{"id":143270,"date":"2022-10-25T10:58:00","date_gmt":"2022-10-25T14:58:00","guid":{"rendered":"https:\/\/www.cyberark.com\/blog\/podcasts\/ep-14-humanizing-cybersecurity\/"},"modified":"2026-04-09T20:18:41","modified_gmt":"2026-04-10T00:18:41","slug":"ep-14-humanizing-cybersecurity","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-14-humanizing-cybersecurity\/","title":{"rendered":"EP 14 &#8211; Humanizing Cybersecurity"},"content":{"rendered":"<p>Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It&rsquo;s no wonder mental health issues such as depression and anxiety are surging in our industry. There are a lot of things that need to change, but on a positive note, this once-taboo subject is starting to get the attention it so desperately deserves. This is in part thanks to security leaders like Kirsten Davies, CISO at Unilever, stepping forward. On today\u2019s episode, host David Puner talks with Davies about some of her passions, including the humanization of the teams in our cybersecurity community. She&rsquo;s equally passionate about being an innovative cyber protector and finding solutions to the multitude of challenges high-level CISOs face on a daily basis. The timing of the episode is apropos because October is both Cybersecurity Awareness Month and Depression and Mental Health Awareness and Screening Month. Time to elevate this critical conversation, advocate against stigma, and bring awareness to the various resources available to those who need them.<\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">[00:00:00.120] &#8211; David Puner<br \/>\nYou&rsquo;re listening to the Trust Issues podcast. I&rsquo;m David Puner, a senior editorial manager at CyberArk, a<br \/>\nglobal leader in identity security.<br \/>\n[00:00:23.650] &#8211; David Puner<br \/>\nIt may go without saying, but I&rsquo;ll say it. Being a chief information security officer, CISO, is a tough job.<br \/>\nHigh-profile tough. CISOs are on the frontlines protecting against the TBD unknown, day after day,<br \/>\nweek after week, month after month. Threats are relentless. Work is unpredictable. Staff shortages<br \/>\ncontinue to fuel a vicious cycle of burnout. On top of it all, the buck stops with the CISO. When things<br \/>\ngo wrong, they&rsquo;re positioned as being the throat to choke, as Forbes recently put it. It&rsquo;s no wonder<br \/>\nmental health issues such as depression and anxiety are surging in our industry.<br \/>\n[00:01:03.130] &#8211; David Puner<br \/>\nThere&rsquo;s a lot of things that need to change, but fortunately, this once-taboo subject is starting to get<br \/>\nthe attention it so desperately deserves thanks to security leaders who are stepping forward. Their<br \/>\npersonal stories help humanize the cybersecurity team. They acknowledge that despite the sleepless<br \/>\nnights and heroic efforts, protectors of digital space are indeed human. As the stakes continuously<br \/>\ngrow higher, so too does the need for true support, empathy, and action.<br \/>\n[00:01:34.940] &#8211; David Puner<br \/>\nThis October is not only Cybersecurity Awareness Month, but also National Depression and Mental<br \/>\nHealth Screening Month, a time to elevate this critical conversation, advocate against stigma, and<br \/>\nbring awareness to the various resources available to those who need them. I&rsquo;m honored today to<br \/>\nhost Trust Issues alongside our guest, Kirsten Davies, who&rsquo;s the CISO for Unilever and passionate<br \/>\nabout humanizing the teams in our cybersecurity community.<br \/>\n[00:02:00.860] &#8211; David Puner<br \/>\nUnilever is, of course, a huge company with hundreds of brands and products beneath its umbrella.<br \/>\nTo try to wrap your head around the potential scope of being its CISO is daunting, to say the least. As<br \/>\nKirsten tells it, the responsibility and accountability in the CISO role are enormous, and burnout and<br \/>\nstress are at a crisis level. She feels this acutely. We get into that and lots of other things that are on<br \/>\nthe mind of a big-time CISO with the same number of hours and minutes in her day that we all have.<br \/>\n[00:02:31.100] &#8211; David Puner<br \/>\nIt was great to get the opportunity to talk with Kirsten. Her candor is admirable and her shoes are<br \/>\nlarge. Here&rsquo;s our conversation.<br \/>\n[00:02:53.100] &#8211; David Puner<br \/>\nYou are the CISO for Unilever, which is a massive global consumer packaged goods company with<br \/>\nover 400 consumer goods brands and 148,000 employees. Some of the brands I&rsquo;m sure people are<br \/>\nfamiliar with. Overly familiar with Hellmann&rsquo;s, Ben &amp; Jerry&rsquo;s, Dove, Seventh Generation, Vaseline. There<br \/>\nare so many. To dive in and just start out broad, what does your role as Unilever CISO encompass,<br \/>\nand what&rsquo;s a typical day look like for you if there is such a thing?