Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Beyond Burnout: What Is Cybersecurity Doing to Us?
Newest First  |  Oldest First  |  Threaded View
zentrusted
100%
0%
zentrusted,
User Rank: Apprentice
3/25/2020 | 11:44:43 AM
Self-Care and Prioritization
As someone who's battled my own demons - making it a priority and talking about emotional health and self-care is the way to go.

To the quote about "quationing one's self" I went through this alone. I've got a bookshelf full of self-help, how-to-win-back-your-life-and-be-awesome books. I took a Gallup test, the Eneagram test, and anything else I could get my hands on to self-diagnose and "hack" the solution like I do at work. It took a really good counseling session to shift my perspective from "what's wrong with me" to "how can i be my best self".

I opened up to the cyber community, there have been some really great initiatives on mental health (by Jay Radcliffe and others) and as scary as it was, I took the leap.

The toughest part was implementing "digital minimalism" to control triggers. Establsihed office hours, email/phonecall blackouts, weekend "digital sabbatical" - and using Eisenhower matrix to prioritize myself and to explain my prioritization to my colleagues. Everything is not "urgent and important" and we can't always be the superheroes. 

Lastly - and I have followed my own advice here - if you're in a toxic environment that doesn't allow you to manage these things - get out at all costs. 

I didn't find some magic formula - I simply had to deconstruct the problem and address it piece by piece.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13890
PUBLISHED: 2020-06-06
The Neon theme 2.0 before 2020-06-03 for Bootstrap allows XSS via an Add Task Input operation in a dashboard.
CVE-2020-13889
PUBLISHED: 2020-06-06
showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
CVE-2020-13881
PUBLISHED: 2020-06-06
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
CVE-2020-13883
PUBLISHED: 2020-06-06
In WSO2 API Manager 3.0.0 and earlier, WSO2 API Microgateway 2.2.0, and WSO2 IS as Key Manager 5.9.0 and earlier, Management Console allows XXE during addition or update of a Lifecycle.
CVE-2020-13871
PUBLISHED: 2020-06-06
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.