September 14, 2023 By Mark Stone 3 min read

In today’s increasingly cloud-focused business environment, cloud security engineers are pivotal in protecting an organization’s critical data and infrastructure. As experts in cloud security, they leverage their expertise to ensure that the ever-expanding amount of cloud data is safe from emerging threats and vulnerabilities. Cloud security professionals combine their passion for technology with a deep understanding of security principles to design and implement robust cloud security strategies.

What experience do these security experts have, and what led them to the field? What advice do they have for individuals looking for a career in cloud security?

In this exclusive Q&A, we spoke with Dave Hatter, a cloud security expert with 30 years of experience in IT as a software engineer, cybersecurity consultant and small business owner. He has 18 years of experience as an educator teaching college-level programming and technology-related courses, primarily at Cincinnati State Community and Technical College. He currently serves as the Director of Business Growth at Intrust IT but is still actively engaged in cloud security functions for the company and its clients.

Did you go to college? What did you go to school for? What certifications did you obtain?

I went to Northern Kentucky University with a BS in Information Systems. I also have several certs including:

(ISC)² CISSP, 721411

(ISC)² CCSP, 721411

(ISC)² CSSLP, 721411

ISACA CISA, 232060690

ISACA CISM, 232156841

CompTIA Security+

CompTIA Network+

CompTIA i-Net+

Microsoft Azure Fundamentals (AZ-900)

Certified Microsoft Innovative Educator

EXIN; ITIL® Foundation Certificate in IT Service Management, 5347245.20393622

Project Management Institute; Project Management Professional (PMP), 1725230

Project Management Institute; Professional in Business Analysis (PBA), 1884913

Project Management Institute; Agile Certified Practitioner (ACP), 1914263

Project Management Institute; Disciplined Agilist

Scrum.org; Professional Scrum Master 1 (PSM)

Scrum.org; Professional Scrum Developer 1 (PSD)

Lean Six Sigma Yellow Belt (LSSYB): GreyCampus, 481211858122

CompTIA e-Biz+

CompTIA Project+

What was your first role in IT?

Programmer.

If it wasn’t in security, what pushed you to pursue security?

Seeing that our society is increasingly dependent on digital technology, evermore devices are now “smart” (and most are a privacy and security dumpster fire), software security is not taught in college and that people and businesses are increasingly impacted by devastating cyberattacks. I wanted to help defend against this onslaught.

What is the most valuable skill you learned in your role?

Active listening and communications. In particular, how to speak to business people about technology in language they can understand and act on.

What soft skills do you think make a person successful in cybersecurity?

Communication – Being able [to] understand business concepts and explain technology concepts to business people is critical to help them understand the risks and take action.

Active listening – You must be able to listen carefully and demonstrate understanding of what you’re being told.

Empathy – You need to be able to put yourself in your client’s and (in some cases) the victim’s shoes.

Critical thinking – You need to be able to think logically about threats, risks and solutions.

Attention to detail – A small mistake can have devastating consequences.

Curiosity – A natural curiosity will go a long way in a field that is rapidly and constantly changing. There are always new technologies, tools and threats.

Continuous improvement – This is a field that is constantly changing, and as society increasingly depends on technology, it will become increasingly important to secure it.

Lifelong learning –  You will need to learn new things constantly as the threat landscape changes.

Any parting thoughts or final piece of advice to someone looking into your type of role?

There is an amazing amount of opportunity to make an impact protecting society from increasingly dangerous cyberattacks. Learn as much as you can about (computer) networking and take advantage of the plethora of free and low-cost resources available to get the knowledge and skills you need to succeed in cybersecurity. Certifications can be helpful, both to build knowledge and gain credibility. Entry-level folks should check out the CompTIA Security+ and/or the (ISC)2 Certified In Cybersecurity (CC) certifications.

Free training for security persons

More from Cloud Security

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Cloud security uncertainty: Do you know where your data is?

3 min read - How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried.In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say undiscovered blind spots being exploited is the leading concern making them restless.The report reveals the ongoing need for improved cloud and hybrid cloud security. Solutions to…

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today