<br \/>\n[00:03:28.920] &#8211; Kirsten Davies<br \/>\nThat&rsquo;s a great question. I wonder if you can ask any CISO what their typical day is. It varies. I think it&rsquo;s<br \/>\none of the things that we love about the work is that there are new challenges that emerge every day.<br \/>\nGreat company. We produce 50% of the world&rsquo;s ice cream. That&rsquo;s a heck of a lot of smiles. I&rsquo;m telling<br \/>\nyou, that&rsquo;s a heck of a lot of smiles all around the world. The remit for the program is end-to-end<br \/>\ncybersecurity risk for the organization. That includes the typical that you would expect. It&rsquo;s the<br \/>\nmanaged technology estate, the managed IT estate as it used to be known, but it goes much further<br \/>\nthan that as well. We see risk in a very broad, holistic way at Unilever. So it&rsquo;s everything from the<br \/>\nregulatory and compliance challenges that we have globally from our footprints in over 180 countries<br \/>\nglobally to the operational resilience of things like our core network, yes, but also our factories,<br \/>\ndistribution centers, R&amp;D, all of that kind of a thing.<br \/>\n[00:04:34.620] &#8211; Kirsten Davies<br \/>\nWe also look at information protection and information security as one would expect that we would.<br \/>\nWe look at the security and resilience of all of our technology touchpoints, all of our digital<br \/>\ninteractions from our factories to our technology, traditional IT as well. Then finally, probably<br \/>\nsomething that we&rsquo;ll double-click into a little bit more in a bit is the culture. It&rsquo;s the capability, yes, of<br \/>\nmy team, of the cybersecurity team, the core team itself, but also the security mindset of the<br \/>\norganization because that is critical from an enterprise cybersecurity risk perspective that the culture<br \/>\nembraces cybersecurity, cyber safety as part of their responsibilities.<br \/>\n[00:05:25.590] &#8211; David Puner<br \/>\nHow big is your team? You&rsquo;ve been with the company now for about a year or so. How have things<br \/>\nchanged since you&rsquo;ve arrived?<br \/>\n[00:05:35.790] &#8211; Kirsten Davies<br \/>\nYeah, I sure have. I actually just celebrated my one-year anniversary, I think it was a week ago.<br \/>\n[00:05:40.440] &#8211; David Puner<br \/>\nCongratulations.<br \/>\n[00:05:41.430] &#8211; Kirsten Davies<br \/>\nThank you. Yes. Made it. It&rsquo;s been such a unique challenge coming out of COVID, the lockdownlockdown<br \/>\nglobally of COVID into this new emerging world of how do we do these things in hybrid<br \/>\nmode. How do we approach cybersecurity and how do we do business, right? There&rsquo;s a lot of<br \/>\ncompanies that are still figuring this out. While I don&rsquo;t publish the numbers of my team and have<br \/>\nnever done so, I&rsquo;d say that it&rsquo;s really an interesting conversation to have to say what are the things that<br \/>\nwe&rsquo;re focused on and what has changed since I&rsquo;ve been on board.<br \/>\n[00:06:25.800] &#8211; Kirsten Davies<br \/>\nDue credit and respect to my predecessors in this role. Nobody has an easy job as a CISO these days.<br \/>\nNo one does. At no organization is this job easy. I&rsquo;m standing on the shoulders of giants, as it were,<br \/>\nthat have been evolving and managing and elevating the security posture of this organization. I&rsquo;ve<br \/>\npicked up a bit where some of them have left off and some really great work that they were able to<br \/>\naccomplish in their tenures here.<br \/>\n[00:07:03.000] &#8211; Kirsten Davies<br \/>\nWe&rsquo;re evolving right now. I&rsquo;m reorganizing the team to reflect the broader remit that we have now that<br \/>\nI&rsquo;m on board to reflect the rise of the CISO, as we call it, which is essentially I don&rsquo;t sit inside of IT. My<br \/>\nteam sits alongside of IT. We sit alongside supply chain, we sit alongside the data office, and we work<br \/>\nand partner and influence and solution engineer alongside all of these teams. There&rsquo;s been a<br \/>\nfundamental shift, I would say, during my tenure here, and that has matched, as it should, the shift in<br \/>\nour organization, too.<br \/>\n[00:07:48.780] &#8211; Kirsten Davies<br \/>\nIt&rsquo;s public knowledge that we&rsquo;re undergoing a massive transition at Unilever, where we have the focus<br \/>\nof five, the power of one, focus of five being the five different business groups that we have that are<br \/>\nend-to-end global. Ice cream being one of them, right? Health and well-being and nutrition, things like<br \/>\nthat. We&rsquo;ve we&rsquo;ve necessarily needed to not only respond to that change but also partner in and<br \/>\nenable that change for Unilever to ensure the success of our business colleagues and us as a whole<br \/>\nas Unilever.