Why a Commitment to Employee Growth Matters With Jim Routh
"Don't hire for roles," says former MassMutual CISO Jim Routh in his conversation with Gene Fay, "hire people and create roles." Jim and Gene have a far-reaching conversation with a lot of great advice and a little laughter. From his accidental entrance into cybersecurity to his thinking on how to nurture employees and advice on how to get a foot in the door, their discussion is a great resource for those new to the field or those struggling with the cybersecurity skills gap.
Jim Routh has a long history in technology and cybersecurity as a leader and management consultant. He was formerly a cybersecurity leader for many large companies including MassMutual, CVS Health, Aetna, and JP Morgan Chase. He is also the former Board Chair for the Health Information Sharing & Analysis Center (H-ISAC) where he served for five years and former Board member for the Financial Services Information Sharing & Analysis Center (FS-ISAC). Jim currently sits on several Boards and acts as an advisor for several cybersecurity companies and venture funds. Jim brings to the boards a vast business and technology background and is considered a digital and cyber security industry expert and thought leader. Finally, Jim is an ICIT Fellow and an Adjunct Faculty member for NYU.
The Role of Cybersecurity Leaders as Educators: https://icitech.org/wp-content/uploads/2022/03/ICIT-Fellow-Perspective-The-Role-of-Cybersecurity-Leaders-as-Educators.pdf
LinkedIn: https://www.linkedin.com/in/jmrouth/
Jim Routh's Book List:
Cybersecurity and Cyberwar by Singer and Friedman
The Role of Cybersecurity Leaders as Educators: https://icitech.org/wp-content/uploads/2022/03/ICIT-Fellow-Perspective-The-Role-of-Cybersecurity-Leaders-as-Educators.pdf
LinkedIn: https://www.linkedin.com/in/jmrouth/
Jim Routh's Book List:
Cybersecurity and Cyberwar by Singer and Friedman
Dark Territory by Kaplan
The Perfect Weapon by Sanger
Sandworm by Greenberg
The Cuckoo’s Egg by Stoll
Spam Nation by Krebs
Future Crimes by Goodman
Data and Goliath by Schneier
Confront and Conceal by Sanger
The Fifth Domain by Clarke
America the Vulnerable by Brenner
The Code Book by Singh
Algorithms to Live By by Christian and Griffiths
Your Government Failed You by Clarke
Sting of the Drone by Clarke
Countdown to Zero Day by Zetter
Software Security: Building Security In by McGraw
@War by Harris
Fight Fire With Fire by Tarun
Kingpin by Poulsen
The Age of Surveillance Capitalism by Zuboff
The Internet in Everything by DeNardis
Senior Cyber by Schober
CISO Compass by Fitzgerald
This Is How They Tell Me the World Ends by Perlroth
Crimedotcom by White
Big Breaches by Daswani and Elbayadi
Innovating in a Secret World by Srivastava
Cyber Mayday by Lohrmann and Tan
Navigating the Cybersecurity Career Path by Patton
Tribe of Hackers by Carey and Jin
The PtaaS Book by Wong
CyberJutsu by McCarty
Cyber Defense Matrix by Yu
Shape by Ellenberg
So You Want to Talk About Race by Oluo
White Fragility by Diangelo
Hos to Be an Antiracist by Kendi
Sign up for exclusive API protection tips!
Get the latest and greatest content from ThreatX delivered directly to your inbox.