Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementCybersecurity News

The New Battlefield: 3 Veterans Discuss Their Transition to Cybersecurity

By Jordyn Alger, Managing Editor
Military uniform and flag
Wesley Tingey via Unsplash
November 11, 2025

Leaving the armed forces to join the private sector is a significant career shift, and it isn’t always an easy one. Earlier this month, I had the privilege of speaking with veterans about their career transitions into enterprise security — to dig more into this topic, I wanted to speak to veterans who took their career in a different direction: into the world of cybersecurity. 

3 Veterans Discuss Their Career Journeys

Shawn Dappen, Senior Director, Sales Engineering at Menlo Security, shares his journey from the armed forces to cybersecurity, stating, “What drew me to cybersecurity after the Marines was realizing the battlefield had simply shifted. In the Corps, my mission was to protect people and assets in the physical world. Now it’s about defending them in the digital one. The same mindset applies: stay alert, adapt quickly, and protect your team from unseen threats. Cybersecurity felt like a natural continuation of service — just a new domain, same fight.” 

Like Dappen, many veterans feel that defending cyber assets is simply a new battlefield. Frankie Sclafani, Director of Cybersecurity Enablement at Deepwatch, shares this sentiment.

“I dedicated nine years of service in the U.S. Air Force and Air National Guard, which is where I honed my skills in malware analysis, insider threat detections and national-level incident response at the NSA and U.S. Cyber Command,” Sclafani explains. “I was originally drawn to cybersecurity because my father was in law enforcement, and I always kind of felt that responsibility to do some good in the world. When I got to college, one professor who taught digital forensics, a former FBI agent, really showed me how powerful forensics and cybersecurity can be. I saw the impact it can have, the justice it can bring. Whether you’re doing it in the military, for the FBI, or in the private sector, it’s all about being a defender.”  

Even if cybersecurity isn’t initially included a veteran’s plans for their career, that doesn’t make it impossible to pivot. Jeff Liford, Associate Director at Fenix24, describes his own experience in making the shift. 

“In uniform, I served as an All Source Intelligence Analyst across multiple commands. One of the key tenets of that role was developing deep technical expertise on a subject or organization that could later be used to disrupt an adversary’s operations. I later transitioned to Systems Engineering as a contractor supporting the Department of Defense, where my role became enabling Intelligence Operations through the deployment of highly reliable and redundant systems,” Liford says. “I didn’t originally intend to end up in cybersecurity. As I transitioned out of the military, I had my eyes set on Systems Engineering and Network Operations, but the modern threat landscape basically dictates that all operators are also defenders. The Department of Defense reinforces this — it’s nearly impossible to work in IT for DoD without becoming involved in security in some form. It started with engineering for redundancy and availability and gradually expanded as my technical competence grew.” 

Why Should Veterans Shift to Cybersecurity? 

Dappen explains, “The cybersecurity industry makes sense as a next step for veterans because it aligns perfectly with how we’re trained to think and operate. Veterans understand mission focus, chain of command, and the importance of protecting something bigger than ourselves. We’re used to adapting to evolving threats and working as a team under pressure — exactly what cybersecurity demands. It’s a natural transition from defending territory and people to defending data and systems — same principles, new battlefield.”  

Does Cybersecurity Need Veterans? 

“Veterans bring a lot of strength to the cybersecurity workforce — discipline, mission focus, teamwork, and a mindset built around defense and readiness,” Dappen asserts. “Many of us are already trained to think in terms of threat detection, risk assessment, and response coordination, which translates directly into the cyber domain. Veterans also tend to have a strong sense of accountability and integrity, which are critical traits in security work.”  

The culture and work ethic ingrained into veterans can make them adept at taking on crucial cybersecurity functions. Sclafani elaborates on this, stating, “In the military, when you’re given a mission, you do everything in your power to accomplish it because lives may depend on it. As I transitioned into cybersecurity, lives may not be at stake, but a lot still is when it comes to this job, so it was easy for me to feel that this was my mission now. Veterans will take the same level of professionalism and importance from their service to their civilian careers. You can trust them to answer the call at three in the morning and get the job done right the first time without having to double-check their work.”

The training veterans receive while in the armed forces can be challenging to replicate elsewhere. It provides them unique opportunities to hone essential skills — skills that serve them well in the cyber world. 

Liford states, “My professional inclination to understand how an adversary behaves and then operationalize that information as part of the recovery process closely parallels my work as an intelligence analyst. The military also trains you to act quickly and operate comfortably with imperfect information. That mindset is critical in recovery scenarios, where time is of the essence and organizations cannot afford to wait for perfect data. When a ransomware event occurs and the environment is down, you have to find ways to operate. That’s where the training really shines.” 

How Can the Industry Bring In More Veterans? 

“Companies could definitely do more to bring veterans into these roles,” Dappen argues. “That starts with better awareness — helping veterans understand how their military experience fits into cybersecurity and offering training or bridge programs to close any technical gaps. Partnerships with veteran organizations, mentorship opportunities, and clear career pathways can make a huge difference. Veterans already have the mindset; they just need a door open to the mission.”  

Advice to Veterans Making the Shift

“My advice to veterans who are looking for opportunities within the cybersecurity field is to take advantage of every resource available,” says Sclafani. “There’s a program called SkillBridge that lets vets do an 180-day internship with a company of their choice while still on active duty. If you’re unsure where to start, communities like VetSec are great for networking and information sharing. These programs benefit everyone, helping fill the cybersecurity skills gap while giving veterans an opportunity to apply their existing strengths in a growing field.”  

KEYWORDS: cybersecurity careers security career security career planning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Broken glass

    Security leaders discuss the new vulnerability added to CISA’s catalog

    See More
  • Globe showing Europe

    Security Leaders Discuss the New EU Vulnerability Database

    See More
  • YouTube app

    Cybersecurity experts discuss the YouTube CEO deepfake

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing