/
Zero-Trust-Segmentierung

What Nonprofits are Teaching the Cybersecurity Industry

Dr. Kelley Misata, founder and CEO of Sightline Security
Dr. Kelley Misata, founder and CEO of Sightline Security

What if we approached cybersecurity not as a compliance checkbox or a crisis response but as an act of service?  

That was the question I kept returning to after my conversation with Dr. Kelley Misata, founder and CEO of Sightline Security, on the latest episode of The Segment.  

Misata's path into cybersecurity wasn't typical. It was personal. After being stalked for years by someone using anonymizing technologies, she pursued a Ph.D. in information security to understand how digital tools could protect and harm.  

That experience shaped her empathy-first approach and her belief in demystifying security for everyone.

The nonprofit cyber gap

Misata’s work sits at the intersection of cybersecurity and the nonprofit world, where mission-driven organizations often operate on razor-thin margins and with limited technical support.  

But as she made clear, that doesn't mean they lack sophistication or purpose. In fact, the opposite is often true.

Whether it's a domestic violence shelter, a food bank, or a suicide prevention nonprofit, the stakes are human, not just financial. That means traditional approaches to cybersecurity don't always translate.  

Language like “asset inventory” or “control frameworks” can feel abstract or even alienating in environments where people simply try to help others survive the day.

A powerful story Kelley shared was about a suicide support organization that intentionally runs an open forum. When Kelley raised potential risks, the founder explained that their community needed a place to observe and feel safe before participating.

“‘This is what our community needs,’” the founder told Misata.

That moment changed how she viewed security risk, not as something to stamp out but as something to work with thoughtfully.

Building security into everyday behavior

Misata advocates for a mindset shift — one that embeds cybersecurity into everyday behavior instead of relegating it to siloed IT departments.

“My dream is that we're going to step back and we're going to say, ‘Huh, maybe we should think again about it,’” she said. “So, it's almost taking that pause instead of it being like, ‘Oh gosh, we've got to go talk to the security team.’”

That kind of cultural shift takes time. “I think folks in the security space are impatient when it comes to that,” she said. “And I hope that maybe I bring a little bit of patience to the conversation to say, ‘It's okay. We've made progress. Let’s just keep going.’”

Listen first, then secure

This mindset mirrors Misata’s work at Sightline Security, where she and her team translate security frameworks into language that makes sense for nonprofits. They do this not by dumbing things down but by listening first.

“I might know cybersecurity, but I don't know your mission. So, let’s start there,” she tells nonprofits.

But she cautioned against rushing in with answers.

“Don't go in like a superhero,” she said. “Go in with humility. Ask how they operate. What do they care about? That's how you make progress.”

We also discussed the growing role of open-source software, especially in nonprofit environments, where cost-effective solutions are essential.  

Misata’s advice: Treat open-source projects like third-party vendors. Ask questions. Understand governance. Know who's maintaining the code.

Building cybersecurity trust in a Zero Trust world

We often talk about Zero Trust in terms of architecture: verifying users, segmenting networks, and eliminating implicit trust.  

But Misata’s work reminds us that Zero Trust is also a cultural posture. It’s about not making assumptions — about people, about technology, about what “good security” looks like.

Instead, it's about curiosity. It's about meeting organizations where they are and asking, what do you need to be secure in your context?

Misata’s message is refreshingly human in a world that prizes speed and control. Security isn’t about being the smartest person in the room. It’s about being the most present — listening, learning, and adapting.

Her story is a reminder that real cyber resilience doesn’t come from perfect tools or airtight perimeters. It comes from a deep understanding of people — their fears, their missions, and their realities.

That’s the work that matters. And it starts by asking, not telling.

Listen, subscribe, and review The Segment: A Zero Trust Leadership Podcast

Want to hear my full discussion with Dr. Kelley Misata? Listen to this week’s episode on Apple Podcasts, Spotify, or wherever you get your podcasts. You can also read a full transcript of the episode.  

Verwandte Themen

Keine Artikel gefunden.

In Verbindung stehende Artikel

Implementieren Sie Zero Trust, um die hohen Kosten von Ausfallzeiten zu vermeiden
Zero-Trust-Segmentierung

Implementieren Sie Zero Trust, um die hohen Kosten von Ausfallzeiten zu vermeiden

In diesem Blog wird untersucht, wie Zero-Trust-Strategien Ihr Unternehmen vor dem Zeitpreis schützen können, der mit einer Sicherheitsverletzung einhergeht.

5 wichtige Einblicke vom Zero-Trust-Pionier Chase Cunningham
Zero-Trust-Segmentierung

5 wichtige Einblicke vom Zero-Trust-Pionier Chase Cunningham

Chase Cunningham, auch bekannt als Dr. Zero Trust, teilt seine Gedanken in dieser Zero Trust Leadership Podcast-Folge mit.

So planen Sie Ihre Roadmap für den Zero-Trust-Erfolg
Zero-Trust-Segmentierung

So planen Sie Ihre Roadmap für den Zero-Trust-Erfolg

Was sollte die Roadmap Ihres Unternehmens zur Zero-Trust-Implementierung beinhalten? Lernen Sie in diesem Blogbeitrag von den Experten mit Erkenntnissen und wichtigen Überlegungen von Forrester und Illumio.

Die Sicht eines Cyberpsychologen auf die Schuldkultur der Cybersicherheit
Zero-Trust-Segmentierung

Die Sicht eines Cyberpsychologen auf die Schuldkultur der Cybersicherheit

Erfahren Sie, wie Stress, KI-Bedrohungen und menschliches Verhalten Zero Trust für Cyber-Resilienz unverzichtbar machen.

Warum Medusa Ransomware eine wachsende Bedrohung für kritische Infrastrukturen darstellt
Eindämmung von Ransomware

Warum Medusa Ransomware eine wachsende Bedrohung für kritische Infrastrukturen darstellt

Erfahren Sie, wie Medusa Ransomware funktioniert und warum sie für kritische Infrastrukturen weltweit so gefährlich ist.

Weit mehr als Sichtbarkeit: Wie Illumio Insights Ihre kritischen Sicherheitspunkte miteinander verbindet
Cyber-Resilienz

Weit mehr als Sichtbarkeit: Wie Illumio Insights Ihre kritischen Sicherheitspunkte miteinander verbindet

Erfahren Sie, warum Beobachtbarkeit entscheidend ist, um Cyberrisiken zu verstehen und zu reduzieren.

Assume Breach.
Auswirkungen minimieren.
Erhöhen Sie die Widerstandsfähigkeit.

Sind Sie bereit, mehr über Zero-Trust-Segmentierung zu erfahren?