<br \/>\n[00:08:21.890] &#8211; David Puner<br \/>\nOrganizational change, that&rsquo;s something that isn&rsquo;t necessarily new to you. You&rsquo;ve worked in some<br \/>\nother companies that people out there may have heard of like Estee Lauder, Barclays, Hewlett-<br \/>\nPackard, Booz Allen Hamilton, Deloitte. Big names, long list. How is organizational change something<br \/>\nthat&rsquo;s been a hallmark to your career and what have you learned along the way that you&rsquo;re putting into<br \/>\nplace now?<br \/>\n[00:08:48.140] &#8211; Kirsten Davies<br \/>\nI read an amazing series of books quite some time ago, Built to Last, and the subsequent book to that<br \/>\nwas Built to Change. What&rsquo;s happened, and I&rsquo;m sure you&rsquo;ve seen this and your audience has seen this<br \/>\nover time, is that companies who have designed themselves for steadfastness and, quote-unquote,<br \/>\n\u00ab\u00a0security\u00a0\u00bb or foundational stability in the market, aka Kodak, have been left behind in a lot of the<br \/>\nchanges that we have seen globally speaking, from the rapid pace of technology innovation to rapid<br \/>\ndigitization of everything. Everything is connected now, right? To changing consumer habits and<br \/>\nbuying patterns, to changes in the workforce where we have five generations in the workforce right<br \/>\nnow. First time in history that that&rsquo;s ever happened short of being in small ma and pa companies,<br \/>\nright? And so the hallmark of my career has been change. I am a change manager. I&rsquo;m a change<br \/>\ninstigator, as it were, and I&rsquo;m a change influencer.<br \/>\n[00:09:59.990] &#8211; Kirsten Davies<br \/>\nI think that we constantly, especially in the cybersecurity industry, but also in business, of course, but<br \/>\nwe&rsquo;re speaking today about cybersecurity, we need to be evolving. Why? The threats are evolving. The<br \/>\nthreat actors are evolving. The technology that they&rsquo;re using to attack is evolving. The velocity and the<br \/>\nrapid pace with which the change has come on the attackers&rsquo; side needs to be met with a dynamic<br \/>\nworkforce, a dynamic technical capability, and a dynamic culture in order for us to even just respond<br \/>\nin kind, let alone get ahead of these things.<br \/>\n[00:10:42.290] &#8211; Kirsten Davies<br \/>\nThat&rsquo;s been part of it, too. We want to have these wonderful, challenging environments for our teams<br \/>\nbecause people get bored, right? Nobody wants to stare at a screen anymore and look for alerts.<br \/>\nPeople just get bored and there&rsquo;s fatigue in all of this, and so we need to be shifting and really just<br \/>\ninserting dynamism into our organization, into the processes that are there in order to just inject this<br \/>\nability to be agile and to innovate all of the time.<br \/>\n[00:11:18.080] &#8211; David Puner<br \/>\nDo you think that it&rsquo;s possible to be a successful CISO if you&rsquo;re not a change instigator? Really like<br \/>\nthat term, by the way.<br \/>\n[00:11:26.720] &#8211; Kirsten Davies<br \/>\nWell, I&rsquo;m not going to make a commentary on my colleagues for that. I think for me to be a successful<br \/>\nCISO, I need to be able to embrace change very closely. Often, as has been the hallmark of my career,<br \/>\nI&rsquo;ve been brought in to change things for whatever reason.<br \/>\n[00:11:47.690] &#8211; Kirsten Davies<br \/>\nWe were transforming the Global Information Security Program at Siemens, 335,000 employees,<br \/>\ndouble that in business partner connections at the time, right? Enormous ask. There were 26 people<br \/>\nthat had the title of CISO across Siemens when I came on board and was supporting and helping and<br \/>\nleading and serving that organization.<br \/>\n[00:12:06.620] &#8211; Kirsten Davies<br \/>\nLikewise, when I went to Hewlett-Packard Enterprise, they were right in the middle of the split. The<br \/>\nlargest business split in the history of business at the time was the HPE-HPI split, right? Having<br \/>\nstayed on the HPE side, which is what I was hired to come in and do, we were needing to restrategize.<br \/>\nWhat did cybersecurity look like for the enterprise side, being a service delivery partner to Inc as it<br \/>\nwas standing up for the printers and personal devices?<br \/>\n[00:12:39.350] &#8211; Kirsten Davies<br \/>\nA very dear friend of mine is the CISO there now who we exchanged\u2026 Almost I feel like we changed<br \/>\nseats from Siemens to HP and all of that kind of a thing and she&rsquo;s the CISO now at HP Inc.