- Audience 1st
- Posts
- BEST OF: What Cybersecurity Pros Hate MOST About the Industry
BEST OF: What Cybersecurity Pros Hate MOST About the Industry
In every episode I record with my guests, I ask them one crucial question: "What do you hate most about the cybersecurity industry?" In this episode, I curated the top answers for you.
In every episode I record with my guests, I ask them one crucial question:
"What do you hate most about the cybersecurity industry?"
In this episode, I curated the top answers for you.
What's more, you'll get an understanding of what security practitioners, go-to-market teams, and cybersecurity vendors can do to alleviate some of these problems in the industry.
POLL: What do you hate most about the cybersecurity industry? |
Before we dive in, don’t forget to subscribe to join 1700+ cybersecurity marketers and sales pros mastering customer research. You’ll get notified whenever a new episode and buyer insights summary drops.
What do cybersecurity professionals hate most about the cybersecurity industry?
1. Insularity and Echo Chamber
Cybersecurity often becomes an insular community where only familiar voices are heard, leading to a lack of fresh perspectives.
"The echo chamber effect of security is not easy. Compliance is similar, as it sticks to rigid rules, even when reality requires more flexible responses."
2. Gatekeeping
There is a prevalent barrier to entry for newcomers, with excessive requirements like certifications and experience even for entry-level roles.
"It’s frustrating to see how we complain about a talent shortage, but simultaneously make it harder for new people to enter the field."
3. Buzzwords and Overhyped Terms
Overused buzzwords like “zero trust” and “SASE” are seen as disingenuous, especially when used by non-technical people who lack a deep understanding of these concepts.
"Buzzwords annoy the hell out of me, especially when people use them without understanding their true meaning."
4. Vendor Herd Mentality
Many vendors offer similar solutions without clear differentiation, making it difficult for security practitioners to see unique value.
"I hate dealing with half a dozen vendors all offering different colors of the same thing. I just want solutions that actually solve the problem."
5. Ambulance Chasing
Some vendors capitalize on major breaches by aggressively marketing their products, which is viewed as unethical.
"The ambulance chasing behavior in response to high-profile breaches like Colonial Pipeline or SolarWinds is distasteful."
6. Overpromising and Underdelivering
Vendors often claim their solutions can do everything, only to fall short of those promises during implementation.
"Be honest about what your product can and cannot do. Don’t claim it can identify business logic flaws when it clearly can’t."
7. Cold Calls and Generic Outreach
Cybersecurity leaders find cold calls intrusive and ineffective, with cold emails often ending up in spam folders.
"Cold calls have never worked for me. If I need something, I’ll reach out myself."
8. Bullying and Fear Tactics in Marketing
The use of psychological pressure and fear-based messaging in marketing is strongly criticized.
"Using fear to manipulate people into scheduling meetings is one of the worst tactics. It’s disrespectful of my time."
9. Lack of Genuine Human Connection
The industry’s focus on technical language and jargon hinders meaningful relationships with non-technical stakeholders.
"We don’t speak human. This prevents us from creating real, meaningful connections with the people we’re supposed to protect."
10. Ego and Prima Donna Behavior
There’s a perception of arrogance among some cybersecurity professionals, leading to a toxic environment that marginalizes diverse voices.
"The ego-driven behavior in cybersecurity, including self-proclaimed influencers, suppresses other valuable voices."
11. Battle-Like Mentality
A “battle them” approach often prevails in the industry, making collaboration challenging and counterproductive.
"We should be working together like a team, but it often feels like we’re fighting vendors and suppliers alongside adversaries."
Until next time,
Dani
Subscribe to Audience 1st Podcast Newsletter
Thanks for reading! If you like summaries like this, subscribe to Audience 1st Podcast Newsletter to get notified whenever a new episode drops.
Excited to collaborate? Let’s make it happen!
Check out our sponsorship details to connect with real security practitioners and showcase your brand to an engaged community of cybersecurity decision-makers giving and seeking real buyer insights.
Reply