September 14, 2023 By Mark Stone 3 min read

In today’s increasingly cloud-focused business environment, cloud security engineers are pivotal in protecting an organization’s critical data and infrastructure. As experts in cloud security, they leverage their expertise to ensure that the ever-expanding amount of cloud data is safe from emerging threats and vulnerabilities. Cloud security professionals combine their passion for technology with a deep understanding of security principles to design and implement robust cloud security strategies.

What experience do these security experts have, and what led them to the field? What advice do they have for individuals looking for a career in cloud security?

In this exclusive Q&A, we spoke with Dave Hatter, a cloud security expert with 30 years of experience in IT as a software engineer, cybersecurity consultant and small business owner. He has 18 years of experience as an educator teaching college-level programming and technology-related courses, primarily at Cincinnati State Community and Technical College. He currently serves as the Director of Business Growth at Intrust IT but is still actively engaged in cloud security functions for the company and its clients.

Did you go to college? What did you go to school for? What certifications did you obtain?

I went to Northern Kentucky University with a BS in Information Systems. I also have several certs including:

(ISC)² CISSP, 721411

(ISC)² CCSP, 721411

(ISC)² CSSLP, 721411

ISACA CISA, 232060690

ISACA CISM, 232156841

CompTIA Security+

CompTIA Network+

CompTIA i-Net+

Microsoft Azure Fundamentals (AZ-900)

Certified Microsoft Innovative Educator

EXIN; ITIL® Foundation Certificate in IT Service Management, 5347245.20393622

Project Management Institute; Project Management Professional (PMP), 1725230

Project Management Institute; Professional in Business Analysis (PBA), 1884913

Project Management Institute; Agile Certified Practitioner (ACP), 1914263

Project Management Institute; Disciplined Agilist; Professional Scrum Master 1 (PSM); Professional Scrum Developer 1 (PSD)

Lean Six Sigma Yellow Belt (LSSYB): GreyCampus, 481211858122

CompTIA e-Biz+

CompTIA Project+

What was your first role in IT?


If it wasn’t in security, what pushed you to pursue security?

Seeing that our society is increasingly dependent on digital technology, evermore devices are now “smart” (and most are a privacy and security dumpster fire), software security is not taught in college and that people and businesses are increasingly impacted by devastating cyberattacks. I wanted to help defend against this onslaught.

What is the most valuable skill you learned in your role?

Active listening and communications. In particular, how to speak to business people about technology in language they can understand and act on.

What soft skills do you think make a person successful in cybersecurity?

Communication – Being able [to] understand business concepts and explain technology concepts to business people is critical to help them understand the risks and take action.

Active listening – You must be able to listen carefully and demonstrate understanding of what you’re being told.

Empathy – You need to be able to put yourself in your client’s and (in some cases) the victim’s shoes.

Critical thinking – You need to be able to think logically about threats, risks and solutions.

Attention to detail – A small mistake can have devastating consequences.

Curiosity – A natural curiosity will go a long way in a field that is rapidly and constantly changing. There are always new technologies, tools and threats.

Continuous improvement – This is a field that is constantly changing, and as society increasingly depends on technology, it will become increasingly important to secure it.

Lifelong learning –  You will need to learn new things constantly as the threat landscape changes.

Any parting thoughts or final piece of advice to someone looking into your type of role?

There is an amazing amount of opportunity to make an impact protecting society from increasingly dangerous cyberattacks. Learn as much as you can about (computer) networking and take advantage of the plethora of free and low-cost resources available to get the knowledge and skills you need to succeed in cybersecurity. Certifications can be helpful, both to build knowledge and gain credibility. Entry-level folks should check out the CompTIA Security+ and/or the (ISC)2 Certified In Cybersecurity (CC) certifications.

Free training for security persons

More from Cloud Security

AI-driven compliance: The key to cloud security

3 min read - The growth of cloud computing continues unabated, but it has also created security challenges. The acceleration of cloud adoption has created greater complexity, with limited cloud technical expertise available in the market, an explosion in connected and Internet of Things (IoT) devices and a growing need for multi-cloud environments. When organizations migrate to the cloud, there is a likelihood of data security problems given that many applications are not secure by design. When these applications migrate to cloud-native systems, mistakes in configuration…

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today