BUILDING HIGH-PERFORMING
CYBERSECURITY TEAMS: LEADERSHIP THAT
SECURES THE FUTURE!
2
AGENDA OVERVIEW
 My Background and Leadership Philosophy
 Cornerstone: Personal Readiness
 Strategic Meekness
 Diversity of Thought
 The Big 3 Leadership Rules
 Application to Cybersecurity
 Insights from Key Books
 Takeaways and Q&A
3
MY
PROFESSIONAL
BACKGROUND
5
MISSION STATEMENT:
ISSA promotes a secure digital world through education,
collaboration, & leadership. (From ISSA Mission Statement)
How to?
 Foster integrity, excellence, and respect in Cyber teams.
 Apply military principles to manage technology risk &
protect infrastructure.
6
Cornerstone: Personal Readiness
You can’t fix THEM, until you fix YOU!
 Self-discipline & accountability as the foundation.
 Time management is key.
 Do the hard things first & Take time to sharpen the axe
7
Levels of Leadership
Definition: “Meekness is absolute authority coupled with complete restraint.”
(Inspired by George Washington as the American Cincinnatus)
 Tactical: Influence through providing purpose, direction, & motivation.
(ADP 6-22)
 Operational: Focus on mission execution, team alignment, and
adaptability.
 Strategic: It isn’t vision, collaborative influence, or cultural stewardship—
it’s disciplined coordination and accountability to drive strategic outcome
Cybersecurity leaders must coordinate defenses across networks
with discipline, not just inspiration.
8
True DEI isn’t as advertised: It’s Diversity of Thought
Real diversity isn't focused on the wrapping paper; it's focused on the
contents—diversity of thought.
 Avoid groupthink by leveraging unique perspectives.(e.g., Amazon
Leadership Principles: Bias for Action, Are Right a Lot)
 Select for complementary strengths
“Strength lies in differences, not in similarities.”– Stephen R. Covey
Amazon DEI
Project
10
Big 3 Leadership Rules
"His leadership was not of gesture but of character; he led by example, not by
proclamation, and his restraint magnified his authority." – Ron Chernow,
Washington: A Life (2010)
 Rule 3: Don’t let words get in the way of candid dialogue & civil discourse
(collab)
 Rule 2: Facts don’t care about feelings. (data-driven w/ positive emotion)
 Rule 1: Nobody cares how much you know, until they know how much you
care. (mutual respect- most important)
These rules, honed in combat and industry, build resilient teams.
Rule #1—mutual respect—is the foundation, as trust drives all
APPLYING
MILITARY
PRINCIPLES TO
CYBERSECURITY
Discipline & Precision: Lead through chaos.
Trust & Accountability: Own outcomes.
Resilience: Get comfortable being
uncomfortable.
12
7 Habits of Highly Effective People Insights
"The key is not to prioritize what's on your schedule but to schedule
your priorities." – Covey
 Be Proactive: Take responsibility for your actions and behaviors. Don’t
react.
 Begin with the End in Mind: Define your personal mission & long-term
goals.
 Put First Things First: Prioritize what matters most. Focus on important
tasks.
 Think Win-Win: Seek mutual benefit in all interactions. Cultivate
abundance.
 Seek First to Understand, Then to be Understood: Practice empathetic
listening.
 Synergize: Combine strengths through teamwork.
 Sharpen the Saw: Continuously renew yourself — P/M/E/S.
13
Deliberate Discomfort Insights
"When you make the courageous decision to deliberately choose
discomfort, you prove to yourself that you are no longer satisfied with
the way things are and you won’t tolerate it any longer. You’re for
change, for growth."– JVC
 Embrace discomfort for growth.
 Accountability through trust
 Lead through shared struggle
 Embrace failure as feedback
Extreme Ownership insights
“There are no bad teams, only bad
leaders.” – Jocko & Babin
Full accountability, no blame.
Prioritize and Execute
14
15
Cybersecurity Application Metrics
“”As conflict between states evolves, the cyberspace is becoming an
increasingly vital component of strategy and doctrine for war fighting." – Lt.
Gen. Michael T. Flynn, The Field of Fight (2016)
 Strategic Imperative
 Leadership Application
 Relevance Today
16
Key Takeaways
 Prioritize mutual respect (Rule #1) as the leadership cornerstone.
 Use data-driven decisions and candid dialogue to support trust.
 Embrace personal readiness and disciplined execution.
 Leverage diversity of thought.
 Draw from military or professional books for resilience.
17
Call to Action
 Schedule 1:1s with you team this week to build trust
 Read one of the three books within 30 days
THANK YOU
Josh Salem
Senior Military Operations Analyst
Space and Missile Defense School (SMDC)
Army Space Training Division (ASTD)
josh.salem@proton.me
719-248-1688
https://www.linkedin.com/in/josh-salem/

Building High-Performing Cybersecurity teams.pptx

  • 1.
