At the 3 Tree Tech Stealth Security Experience in Chicago, Rick Doten shut down one of the biggest misconceptions in cybersecurity: the lone wolf CISO. The idea that one person can single-handedly defend an entire organization is not just outdated, it is reckless. Security is not about heroics. At its core, it is about adaptability, relationships, and having the right people in the right places when things go sideways.
Doten, a seasoned cybersecurity leader, made it clear that CISOs do not operate in a vacuum. The best in the field are not the ones who obsess over frameworks and compliance checklists. They are the ones who build strong networks, think differently, and stay ahead of threats by questioning everything. His message was clear: cybersecurity is not about rigid processes. Ultimately, it is about having a team that knows how to respond when the plan no longer applies.
Expect the Unexpected
Cybersecurity is the one field where perfection is the expectation. No breaches, no downtime, no mistakes. However, perfection is impossible. So, the best security professionals focus on something else: adaptability. The ability to pivot, adjust, and respond is what separates those who survive from those who get steamrolled.
This is not an industry for rule-followers. The best in the field are the ones who think differently, question assumptions, and are willing to take calculated risks to protect what matters. Security is not about stacking up certifications or implementing frameworks. More importantly, it is about making sure that when something inevitably goes wrong, there is a plan and people who know how to execute it.
CISOs Don’t Get a Victory Lap
It is easy to see the impact of a good CIO. They modernize infrastructure, streamline operations, and deploy flashy new technology that executives can rally around. When a CISO does their job right? Nothing happens. No one notices. Until they do.
CISOs do not get awards. They do not get public praise. Instead, they get a target on their back when something fails. It is a job of constant pressure, where success is silent, and failure is career-ending. That is why security professionals do not have the luxury of treating their work like just another IT function. It is a mission. And it is a mission that only works if they have a network of trusted people who understand the stakes.
The Lone Wolf Myth is Killing Security Teams
For years, cybersecurity has been portrayed as a game for geniuses in dark rooms. The lone wolf hacker, the solo penetration tester, the one brilliant mind stopping attacks before they happen. It is nonsense. Security is a team sport. The best security professionals do not work alone, they build networks.
They know who to call when they see something unusual. They share intelligence, trade insights, and help each other fill in the gaps. The ones who try to do everything on their own burn out. The ones who embrace community not only survive but stay ahead of the game.
Security is a Moving Target
Many industries rely on structured, repeatable processes. You write a plan, follow it to the letter, and measure success based on adherence. That approach does not work in cybersecurity. The threats change daily. The tactics shift constantly. This is not a field where you can write a 200-page strategy and expect it to hold up six months later.
Security teams cannot afford to rely on rigid playbooks. Every attack is different. Every breach demands a unique response. The best teams are not the ones who blindly follow a checklist. They are the ones who assess, adapt, and respond in real time.
This is why hiring for security should never be about checking boxes. The strongest teams are made up of people who thrive in uncertainty, who love solving puzzles, and who are willing to rewrite the rules when the old ones stop making sense.
Security Requires Unconventional Thinkers
Security has always attracted people who see the world differently. Many of the best professionals in the field are neurodivergent. They spot patterns that others miss. They question assumptions others accept. They do not just follow security processes; they ask why those processes exist in the first place.
But traditional hiring models filter them out. Companies structure the interview process for polished corporate performers, not sharp but unconventional thinkers who spot vulnerabilities first. Workplaces favor those who thrive in structure over those who excel in controlled chaos.
If security teams want to stay ahead, they need to stop trying to mold people into a corporate template. Instead, they need to build environments where different ways of thinking are not just accepted but valued. The organizations that figure this out will be the ones that have the talent they need when the next crisis hits.
Redefining Success in Cybersecurity
For years, cybersecurity has been measured by compliance checklists, by whether or not the organization passed an audit. That mindset needs to die. Security is not about checking boxes. It is about understanding risks, preparing for the unexpected, and knowing that no amount of compliance paperwork will stop a ransomware attack.
Success is not about preventing every possible breach. It is about resilience. It is about how quickly an organization can detect, respond to, and recover from an incident. It is about making sure that when things go wrong, there is a plan in place and a team that knows how to execute it.
The organizations that get this will build security programs that work. The ones that do not will keep getting blindsided. The only question is which side they want to be on.
Stay Ahead of the Curve
Join industry leaders at our next Tech Forum to sharpen your strategy, expand your network, and stay ahead of evolving threats.

Rick Doten is the VP of Information Security at Centene Corporation and CISO of Carolina Complete Health, providing cybersecurity leadership in Charlotte, NC. With over 25 years in the field, he has led ethical hacking, incident response, and risk management teams, serving as CISO, cybersecurity practice lead, and consultant for global organizations.
Rick is a frequent speaker at cybersecurity conferences, a contributor to The CyberWire Hashtable, and serves on the board of his local ISC2 chapter. He was the lead author of version 8 of the Council on Cybersecurity Critical Security Controls and helped develop a Cybersecurity Master’s degree program to shape the next generation of security leaders.
For Leaders, By Leaders (FLBL)
We are leaders that enjoy networking leaders with other leaders. Do you want to talk one of our Insights authors, a speaker, or be plugged into one of many communities that we are partnered with across the country? Time to call in the cavalry! We’re saddled up and ready to ride to your rescue.