{"id":116619,"date":"2022-06-28T09:00:00","date_gmt":"2022-06-28T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=116619"},"modified":"2023-05-15T23:03:18","modified_gmt":"2023-05-16T06:03:18","slug":"how-security-leaders-can-help-their-teams-avoid-burnout","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/","title":{"rendered":"How security leaders can help their teams avoid burnout"},"content":{"rendered":"\n

The security community is continuously changing,\u202fgrowing,\u202fand learning from each other to better position the world against cyberthreats.\u00a0In\u00a0the\u00a0latest post\u00a0of\u00a0our Voice of the Community\u00a0blog\u00a0series,\u00a0Microsoft Security<\/a>\u00a0Senior Product Marketing Manager<\/em> <\/em>Brooke Lynn Weenig<\/em><\/a> talks\u00a0with <\/em>Maria Markstedter<\/em><\/a>, Chief Executive Offer (CEO) of Azeria Labs, former Chief Product Officer (CPO) at Corellium, a Black Hat1<\/sup> Review Board member, Forbes Person of the Year in Cybersecurity, and the author of a soon-to-be-published book on Arm assembly internals and reverse-engineering.2<\/sup> The thoughts below reflect Maria\u2019s views, not the views of Microsoft, and are not legal advice. In this blog post, Maria talks about the industry\u2019s growing interest in Arm assembly and how to help security professionals avoid burnout.<\/em><\/p>\n\n\n\n

Brooke: How did you become passionate about Arm as a processing language and how is it gaining momentum in security?<\/strong><\/p>\n\n\n\n

Maria<\/strong>: While working as a penetration tester, I attended a conference where security researcher Marion Marschalek gave a talk about reverse-engineering the computer worm Stuxnet and I was fascinated. I built up the courage to ask her to teach me. This is when I learned about x86 assembly and malware analysis. I got interested in Arm assembly<\/a> and realized that I had way more Arm-based devices around me than x86 processors.<\/p>\n\n\n\n

When I started studying the Arm architecture, the only devices based on Arm were IoT and mobile devices. Digging into it more, I realized that Arm was working on a 64-bit architecture and could take off in the desktop and server world. I was anticipating this shift. Arm is a very scalable platform and offers significant advantages over other processors, like power consumption and performance. Apple switched all their Macs to the Arm processing language. That raised the bar for high-powered yet energy-efficient computers. This shift puts pressure on other vendors that want to compete with laptops that are just as efficient and that have battery life that lasts just as long. It didn’t take long for Microsoft to catch up, with the SQ1 processor for Windows on Arm. Microsoft Azure<\/a> recently implemented an entire cloud service. It’s gaining momentum because the architecture has become more powerful. It\u2019s a new era.<\/p>\n\n\n\n

There\u2019s a huge gap in educational resources for people to learn about Arm. That\u2019s why my current job involves training security teams on Arm reverse-engineering and exploitation. I also wrote a book about Arm assembly and reverse-engineering to fill that gap in a digestible format with lots of graphics. I’ve been working on it for two years and it\u2019s about to be published. I hope that this book will help a lot of people ease their way into becoming proficient in something that is rather dry and hard to learn on your own.<\/p>\n\n\n\n

Brooke: What is the biggest challenge facing security professionals today?<\/strong><\/p>\n\n\n\n

Maria<\/strong>: The biggest challenge is keeping up with new technologies and changes. From my work as a penetration tester, you get a new gig and new clients with a new product that uses a completely different stack of technologies, and you have to quickly familiarize yourself with it. Different technologies mean different attack vectors. That goes in every direction of security research. I know great reverse-engineers who have spent their whole career reverse-engineering malware and product components based on x86. If the architecture of these components changes, everything changes. If you are used to reading x86_64 assembly and are suddenly presented with a completely different assembly language, it\u2019s like trying to understand Spanish if you are familiar only with French.  <\/p>\n\n\n\n

Organizations expect their security teams to keep up with these rapid changes. How will these security teams find the time to learn and stay on top of it all? It’s not reasonable to expect security professionals to learn outside of work hours when they should focus on their family and maintaining a healthy work-life balance because it’s easy to burn out in our industry.<\/p>\n\n\n\n

