September 14, 2023 By Mark Stone 3 min read

In today’s increasingly cloud-focused business environment, cloud security engineers are pivotal in protecting an organization’s critical data and infrastructure. As experts in cloud security, they leverage their expertise to ensure that the ever-expanding amount of cloud data is safe from emerging threats and vulnerabilities. Cloud security professionals combine their passion for technology with a deep understanding of security principles to design and implement robust cloud security strategies.

What experience do these security experts have, and what led them to the field? What advice do they have for individuals looking for a career in cloud security?

In this exclusive Q&A, we spoke with Dave Hatter, a cloud security expert with 30 years of experience in IT as a software engineer, cybersecurity consultant and small business owner. He has 18 years of experience as an educator teaching college-level programming and technology-related courses, primarily at Cincinnati State Community and Technical College. He currently serves as the Director of Business Growth at Intrust IT but is still actively engaged in cloud security functions for the company and its clients.

Did you go to college? What did you go to school for? What certifications did you obtain?

I went to Northern Kentucky University with a BS in Information Systems. I also have several certs including:

(ISC)² CISSP, 721411

(ISC)² CCSP, 721411

(ISC)² CSSLP, 721411

ISACA CISA, 232060690

ISACA CISM, 232156841

CompTIA Security+

CompTIA Network+

CompTIA i-Net+

Microsoft Azure Fundamentals (AZ-900)

Certified Microsoft Innovative Educator

EXIN; ITIL® Foundation Certificate in IT Service Management, 5347245.20393622

Project Management Institute; Project Management Professional (PMP), 1725230

Project Management Institute; Professional in Business Analysis (PBA), 1884913

Project Management Institute; Agile Certified Practitioner (ACP), 1914263

Project Management Institute; Disciplined Agilist

Scrum.org; Professional Scrum Master 1 (PSM)

Scrum.org; Professional Scrum Developer 1 (PSD)

Lean Six Sigma Yellow Belt (LSSYB): GreyCampus, 481211858122

CompTIA e-Biz+

CompTIA Project+

What was your first role in IT?

Programmer.

If it wasn’t in security, what pushed you to pursue security?

Seeing that our society is increasingly dependent on digital technology, evermore devices are now “smart” (and most are a privacy and security dumpster fire), software security is not taught in college and that people and businesses are increasingly impacted by devastating cyberattacks. I wanted to help defend against this onslaught.

What is the most valuable skill you learned in your role?

Active listening and communications. In particular, how to speak to business people about technology in language they can understand and act on.

What soft skills do you think make a person successful in cybersecurity?

Communication – Being able [to] understand business concepts and explain technology concepts to business people is critical to help them understand the risks and take action.

Active listening – You must be able to listen carefully and demonstrate understanding of what you’re being told.

Empathy – You need to be able to put yourself in your client’s and (in some cases) the victim’s shoes.

Critical thinking – You need to be able to think logically about threats, risks and solutions.

Attention to detail – A small mistake can have devastating consequences.

Curiosity – A natural curiosity will go a long way in a field that is rapidly and constantly changing. There are always new technologies, tools and threats.

Continuous improvement – This is a field that is constantly changing, and as society increasingly depends on technology, it will become increasingly important to secure it.

Lifelong learning –  You will need to learn new things constantly as the threat landscape changes.

Any parting thoughts or final piece of advice to someone looking into your type of role?

There is an amazing amount of opportunity to make an impact protecting society from increasingly dangerous cyberattacks. Learn as much as you can about (computer) networking and take advantage of the plethora of free and low-cost resources available to get the knowledge and skills you need to succeed in cybersecurity. Certifications can be helpful, both to build knowledge and gain credibility. Entry-level folks should check out the CompTIA Security+ and/or the (ISC)2 Certified In Cybersecurity (CC) certifications.

Free training for security persons

More from Cloud Security

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today