    BUILDING HIGH-PERFORMING CYBERSECURITY TEAMS:LEADERSHIP THAT SECURES THE FUTURE!
  • 2.
  • 3.
    AGENDA OVERVIEW  MyBackground and Leadership Philosophy  Cornerstone: Personal Readiness  Strategic Meekness  Diversity of Thought  The Big 3 Leadership Rules  Application to Cybersecurity  Insights from Key Books  Takeaways and Q&A 3
  • 4.
  • 5.
    5 MISSION STATEMENT: ISSA promotesa secure digital world through education, collaboration, & leadership. (From ISSA Mission Statement) How to?  Foster integrity, excellence, and respect in Cyber teams.  Apply military principles to manage technology risk & protect infrastructure.
  • 6.
    6 Cornerstone: Personal Readiness Youcan’t fix THEM, until you fix YOU!  Self-discipline & accountability as the foundation.  Time management is key.  Do the hard things first & Take time to sharpen the axe
  • 7.
    7 Levels of Leadership Definition:“Meekness is absolute authority coupled with complete restraint.” (Inspired by George Washington as the American Cincinnatus)  Tactical: Influence through providing purpose, direction, & motivation. (ADP 6-22)  Operational: Focus on mission execution, team alignment, and adaptability.  Strategic: It isn’t vision, collaborative influence, or cultural stewardship— it’s disciplined coordination and accountability to drive strategic outcome Cybersecurity leaders must coordinate defenses across networks with discipline, not just inspiration.
  • 8.
    8 True DEI isn’tas advertised: It’s Diversity of Thought Real diversity isn't focused on the wrapping paper; it's focused on the contents—diversity of thought.  Avoid groupthink by leveraging unique perspectives.(e.g., Amazon Leadership Principles: Bias for Action, Are Right a Lot)  Select for complementary strengths “Strength lies in differences, not in similarities.”– Stephen R. Covey
  • 9.
  • 10.
    10 Big 3 LeadershipRules "His leadership was not of gesture but of character; he led by example, not by proclamation, and his restraint magnified his authority." – Ron Chernow, Washington: A Life (2010)  Rule 3: Don’t let words get in the way of candid dialogue & civil discourse (collab)  Rule 2: Facts don’t care about feelings. (data-driven w/ positive emotion)  Rule 1: Nobody cares how much you know, until they know how much you care. (mutual respect- most important) These rules, honed in combat and industry, build resilient teams. Rule #1—mutual respect—is the foundation, as trust drives all
  • 11.
    APPLYING MILITARY PRINCIPLES TO CYBERSECURITY Discipline &Precision: Lead through chaos. Trust & Accountability: Own outcomes. Resilience: Get comfortable being uncomfortable.
  • 12.
    12 7 Habits ofHighly Effective People Insights "The key is not to prioritize what's on your schedule but to schedule your priorities." – Covey  Be Proactive: Take responsibility for your actions and behaviors. Don’t react.  Begin with the End in Mind: Define your personal mission & long-term goals.  Put First Things First: Prioritize what matters most. Focus on important tasks.  Think Win-Win: Seek mutual benefit in all interactions. Cultivate abundance.  Seek First to Understand, Then to be Understood: Practice empathetic listening.  Synergize: Combine strengths through teamwork.  Sharpen the Saw: Continuously renew yourself — P/M/E/S.
  • 13.
    13 Deliberate Discomfort Insights "Whenyou make the courageous decision to deliberately choose discomfort, you prove to yourself that you are no longer satisfied with the way things are and you won’t tolerate it any longer. You’re for change, for growth."– JVC  Embrace discomfort for growth.  Accountability through trust  Lead through shared struggle  Embrace failure as feedback
  • 14.
    Extreme Ownership insights “Thereare no bad teams, only bad leaders.” – Jocko & Babin Full accountability, no blame. Prioritize and Execute 14
  • 15.
    15 Cybersecurity Application Metrics “”Asconflict between states evolves, the cyberspace is becoming an increasingly vital component of strategy and doctrine for war fighting." – Lt. Gen. Michael T. Flynn, The Field of Fight (2016)  Strategic Imperative  Leadership Application  Relevance Today
  • 16.
    16 Key Takeaways  Prioritizemutual respect (Rule #1) as the leadership cornerstone.  Use data-driven decisions and candid dialogue to support trust.  Embrace personal readiness and disciplined execution.  Leverage diversity of thought.  Draw from military or professional books for resilience.
  • 17.
    17 Call to Action Schedule 1:1s with you team this week to build trust  Read one of the three books within 30 days
  • 18.