<br \/>\n[00:12:51.550] &#8211; Kirsten Davies<br \/>\nIt&rsquo;s been a hallmark of my career, which is we need to do things differently and we don&rsquo;t always have<br \/>\nthe answers from the very beginning. But it&rsquo;s an evolution as the change happens. I think that<br \/>\neverybody has a little piece of the solution, and so it&rsquo;s also about bringing in all of those threads of<br \/>\nlogic, the threads of analysis, the threads of insight, and bringing those things together to make<br \/>\nsomething that&rsquo;s much more holistic and dynamic than it was before we started.<br \/>\n[00:13:21.010] &#8211; David Puner<br \/>\nIn order to do that, you need people who come from various backgrounds that can look at things<br \/>\nthrough different filters. Obviously, one of the things we hear about a lot, we talk about a lot within the<br \/>\nindustry is the talent shortage, the skills gap. How are you navigating that? How are you getting<br \/>\ncreative when it comes to hiring and finding cyber talent?<br \/>\n[00:13:43.180] &#8211; Kirsten Davies<br \/>\nYeah, also one of the things I&rsquo;m very passionate about, not having grown up in IT, not having been<br \/>\ndyed in the wool architecture.<br \/>\n[00:13:57.310] &#8211; David Puner<br \/>\nDid I read somewhere that you wanted to be a spy at some point?<br \/>\n[00:14:00.430] &#8211; Kirsten Davies<br \/>\nYes, I did. Now I just work against the bad guys. But maybe it&rsquo;s the same thing at the end of the day.<br \/>\nI&rsquo;m not sure. I actually was a professional musician, singer-songwriter for a while, and there&rsquo;s other<br \/>\ninterviews that I&rsquo;ve done that talk about that career progression. But the bottom line premise for me<br \/>\nhas been anybody can get into this field if they have the right training, number one, and number two,<br \/>\nthe right opportunity, and number three, yes, coaching, mentoring. There&rsquo;s such a broader risk<br \/>\nlandscape now in cybersecurity than just the deep technical aspects that will always be a core of<br \/>\nwhat we do.<br \/>\n[00:14:42.430] &#8211; Kirsten Davies<br \/>\nBut when it comes to a talent perspective, that&rsquo;s also been one of the hypotheses turned proven facts<br \/>\nthat I&rsquo;ve pursued, which is anybody can get into this career and be successful at it. There&rsquo;s a number<br \/>\nof companies that are doing this now.<br \/>\n[00:14:59.140] &#8211; Kirsten Davies<br \/>\nWe&rsquo;re working with an amazing organization out of Nigeria that is working with women between the<br \/>\nages of, I think it&rsquo;s 16 to 27 and developing some just amazing talent right in Nigeria. We&rsquo;re working<br \/>\nwith them. There&rsquo;s another company in the United States that&rsquo;s taken an approach to developing rural<br \/>\ntalent based upon some tax input, some mayoral things, government things in the state, and then<br \/>\nretraining veterans and nurses and educators to be doing cybersecurity. Likewise, I built a pilot<br \/>\nprogram in South Africa when I was with Barclays, with the support of the bank, with the support of<br \/>\nthe South African governments and Rhodes University to create an incubation function, as it were to<br \/>\ndevelop some entry-level cybersecurity talent from people who are going to be losing their jobs due to<br \/>\nautomation.<br \/>\n[00:16:01.120] &#8211; Kirsten Davies<br \/>\nI believe wholeheartedly this can be done. We need to be doing this at scale. That&rsquo;s one of the things<br \/>\nas an industry, I really feel that that we as executives in the industry really need to embrace this and<br \/>\ntackle this. I&rsquo;m doing my part. I&rsquo;ve proven the model could work. I didn&rsquo;t start in tech, and yet here I am,<br \/>\nand so I really feel like anybody can do this with the right opportunities, training, mentoring, all of that.<br \/>\n[00:16:28.270] &#8211; David Puner<br \/>\nEntry level would be the key.<br \/>\n[00:16:30.160] &#8211; Kirsten Davies<br \/>\nYeah, no, it&rsquo;s true. It&rsquo;s true. I think one of the challenges is there&rsquo;s a multifocal challenge that we have.<br \/>\nBudgets are infamously constrained in cybersecurity and I hate to lean on budgets, but the budget<br \/>\nunlock is such an important thing. For every dollar that we get, we need to have a multiplier effect on<br \/>\nthe dollar, the pound, the euro that we have to spend on cybersecurity. We have often then been really<br \/>\nfunneled into a pathway that says we have to hire the most experienced person that we possibly can<br \/>\nafford because we need them to hit the ground running. That&rsquo;s always been the case. Well, guess<br \/>\nwhat? We&rsquo;ve created this monster of an environment where people hop from job to job based upon<br \/>\npay, right? They hop job to job based on other things as well. But it&rsquo;s the organizations that can afford<br \/>\nto pay higher rates for cybersecurity will poach and I don&rsquo;t blame them and at the same time I&rsquo;m like,<br \/>\n\u00ab\u00a0Stop, just stop.