational Resilience Act which is coming into effect for (almost) all financial institutes in the whole European Union on January 17th 2025. 

“DORA introduces a lot of regulatory compliance requirements for boosting and adhering the resilience of a financial institute, and by doing so EU-wide and enforcing it also on the IT-suppliers of a financial institute, it will serve as a formidable blueprint in actually improving and strengthening the resilience of our European financial markets.”

Finally, why are events like MEA valuable to you and your work? 

“Events like MEA are highly valuable for us security professionals, learners, beginners and leaders – because they provide us with this dynamic and unbiased environment where we can talk, exchange, share and learn from and with each other. I highly value events like this and encourage everyone to join them to their best capability.”

Thanks to Max Imbiel at Bitpanda. Join us at MEA 2024 to learn directly from the world’s leading cybersecurity experts. 

REGISTER
你可能想看:

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

04/7 The systematic security risks of outsourcing and crowdsourcing are no different from those of formal employees

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Follow the Cybersecurity Medicine Water Brother to fight the target field (emergency response)

1.2 The safety and compliance supervision requirements are becoming higher and higher

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

About the related technologies and implementations associated with tracing the source of posts by PDD employees

最后修改时间:
admin
上一篇 2025年03月22日 16:36
下一篇 2025年03月22日 16:59

评论已关闭