Brooke: What are some signs of burnout that security leaders can look out for?<\/strong><\/p>\n\n\n\n

Maria<\/strong>: Last year, I experienced my first major burnout. I was taking on way too many responsibilities. As a result, I had to take a couple of months off of work to recover. I always thought, \u201cWhen I burn out, I’ll take a week off and go on vacation.\u201d It’s not as easy as that. It starts off very subtle and is very difficult to notice before it\u2019s too late.<\/p>\n\n\n\n

Some of the causes of burnout\u2014and why I advocate for training\u2014is if your employee feels they don\u2019t have any impact, feels overwhelmed or like they can\u2019t keep up, feels like they are expected to figure it all out in their free time, or doesn’t get the time to work on interesting things that feed their curiosity. In our field, we constantly see someone coming up with something really cool and think, \u201cI wish I could do that.\u201d But yet, we rarely get the time to explore and learn new skills and techniques, especially when they don\u2019t directly correlate with our current role. Security leaders need to help their team nourish their inner curiosity and give them enough breaks and research time, and the opportunity to learn.<\/p>\n\n\n\n

Also, people in the process of getting burnout have a hard time saying no. If you give them new tasks, they’re going to say, \u201cSure!\u201d because they feel like they’re not contributing enough and that they need to prove themselves. As a manager, ask the right questions and monitor their workload. You get more out of someone if they work a little slower but don’t burn out. If they must take sick days off or are so anxious or depressed by the end of the week that they barely get any work done, you’re not getting your results either. If they do less in a focused and balanced way with a clear mind, they will produce more value. Keep your employees happy and motivated; don\u2019t treat them like workhorses.<\/p>\n\n\n\n

Brooke: Should the opportunity to study and grow be considered a recruitment and retention tool?<\/strong><\/p>\n\n\n\n

Maria<\/strong>: Yes. People in our profession are generally very curious and driven. Otherwise, they wouldn\u2019t be in this field. They are very eager to learn. If you feed the curiosity of your security team and give them new learning opportunities, you might be surprised at what they come up with. It makes them more versatile, confident, and motivated. Every security area overlaps with another, so they might come up with an idea that you haven’t thought of, which could lead to security advancements internally.<\/p>\n\n\n\n

At my first company, I was working as a penetration tester and wanted to attend a training course about forensics, because we\u2019d had a couple of forensics incidents, and they would send us penetration testers, even the ones who had little knowledge in forensics. But they said they wouldn’t pay for it, mainly because they didn\u2019t want to invest in their employees and were scared that this investment would lead to them leaving the company. I ended up leaving the company because they would not give me continuous educational opportunities and expected employees to learn everything in their free time instead of investing in their skill development.  <\/p>\n\n\n\n

Brooke: What would you recommend to Chief Security Officers (CSOs) filling cybersecurity roles?<\/strong><\/p>\n\n\n\n

Maria<\/strong>: You’re better off if you hire for potential and character. You can always train people. Hire for potential and pick people who are fast learners, are curious, and have demonstrated that they have invested in their own skill development as best as they could. Train them internally and send them to security conferences where they can meet like-minded people and learn. If you’re waiting for the perfect candidate, it’s rather hard to find enough people for the job. If you train them up, you have a better chance of filling all the spots.<\/p>\n\n\n\n

You can outsource certain security teams, like penetration testing and incident response, as many organizations do, but it’s risky to not have an in-house security team. If an incident happens and your people are not skilled enough to respond to it, you may try to contract with an external firm, but they could be overflowing with projects because it’s a global incident. CSOs should expand their own security teams and leave room for skill development, not just in their own niche but also nurture their interests. It\u2019s the organization’s responsibility to provide the resources and space for employees to evolve their skills.<\/p>\n\n\n\n

Brooke: What is the biggest threat to organizations right now?<\/strong><\/p>\n\n\n\n