    THANK YOU Josh Salem SeniorMilitary Operations Analyst Space and Missile Defense School (SMDC) Army Space Training Division (ASTD) josh.salem@proton.me 719-248-1688 https://www.linkedin.com/in/josh-salem/

Editor's Notes

  • #1 GM! My name is Josh Salem and with a 20-year Army career, I have a lotta letters behind my name on LinkedIn, MBA, PMP, LSSMBB, and JTAC. With all of that credentialing, hiring managers and potential employers as me, what can you do for my team? And I say, thanks to my instructor experience, To better illustrate my point, please watch this short video haha ISSA core values: Integrity, Excellence, Respect
  • #2 Motivator: Military JTAC Problems, AFT, YouTube Military JTAC Problems
  • #3 We'll cover my experiences, core principles, and practical applications, drawing from books like 'The 7 Habits,' 'Deliberate Discomfort,' and 'Extreme Ownership.'"
  • #4 20+ years in Airborne and Special Operations units, including Regional JTAC Program Manager for 46 SOF JTACs across two continents (2014-2018) Led Kinetic Strike exercises at Air Force Research Laboratory and provided JTAC capabilities with MQ-9 drones at Nellis AFB Current: Military Operations Analyst at Bowhead Mission Solutions, developing training for Army personnel on space domain operations in D3SOE environments Private sector: $2.2M savings at Amazon through Lean Six Sigma; $1.7M at Air Methods via MRO projects Certifications: MBA, PMP, LSSMBB, Active TS/SCI From leading 19 overseas strikes with 100% success to training 15k+ personnel on SATCOM and PNT, my career has honed leadership in high-stakes settings—much like cybersecurity's constant threats.
  • #5 My talk builds on ISSA's goals, using leadership to empower cyber professionals.
  • #6 It all starts with you. Use schedules to protect your time, schedule time for physical fitness and professional reading. Do the hard things first- Mark twain quote eat the frog Sharpen the axe- Abe Lincoln- 6 hours to chop down a tree I’d take 4 hours sharpening the axe.
  • #7 Example Operational: As Regional JTAC Program Manager (2014-2018), coordinated 46 SOF JTACs across two continents, achieving 90% pass rate at SOTACC through disciplined training and trust. Ensure ppl feel heard and empower subordinates, they will impress you. Washington set the standard. Linkedin post: https://www.linkedin.com/feed/update/urn:li:activity:7322015324772409345/
  • #8 Linkedin Article: https://www.linkedin.com/pulse/dei-focus-contents-wrapping-paper-josh-salem-pmp-lssmbb-fztyc/?trackingId=4u4jo1ciRxa5ezB4dJPeJA%3D%3D
  • #9 Amazon Leadership Principles example: Customer Obsession, Ownership, Invent and Simplify, Are Right, A Lot, Learn and Be Curious, Hire and Develop the Best, Insist on the Highest Standards, Think Big, Bias for Action, Frugality, Earn Trust, Dive Deep, Have Backbone; Disagree and Commit, and Deliver Results. CAG selection criteria.
  • #10 These rules, honed in combat and industry, build resilient teams. Rule #1—mutual respect—is the foundation, as trust drives all success, followed by data-driven decisions and candid dialogue. Linkedin Articles: (rewriting Rule 1 after further deep thought and personal study). Rule 3: https://www.linkedin.com/feed/update/urn:li:activity:7269779862687518720/ Rule 2: https://www.linkedin.com/feed/update/urn:li:activity:7273128969489510400/
  • #11  "Leadership. Discipline. Precision. Trust. These are not just military ideals. They are the core of any effective cybersecurity strategy.“ Military principles enhance cyber teams: Anticipate like enemy maneuvers, build trust for rapid response, as I did coordinating JTAC strikes.
  • #12 Fix yourself before trying to fix the team.
  • #13 Like Van Camp's Green Beret journeys, cyber pros must train in simulated attacks to build resilience, supporting Rule #1’s trust-building."
  • #14 "Extreme Ownership’s accountability reinforces Rule #1—own every cyber vulnerability to build unbreakable teams.“
  • #15 ISSA is strategically focused. In November 2021, the commander of the U.S. Army Special Operations Command, Lt. Gen. Jonathan Braga, articulated a new deterrence framework to his staff.1 This emergent framework included the space, cyberspace, and special operations communities having symbiotic relationships to converge effects throughout the competition continuum. As a homage to the nuclear Triad (intercontinental ballistic missiles, submarine-launched ballistic missiles, and strategic bombers), this “special operations forces (SOF)-cyberspace-space Triad” provides policymakers additional options to campaign against our adversaries. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/March-2024/Cyber-Space-Triad/
  • #16 Start with trust to advance ISSA's secure digital world.
  • #17 Have the audience make a commitment.