\u00a0\u00bb Right?<br \/>\n[00:17:43.210] &#8211; Kirsten Davies<br \/>\nI get it. We have a high competition factor for pay. We have, therefore, a high competition factor for<br \/>\npeople with experience. Because if you&rsquo;re expecting the people to be able to hit the ground running,<br \/>\nguess what we&rsquo;re not doing? We&rsquo;re not investing in entry-level talent. We&rsquo;re not investing in businessside<br \/>\ntalent that only requires a little bit of contextual cyber education.<br \/>\n[00:18:10.640] &#8211; Kirsten Davies<br \/>\nFor example, having people from in manufacturing, hiring people in from the supply chain side.<br \/>\nThey&rsquo;re engineers. They understand it. They just need to understand MITRE attack, threat pathways.<br \/>\nThey need to understand the cyber side of it, and that can be a multiplier effect for their<br \/>\nunderstanding of how a manufacturing belt works, how the robotics arms work, how driverless cars<br \/>\nwork in the sense of moving inventory around.<br \/>\n[00:18:46.770] &#8211; Kirsten Davies<br \/>\nI think we need to be much more creative around that. The problems of it have been around budget,<br \/>\nfilled with headcount approvals, filled with shortage of talent in the market. I believe that we as the<br \/>\nbiggies, the bigger organizations, we really need to be addressing this and start investing in and<br \/>\nrecruiting in the startup, right, the entry-level talent. I know that there&rsquo;s a lot of organizations that are<br \/>\ndoing it, which is good. We needed to be doing this 10 years ago, but we&rsquo;re getting there.<br \/>\n[00:19:27.990] &#8211; David Puner<br \/>\nGreat. Thank you for that. Moving on to a different subject, sort of. All of them are related, of course,<br \/>\nthough. You speak quite a bit about personal resilience. How is that particularly pertinent to the CISO<br \/>\nrole right now?<br \/>\n[00:19:43.590] &#8211; Kirsten Davies<br \/>\nIt&rsquo;s a topic that&rsquo;s very near and dear to my heart. With the advent of the global pandemic and the<br \/>\nlockdowns and everybody having to necessarily have an all hands on deck approach to provisioning<br \/>\nIT, provisioning access. How do we get people working in different ways? Some companies are<br \/>\ndigitally native, and I think that they came out of that much more rapidly and they were able to get to a<br \/>\nBAU much more rapidly than other companies were able to do so. What I&rsquo;ve seen has been the<br \/>\nhallmark, though, is a couple of things. In 2016, there was a study that came out that named the<br \/>\nnumber out of four CISOs that are abusing alcohol and prescription medication in order to deal with<br \/>\nthe level of stress of the day. That was in 2016. That was pre-COVID. I think it was one out of four.<br \/>\nSomebody asked me about that and they said, \u00ab\u00a0What do you think of this?\u00a0\u00bb And I said, \u00ab\u00a0That&rsquo;s all? I<br \/>\nthink it&rsquo;s actually more than that,\u00a0\u00bb tongue-in-cheek but literally.<br \/>\n[00:20:50.190] &#8211; Kirsten Davies<br \/>\nPre-COVID, we knew that we already had an issue with this, that the stress levels and the<br \/>\nresponsibility and the accountability in this role are enormous. You feel a bit like Atlas with the weight<br \/>\nof the world on your shoulders at times. Then you add COVID into this, and a lot of us as the CISOs<br \/>\nwere the tip of the point of the spear when it came to really driving availability and resilience. We were<br \/>\npartnering with our CIO organizations. We were working with our business partners globally. We were<br \/>\ncaretaking people, caretaking any number of outages and stress factors that were there.<br \/>\n[00:21:29.700] &#8211; Kirsten Davies<br \/>\nWhen the businesses that we serve were able to get to a little bit of a level of exhale and find a<br \/>\nrhythm, what I witnessed was nobody was taking care of the cyber security teams, and the CISOs who<br \/>\nhad been the tip of the point of the spear for so long were now at crisis levels of adrenaline, crisis<br \/>\nlevels of stress, really overwhelming levels of feeling responsible and accountable. It&rsquo;s that fight or<br \/>\nflight mentality, right, that we go through.