Posts

Showing posts from December, 2025

Unlocking the Value of My Cybersecurity Expertise: A Guide for Recruiters, HR Professionals, and Curious Readers

Image
  Hello, Recruiters, HR Professionals, and Curious Readers, If you're a recruiter reaching out about a contract role that seems below my pay grade—perhaps a junior analyst gig or short-term gig paying far less than my expertise warrants—let's talk value. And if you're evaluating candidates by just skimming job titles, that's the lazy way to view talent. Titles can be misleading or vary by company; it's the depth of experience, measurable impacts, and certified skills that reveal true capability.  I'm Erich H. Horst, a seasoned cybersecurity leader with over 20 years of hands-on experience building bulletproof security programs, especially in high-stakes sectors such as healthcare. I've slashed costs (e.g., 18% on cloud spending), reduced risks (e.g., 39% drop in phishing vulnerabilities), and driven compliance that saves companies millions in potential fines. My track record isn't just resume fluff—it's proven ROI that elevates organizations. For tho...

2025: My Year in Review – Lessons from the Trenches of Cybersecurity Leadership

Image
  As 2025 draws to a close, I find myself reflecting on a year that has been equal parts rewarding and revealing. Professionally, it was another solid step forward: deepening my expertise in zero-trust architectures, guiding organizations through complex HITRUST and SOC 2 journeys, mentoring emerging leaders, and continuing to protect the greater good in an increasingly hostile threat landscape. After 25+ years—from helpdesk technician to business owner to seasoned cybersecurity leader—the work still energizes me the way it did on day one. Personally, though, 2025 brought something different: a deeper understanding of how my presence affects others.  It’s a dynamic I’ve observed for years, and it’s nuanced—not black-and-white.  The analysts, engineers, and emerging leaders I mentor? They keep coming back. They ask for more time, send follow-up messages years later, and openly say our conversations shaped their careers. They feel challenged, supported, and truly seen. With...

Ending Ghosting & AI Bias in Hiring: Ethical Practices

Image
  A couple of years ago, I ran an experiment. I applied for the same role twice—once with full transparency, once with minimal input. The result? My résumé-only application triggered an automated invitation to interview with another A.I. system. My detailed, credential-rich submission was rejected in 15 minutes—without anyone reviewing the materials. When I confronted the recruiter, the debate turned heated. We didn’t just disagree on AI’s readiness—we collided on what ethical hiring should look like. I declined the interview, not out of pride, but out of principle. That moment confirmed what I’d long suspected: untested AI in hiring isn’t just inefficient—it’s ethically dangerous. It rewards opacity, penalizes authenticity, and erodes the trust candidates place in organizations. Now, as I prepare for the Advanced A.I. Security Manager (AAISM) exam in November 2025, that lesson resonates more than ever. Ethical lapses in hiring—whether ghosting or blind faith in algorithms—aren’t t...

Leading a Cybersecurity Team That Wins: 6 Principles to Build Trust and Drive Impact

Image
  In today’s cyber battleground, where ransomware, AI-driven phishing, and zero-day exploits lurk around every corner, leading a cybersecurity team is about more than defending the perimeter. It’s about aligning with business strategy, earning trust across the organization, and building a resilient culture that anticipates threats, not just reacts to them. Whether in healthcare, finance, or any high-stakes industry, here are six critical principles to transform your cybersecurity team into a strategic force multiplier.