Maria: <\/strong>If you focus on one threat, it will become irrelevant in no time. The biggest threat is the rapidly changing environment and that security professionals might fall behind. So, when it\u2019s time to act, they are not able to. Your security team is the backbone of your security posture. If you neglect that, you will not be able to keep up with evolving trends. I have seen people being sent to security incidents last minute who had to pull that off on the fly and work all day, every day for weeks on short notice with no prior knowledge. Things are always so rapidly changing that it’s all about how quickly you can respond. Do you have the resources to respond to what’s being thrown at you?<\/p>\n\n\n\n

Learn more<\/h2>\n\n\n\n

To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n\n\n\n

<\/div>\n\n\n\n
\n\n\n\n

1<\/sup>Black Hat USA 2022<\/a>, Black Hat.<\/p>\n\n\n\n

2<\/sup>Upcoming Book Series: Arm Exploitation<\/a>, Maria Markstedter.<\/p>\n","protected":false},"excerpt":{"rendered":"

Maria Markstedter, CEO of Azeria Labs, shares insights on the growing interest in Arm assembly and strategies to help security professionals avoid burnout.<\/p>\n","protected":false},"author":162,"featured_media":116721,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3681,3683],"products":[3720],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[3186,3243],"class_list":["post-116619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-risk-management","topic-security-management","products-microsoft-security-experts","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\nHow security leaders can help their teams avoid burnout | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How security leaders can help their teams avoid burnout | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Maria Markstedter, CEO of Azeria Labs, shares insights on the growing interest in Arm assembly and strategies to help security professionals avoid burnout.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:03:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brooke Lynn Weenig, Maria Markstedter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Lynn Weenig, Maria Markstedter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/brooke-lynne-weenig\/\",\"@type\":\"Person\",\"@name\":\"Brooke Lynn Weenig\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/maria-markstedter\/\",\"@type\":\"Person\",\"@name\":\"Maria Markstedter\"}],\"headline\":\"How security leaders can help their teams avoid burnout\",\"datePublished\":\"2022-06-28T16:00:00+00:00\",\"dateModified\":\"2023-05-16T06:03:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\"},\"wordCount\":1653,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg\",\"keywords\":[\"Microsoft Security Insights\",\"Security strategies\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\",\"name\":\"How security leaders can help their teams avoid burnout | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg\",\"datePublished\":\"2022-06-28T16:00:00+00:00\",\"dateModified\":\"2023-05-16T06:03:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Enterprise office worker in focused work with a neutral facial expression.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How security leaders can help their teams avoid burnout\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How security leaders can help their teams avoid burnout | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/","og_locale":"en_US","og_type":"article","og_title":"How security leaders can help their teams avoid burnout | Microsoft Security Blog","og_description":"Maria Markstedter, CEO of Azeria Labs, shares insights on the growing interest in Arm assembly and strategies to help security professionals avoid burnout.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-06-28T16:00:00+00:00","article_modified_time":"2023-05-16T06:03:18+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg","type":"image\/jpeg"}],"author":"Brooke Lynn Weenig, Maria Markstedter","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg","twitter_misc":{"Written by":"Brooke Lynn Weenig, Maria Markstedter","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/brooke-lynne-weenig\/","@type":"Person","@name":"Brooke Lynn Weenig"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/maria-markstedter\/","@type":"Person","@name":"Maria Markstedter"}],"headline":"How security leaders can help their teams avoid burnout","datePublished":"2022-06-28T16:00:00+00:00","dateModified":"2023-05-16T06:03:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/"},"wordCount":1653,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg","keywords":["Microsoft Security Insights","Security strategies"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/","name":"How security leaders can help their teams avoid burnout | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg","datePublished":"2022-06-28T16:00:00+00:00","dateModified":"2023-05-16T06:03:18+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/06\/CLO22_TechOffice_004.jpg","width":1200,"height":800,"caption":"Enterprise office worker in focused work with a neutral facial expression."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/28\/how-security-leaders-can-help-their-teams-avoid-burnout\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"How security leaders can help their teams avoid burnout"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/116619"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=116619"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/116619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/116721"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=116619"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=116619"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=116619"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=116619"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=116619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=116619"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=116619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}