<br \/>\n[00:22:07.320] &#8211; Kirsten Davies<br \/>\nPost-COVID now, which I, fingers crossed, say that we&rsquo;re in a post-COVID world. To a certain extent<br \/>\nwe are. I see teams working just as hard as they were during that crisis. The hours that we put in as<br \/>\nCISOs are unsustainable. The hours our teams are putting in, completely unsustainable. Yet the<br \/>\nattacks still come because the threat actors are still out there, right? Everything is still there. I talk<br \/>\nabout this a bit, and I&rsquo;ve been public about it because I feel like sometimes it&rsquo;s a bit of a taboo topic to<br \/>\ntalk about mental health and mental resilience and personal resilience. But I&rsquo;ll tell you what, there are<br \/>\nsome folks out there who are really struggling and we need the support of one another. We need to be<br \/>\nable to talk about this much more openly.<br \/>\n[00:23:05.870] &#8211; David Puner<br \/>\nWhat do you think is key to a solution?<br \/>\n[00:23:08.510] &#8211; Kirsten Davies<br \/>\nThere&rsquo;s a couple of things, and I think that&rsquo;s a great question. I think we all need to discover what that<br \/>\nlooks like for us individually and for our teams as leaders. Transparency is key. I personally had to<br \/>\nhave a conversation with my team when I was going through some health challenges. And then my<br \/>\nmom has been going through some health challenges and I had to be transparent with my team and<br \/>\ngo, \u00ab\u00a0You know what? I&rsquo;m having some challenges here in my personal life and it&rsquo;s going to bleed over<br \/>\ninto my professional life.\u00a0\u00bb Not because I&rsquo;m weak, not because I can&rsquo;t manage or I can&rsquo;t handle it. Just<br \/>\nbecause we can&rsquo;t, post-COVID, separate our personal lives from our professional lives anymore.<br \/>\nEverything&rsquo;s merged. I&rsquo;m on the podcast with you from my home office.<br \/>\n[00:24:01.490] &#8211; David Puner<br \/>\nWhich is in Nashville, I should point out.<br \/>\n[00:24:02.840] &#8211; Kirsten Davies<br \/>\nWhich is in Nashville, Tennessee, and my job is in London, right? So it&rsquo;s impossible anymore to<br \/>\nseparate those two things. I think there&rsquo;s there&rsquo;s an amount of self-awareness and transparency that&rsquo;s<br \/>\nneeded with our teams. I think that that also creates a pathway for our teams to be honest with us<br \/>\nand to let us know when they&rsquo;re struggling. Even just with the visibility, it creates an opportunity for<br \/>\ndiscussion, for solution, for even just empathy. Empathy because we&rsquo;re all going through something.<br \/>\nWe&rsquo;re human. We&rsquo;re all going through something right now.<br \/>\n[00:24:41.660] &#8211; Kirsten Davies<br \/>\nI think that&rsquo;s key right there. I think we need to model the behavior\u2026 This goes with the transparency.<br \/>\nWe need to model the behavior that we expect of our teams, which is difficult in a global environment.<br \/>\nI&rsquo;m emailing at very odd hours for a team that&rsquo;s\u2026 some of my team sitting in India. But we need to<br \/>\nmodel the behavior that gives them permission to be human, which is family first, right? Take your<br \/>\nvacations. If I&rsquo;m emailing you on an off hour, I don&rsquo;t expect your response until you&rsquo;re actually back in<br \/>\noffice or back on, quote-unquote, \u00ab\u00a0normal\u00a0\u00bb office hours. I think just those simple keys are super<br \/>\nhelpful to it. I think honestly, we need to lean into and get support from our HR business partners as<br \/>\nwell, because we&rsquo;re seeing that this is really a challenge for big corporates and big organizations and<br \/>\npeople. We&rsquo;re human. We&rsquo;re human first. We&rsquo;re workers later, right? We&rsquo;re human first, and we need<br \/>\nsupport for the human experience that we&rsquo;ve all gone through.<br \/>\n[00:25:50.990] &#8211; David Puner<br \/>\nA bio of yours, I&rsquo;ve read, says you design and lead holistic digital trust programs. You, of course, had<br \/>\nus at trust. But what does this mean and how does trust factor into what you do?<br \/>\n[00:26:05.360] &#8211; Kirsten Davies<br \/>\nThat&rsquo;s a great question. Trust is at the core of everything that we need, both in human interactions, in<br \/>\ndigital interactions, right, and in corporate legislative, every interaction. The depth that we build that<br \/>\ntrust is going to equal the lengths to which we will excel in relationships, in corporate initiatives, and<br \/>\nthings like that. Let me give you a specific example. Statistically, it has been shown that consumers<br \/>\nwill leave their favorite company, favorite brand, favorite product if they lose trust in that. Some of<br \/>\nthat is the safety of the product, right? So the ingredients and things like that. Some of it is in, well,<br \/>\nhow I interacted as a consumer with that company. If there&rsquo;s a data breach on an e-commerce<br \/>\nplatform, right, statistically, it&rsquo;s shown that the measure with which consumers lose the trust in the<br \/>\norganization or in the product is the level with which they will vote with their feet, as we say. Stay or<br \/>\nleave, right?<br \/>\n[00:27:24.410] &#8211; Kirsten Davies<br \/>\nOne of the things I love about Unilever is our commitment to product safety, product quality, and the<br \/>\nsafety of our colleagues in factories. Right? We have leveraged that to be also the way in which we<br \/>\ntalk about cyber safety and the trust that we build in all of our interactions. Digital interactions, data<br \/>\nflows, handshakes of applications themselves or OT environment, things like that. Some of the things,<br \/>\nthey won&rsquo;t be aware of, the things that are happening behind the scenes, but that&rsquo;s what we want to<br \/>\nbuild in every interaction we have with regulators, with shareholders, with consumers, with our<br \/>\ncustomer bases, with each other as colleagues as well. We want to be able to and we should be able<br \/>\nto trust that our interactions are secure, that they are risk managed, right, that privacy data is kept<br \/>\nprivate, things like that.<br \/>\n[00:28:21.770] &#8211; Kirsten Davies<br \/>\nIs there a such thing as 100%? No. No, I&rsquo;m not saying that. What I&rsquo;m saying is that is our job is to build<br \/>\ntrust everywhere we go. That positively directly impacts the reputation of the organizations that we<br \/>\nserve. Everyone has a responsibility to ensure that the organization remains cyber safe, and that<br \/>\ncovers email phishing, to vishing, smishing, to factories, to infrastructure, to everything, data<br \/>\neverywhere, right? That is super, super important for organizations to embrace. It&rsquo;s not the CISO&rsquo;s job<br \/>\nor the CISO&rsquo;s program job to do everything security. It&rsquo;s everyone&rsquo;s job. Everyone&rsquo;s job.<br \/>\n[00:29:15.080] &#8211; Kirsten Davies<br \/>\nFor sure. From a cultural standpoint, which is something you had mentioned earlier on in the<br \/>\ndiscussion, how far have things come along since you&rsquo;ve joined the organization?<br \/>\n[00:29:27.200] &#8211; Kirsten Davies<br \/>\nYeah, the team has done a great job. Again, standing on the shoulders of giants that came before me.<br \/>\nOne of the things I walked into in the role was quite a strong awareness and training area that we&rsquo;ve<br \/>\nsimply just made stronger now, right? We&rsquo;ve done more. We have an amazing campaign we&rsquo;re about<br \/>\nready to launch. I cannot tell you what it is, but I am so super excited. We&rsquo;re leveraging some of our<br \/>\nbrand names. It&rsquo;s an internal cyber awareness campaign. We&rsquo;ve got the-<br \/>\n[00:29:58.100] &#8211; David Puner<br \/>\nDoes it involve ice cream?<br \/>\n[00:30:00.140] &#8211; Kirsten Davies<br \/>\nIt does, actually, it does. We got permission from the brands to use their brands. We&rsquo;ve got<br \/>\npermission from some different folks, corporate comms and from our PR teams to do some pretty<br \/>\nunconventional things because things aren&rsquo;t always what they seem.<br \/>\n[00:30:19.620] &#8211; David Puner<br \/>\nSounds fantastic. Looking forward to having you back on again so we can hear how that went and get<br \/>\nall the details about it. We&rsquo;ll have to talk to you a little bit about your passion projects. You&rsquo;ve got<br \/>\nmany of them. Are there any in particular right now that you&rsquo;re feeling particularly passionate about?<br \/>\n[00:30:33.800] &#8211; Kirsten Davies<br \/>\nI&rsquo;m particularly passionate about fighting cancer. My mom has been stricken by it and I am<br \/>\nparticularly passionate about this. I&rsquo;ve been involved with the Breast Cancer Research Foundation<br \/>\nsince being at Estee Lauder companies. As a matter of fact, shortly there&rsquo;s the Tech Day of Pink that<br \/>\nthe CIO there started as his passion project, which I love. People and companies around the world are<br \/>\ncommitting their technology teams to wearing pink on a specific day. I&rsquo;m also involved locally in<br \/>\nNashville with the Nashville Wine Auction that is wine and cancer research. I love it. It&rsquo;s a great<br \/>\ncompany of worlds for me that&rsquo;s there. But we do a lot of some great foundations here in Nashville<br \/>\nthat we support, not the least of which is the St. Jude Children&rsquo;s Hospital, the Vanderbilt research<br \/>\ncommunity that&rsquo;s there.<br \/>\n[00:31:32.450] &#8211; Kirsten Davies<br \/>\nSecondly, as things would have it, I&rsquo;ve been blessed to be placed in a leadership position as a woman<br \/>\nin a field where there are not a lot of women in my role, right? I never saw myself as a female CISO or<br \/>\na female practitioner. I&rsquo;m just a practitioner. However, I think that when you sit in this chair, when one<br \/>\nsits in this chair, and when one has the rare opportunity to kind of lift your head up and look around a<br \/>\nlittle bit, I have become increasingly passionate about women in not just in this field, but women in<br \/>\ntechnology and opportunities for women around the world.<br \/>\n[00:32:23.280] &#8211; Kirsten Davies<br \/>\nI&rsquo;ve partnered in with Nomi Network, which is in India, and we adopt a whole village of women and<br \/>\nprovide for them education and opportunities for raising their own income, right, and providing them<br \/>\nan opportunity that&rsquo;s outside of some of the crime and stuff that happens in underdeveloped areas of<br \/>\nthe world. Which leads secondly, to I&rsquo;m super, super passionate about fighting human trafficking. I&rsquo;m<br \/>\na direct sponsor and partner with A21. There&rsquo;s many organizations out there, but I think you can kind<br \/>\nof see the theme of opportunities that I&rsquo;ve had, even with my background, which would not have led<br \/>\nme to a technology field or a CISO career.<br \/>\n[00:33:14.490] &#8211; Kirsten Davies<br \/>\nOpportunities that I had as a woman, even though I didn&rsquo;t see myself as being the female X, right, the<br \/>\nfemale fill-in-the-blank, I&rsquo;ve taken upon that as just there&rsquo;s a responsibility and there&rsquo;s a weight that<br \/>\ncomes with that. That it&rsquo;s an honor to be able to carry that weight and to do the best that I can to<br \/>\nmake a difference in women&rsquo;s lives around the world. Women and girls and people in general, yes, but<br \/>\nwomen and girls especially.<br \/>\n[00:33:44.010] &#8211; David Puner<br \/>\nYou had mentioned coffee before we started recording, and I can imagine that plays a very significant<br \/>\nrole in your day-to-day. We appreciate you being caffeinated today and talking with us.<br \/>\n[00:33:56.760] &#8211; Kirsten Davies<br \/>\nThank you for having me. What a pleasure to be on this. Thank you so much.<br \/>\n[00:34:12.270] &#8211; David Puner<br \/>\nThanks for listening to today&rsquo;s episode of Trust Issues. We&rsquo;d love to hear from you. If you have a<br \/>\nquestion, comment, constructive comment preferably, but it&rsquo;s up to you, or an episode suggestion,<br \/>\nplease drop us an email at trustissues@cyberark.com. And make sure you&rsquo;re following us wherever<br \/>\nyou listen to podcasts.<\/div>\n","protected":false},"featured_media":214332,"template":"","class_list":["post-143270","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 14 - Humanizing Cybersecurity | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 14 - Humanizing Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It&rsquo;s no wonder mental health issues such as depression...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T00:18:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"26 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/\",\"name\":\"EP 14 - Humanizing Cybersecurity | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg\",\"datePublished\":\"2022-10-25T14:58:00+00:00\",\"dateModified\":\"2026-04-10T00:18:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 14 &#8211; Humanizing Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 14 - Humanizing Cybersecurity | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/","og_locale":"fr_FR","og_type":"article","og_title":"EP 14 - Humanizing Cybersecurity","og_description":"Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It&rsquo;s no wonder mental health issues such as depression...","og_url":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-10T00:18:41+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"26 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/","url":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/","name":"EP 14 - Humanizing Cybersecurity | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg","datePublished":"2022-10-25T14:58:00+00:00","dateModified":"2026-04-10T00:18:41+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/10\/cnR3b3JrLmpwZw-2.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/ep-14-humanizing-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"EP 14 &#8211; Humanizing Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast\/143270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media\/214332"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=143270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}